Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-5715 (GCVE-0-2017-5715)
Vulnerability from cvelistv5 – Published: 2018-01-04 13:00 – Updated: 2025-05-06 14:59- Information Disclosure
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel Corporation | Microprocessors with Speculative Execution |
Affected:
All
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T15:11:48.456Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
},
{
"name": "USN-3560-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3560-1/"
},
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"name": "DSA-4187",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2018/dsa-4187"
},
{
"name": "USN-3542-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3542-2/"
},
{
"name": "GLSA-201810-06",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201810-06"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name": "USN-3540-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3540-2/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"name": "USN-3597-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3597-1/"
},
{
"name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"name": "SUSE-SU-2018:0012",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
},
{
"name": "SUSE-SU-2018:0011",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
},
{
"name": "DSA-4213",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2018/dsa-4213"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
},
{
"name": "DSA-4120",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2018/dsa-4120"
},
{
"name": "openSUSE-SU-2018:0013",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"
},
{
"name": "USN-3580-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3580-1/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.f5.com/csp/article/K91229003"
},
{
"name": "USN-3531-3",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3531-3/"
},
{
"name": "USN-3620-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3620-2/"
},
{
"name": "openSUSE-SU-2018:0022",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
},
{
"name": "USN-3582-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3582-1/"
},
{
"name": "DSA-4188",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2018/dsa-4188"
},
{
"name": "RHSA-2018:0292",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://xenbits.xen.org/xsa/advisory-254.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
},
{
"name": "SUSE-SU-2018:0019",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_01"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
},
{
"name": "102376",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/102376"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"name": "USN-3594-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3594-1/"
},
{
"name": "VU#584653",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/584653"
},
{
"name": "VU#180049",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"name": "SUSE-SU-2018:0009",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"
},
{
"name": "USN-3690-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3690-1/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"
},
{
"name": "USN-3549-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3549-1/"
},
{
"name": "SUSE-SU-2018:0007",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.citrix.com/article/CTX231399"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://spectreattack.com/"
},
{
"name": "USN-3531-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3531-1/"
},
{
"name": "FreeBSD-SA-18:03",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD",
"x_transferred"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
},
{
"name": "SUSE-SU-2018:0006",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"
},
{
"name": "USN-3581-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3581-1/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
},
{
"name": "1040071",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1040071"
},
{
"name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr"
},
{
"name": "USN-3597-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3597-2/"
},
{
"name": "USN-3581-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3581-2/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
},
{
"name": "SUSE-SU-2018:0010",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
},
{
"name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
},
{
"name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"name": "USN-3516-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/usn/usn-3516-1/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
},
{
"name": "43427",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/43427/"
},
{
"name": "SUSE-SU-2018:0020",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"
},
{
"name": "USN-3541-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3541-2/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
},
{
"name": "USN-3777-3",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"name": "openSUSE-SU-2018:0023",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
},
{
"name": "SUSE-SU-2018:0008",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
},
{
"name": "USN-3561-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3561-1/"
},
{
"name": "USN-3582-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3582-2/"
},
{
"name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://seclists.org/bugtraq/2019/Jun/36"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"name": "FreeBSD-SA-19:26",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD",
"x_transferred"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"name": "20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://seclists.org/bugtraq/2019/Nov/16"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.paloaltonetworks.com/CVE-2017-5715"
},
{
"name": "[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"
},
{
"name": "[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2017-5715",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-23T13:31:09.657900Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-203",
"description": "CWE-203 Observable Discrepancy",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-06T14:59:36.405Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Microprocessors with Speculative Execution",
"vendor": "Intel Corporation",
"versions": [
{
"status": "affected",
"version": "All"
}
]
}
],
"datePublic": "2018-01-03T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information Disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-16T08:06:27.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
},
{
"name": "USN-3560-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3560-1/"
},
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"name": "DSA-4187",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2018/dsa-4187"
},
{
"name": "USN-3542-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3542-2/"
},
{
"name": "GLSA-201810-06",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201810-06"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name": "USN-3540-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3540-2/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"name": "USN-3597-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3597-1/"
},
{
"name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"name": "SUSE-SU-2018:0012",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
},
{
"name": "SUSE-SU-2018:0011",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
},
{
"name": "DSA-4213",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2018/dsa-4213"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
},
{
"name": "DSA-4120",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2018/dsa-4120"
},
{
"name": "openSUSE-SU-2018:0013",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"
},
{
"name": "USN-3580-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3580-1/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.f5.com/csp/article/K91229003"
},
{
"name": "USN-3531-3",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3531-3/"
},
{
"name": "USN-3620-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3620-2/"
},
{
"name": "openSUSE-SU-2018:0022",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
},
{
"name": "USN-3582-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3582-1/"
},
{
"name": "DSA-4188",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2018/dsa-4188"
},
{
"name": "RHSA-2018:0292",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://xenbits.xen.org/xsa/advisory-254.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
},
{
"name": "SUSE-SU-2018:0019",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_01"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
},
{
"name": "102376",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/102376"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"name": "USN-3594-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3594-1/"
},
{
"name": "VU#584653",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/584653"
},
{
"name": "VU#180049",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"name": "SUSE-SU-2018:0009",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"
},
{
"name": "USN-3690-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3690-1/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"
},
{
"name": "USN-3549-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3549-1/"
},
{
"name": "SUSE-SU-2018:0007",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.citrix.com/article/CTX231399"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://spectreattack.com/"
},
{
"name": "USN-3531-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3531-1/"
},
{
"name": "FreeBSD-SA-18:03",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
},
{
"name": "SUSE-SU-2018:0006",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"
},
{
"name": "USN-3581-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3581-1/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
},
{
"name": "1040071",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1040071"
},
{
"name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr"
},
{
"name": "USN-3597-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3597-2/"
},
{
"name": "USN-3581-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3581-2/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
},
{
"name": "SUSE-SU-2018:0010",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
},
{
"name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
},
{
"name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"name": "USN-3516-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/usn/usn-3516-1/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
},
{
"name": "43427",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/43427/"
},
{
"name": "SUSE-SU-2018:0020",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"
},
{
"name": "USN-3541-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3541-2/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
},
{
"name": "USN-3777-3",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"name": "openSUSE-SU-2018:0023",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
},
{
"name": "SUSE-SU-2018:0008",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
},
{
"name": "USN-3561-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3561-1/"
},
{
"name": "USN-3582-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3582-2/"
},
{
"name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://seclists.org/bugtraq/2019/Jun/36"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"name": "FreeBSD-SA-19:26",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"name": "20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://seclists.org/bugtraq/2019/Nov/16"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.paloaltonetworks.com/CVE-2017-5715"
},
{
"name": "[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"
},
{
"name": "[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2018-01-03T00:00:00",
"ID": "CVE-2017-5715",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microprocessors with Speculative Execution",
"version": {
"version_data": [
{
"version_value": "All"
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
},
{
"name": "USN-3560-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3560-1/"
},
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"name": "DSA-4187",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4187"
},
{
"name": "USN-3542-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3542-2/"
},
{
"name": "GLSA-201810-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201810-06"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name": "USN-3540-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3540-2/"
},
{
"name": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"name": "USN-3597-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3597-1/"
},
{
"name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"name": "SUSE-SU-2018:0012",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
},
{
"name": "SUSE-SU-2018:0011",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
},
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
},
{
"name": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
"refsource": "MISC",
"url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
},
{
"name": "DSA-4213",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4213"
},
{
"name": "https://cert.vde.com/en-us/advisories/vde-2018-002",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
},
{
"name": "DSA-4120",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4120"
},
{
"name": "openSUSE-SU-2018:0013",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"
},
{
"name": "USN-3580-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3580-1/"
},
{
"name": "https://support.f5.com/csp/article/K91229003",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K91229003"
},
{
"name": "USN-3531-3",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3531-3/"
},
{
"name": "USN-3620-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3620-2/"
},
{
"name": "openSUSE-SU-2018:0022",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
},
{
"name": "USN-3582-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3582-1/"
},
{
"name": "DSA-4188",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4188"
},
{
"name": "RHSA-2018:0292",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
},
{
"name": "http://xenbits.xen.org/xsa/advisory-254.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-254.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180104-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
},
{
"name": "SUSE-SU-2018:0019",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"
},
{
"name": "https://www.synology.com/support/security/Synology_SA_18_01",
"refsource": "CONFIRM",
"url": "https://www.synology.com/support/security/Synology_SA_18_01"
},
{
"name": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
},
{
"name": "102376",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102376"
},
{
"name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
"refsource": "CONFIRM",
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"name": "USN-3594-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3594-1/"
},
{
"name": "VU#584653",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/584653"
},
{
"name": "VU#180049",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"name": "https://cert.vde.com/en-us/advisories/vde-2018-003",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"name": "SUSE-SU-2018:0009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"
},
{
"name": "USN-3690-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3690-1/"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
},
{
"name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
"refsource": "CONFIRM",
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us"
},
{
"name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html",
"refsource": "CONFIRM",
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"
},
{
"name": "USN-3549-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3549-1/"
},
{
"name": "SUSE-SU-2018:0007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"
},
{
"name": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
"refsource": "CONFIRM",
"url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
},
{
"name": "https://support.citrix.com/article/CTX231399",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX231399"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name": "https://spectreattack.com/",
"refsource": "MISC",
"url": "https://spectreattack.com/"
},
{
"name": "USN-3531-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3531-1/"
},
{
"name": "FreeBSD-SA-18:03",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
},
{
"name": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
"refsource": "CONFIRM",
"url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
},
{
"name": "SUSE-SU-2018:0006",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"
},
{
"name": "USN-3581-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3581-1/"
},
{
"name": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
"refsource": "CONFIRM",
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
},
{
"name": "1040071",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040071"
},
{
"name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr",
"refsource": "CONFIRM",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr"
},
{
"name": "USN-3597-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3597-2/"
},
{
"name": "USN-3581-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3581-2/"
},
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
},
{
"name": "SUSE-SU-2018:0010",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
},
{
"name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
},
{
"name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"name": "USN-3516-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/usn/usn-3516-1/"
},
{
"name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
"refsource": "CONFIRM",
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
},
{
"name": "43427",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43427/"
},
{
"name": "SUSE-SU-2018:0020",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"
},
{
"name": "USN-3541-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3541-2/"
},
{
"name": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"refsource": "MISC",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"name": "https://support.lenovo.com/us/en/solutions/LEN-18282",
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
},
{
"name": "USN-3777-3",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"name": "openSUSE-SU-2018:0023",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
},
{
"name": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html",
"refsource": "CONFIRM",
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
},
{
"name": "SUSE-SU-2018:0008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"
},
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
},
{
"name": "USN-3561-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3561-1/"
},
{
"name": "USN-3582-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3582-2/"
},
{
"name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Jun/36"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"refsource": "MISC",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"name": "FreeBSD-SA-19:26",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"name": "20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Nov/16"
},
{
"name": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-5715",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-5715"
},
{
"name": "[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"
},
{
"name": "[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2017-5715",
"datePublished": "2018-01-04T13:00:00.000Z",
"dateReserved": "2017-02-01T00:00:00.000Z",
"dateUpdated": "2025-05-06T14:59:36.405Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD028C10-FD07-4206-A732-CCAC1B6D043D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"704FAA50-1B7D-4917-AC4A-4C58785340F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C6B95D3-75BD-4826-BFBE-9701CC0FF052\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F66E31A6-EA01-40C8-8718-CE2C1F45EEB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBBE3B05-2063-49DE-A1D3-9D0A62E0CF5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"022F2CBE-EFB1-4962-AC91-D25AAB057DAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69C05CD9-551B-46EE-85F8-D18FF878FE8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DCCB5A5-20E3-4EC5-956C-EA7C0F33A026\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C38C609-242E-4923-A81F-DAFBE7B6A927\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AEB08B5-7CBA-479A-A41B-FD8A6D9E0875\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8C4FDD7-F2EC-4EDB-ACC9-3D6B9152C855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E51DD0B-1EED-4BE9-B0A7-BE2E91CCA84C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7AC7C56-2205-4121-99E2-001A7488E0FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1677313-FF8F-493B-9DA3-C78F87581A17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B2A3CCE-FA57-43B5-B7DE-CFD0CC2ECD7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85CA4444-5103-4451-8A7C-F6BBE714BBB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA1EB745-46D7-4088-93C6-E7156520B144\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A93010C0-33B3-438F-94F6-8DA7A9D7B451\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A988A78-6B3D-4599-A85C-42B4A294D86D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"246AA1B0-B6C8-406B-817D-26113DC63858\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00EE5B42-FF05-447C-BACC-0E650E773E49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1F0E3C4-7E9B-435F-907E-4BF4F12AF314\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D616C72-0863-478C-9E87-3963C83B87E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC333B0D-3A0E-4629-8016-68C060343874\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6655535C-FF64-4F9E-8168-253AABCC4F5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBD68F3F-7E38-40B9-A20B-B9BB45E8D042\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EACEF19-83BC-4579-9274-BE367F914432\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24128A7F-2B0B-4923-BA9E-9F5093D29423\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0990DD71-9E83-499D-9DAF-A466CF896CFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B7FEDEF-9772-4FB1-9261-020487A795AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE7B0F72-DEDF-40C4-887C-83725C52C92E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9568C222-9816-4520-B01C-C1DC2A79002D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B2F8FAD-1688-4369-BB4B-9FA9F30A80A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53A1F23D-7226-4479-B51F-36376CC80B04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAB245C8-9918-41A0-9DFB-A11E4185C87A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9990DD08-BD81-4BFA-B3D4-0DECBF8CCC54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F752A3C8-18ED-4765-B6EC-C664154EB701\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4F31C3F-7C0D-4D95-B4B9-89FD38076913\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BEEE36E-E735-4A33-80B7-9407D072F6BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CB3D3DE-21BE-40C7-A510-AC97C92390DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D9A9545-38A3-460D-AB1A-8B03BEB405A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1860D932-777D-41F2-94A2-D14AB1494AA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75165A10-2FD5-4370-814C-B60FDE339AFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"454AC633-5F1C-47BB-8FA7-91A5C29A1DD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2394E8C-58D9-480B-87A7-A41CD7697FC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B9AC02B-D3AE-4FAF-836E-55515186A462\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65AAC7A7-77CA-4C6C-BD96-92A253512F09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCD16C07-0050-495A-8722-7AC46F5920F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01423706-C82C-4457-9638-1A2380DE3826\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A881E2D3-A668-465F-862B-F8C145BD5E8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E5B9B98-0EF0-4ACD-B378-F9DE5AB36CBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BDC6806-E4FC-4A6E-A6BB-88C18E47ABFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6602DD69-E59A-417D-B19F-CA16B01E652C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05C493EE-EF9F-47E2-8F88-86DF6C5F1FF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40010DAE-DD1A-4A81-B6E9-EDC1B0DDCAB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED96AC16-12CC-43F6-ACC8-009A06CDD8F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CE9DC29-C192-4553-AF29-D39290976F47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F625E647-B47E-404C-9C5B-72F3EB1C46F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3AF3279-89E7-4C91-8C5F-5AD5937CD0C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5878612-9825-4737-85A5-8227BA97CBA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F453D348-28CE-402B-9D40-A29436A24ECC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36322F4B-83D7-468A-BB34-1C03729E9BF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AD22811-C3C6-4B5E-98D5-D3F2240E6C8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3C7D0BA-8F07-42AD-8BB9-C65472BE41C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0A2A50E-94FA-44E9-A45D-3016750CFBDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5625CAD8-4A62-4747-B6D9-90E56F09B731\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43A234CE-D6AA-4A32-8425-1A4DDA0F6B6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78DE1A01-3AEF-41E6-97EE-CB93429C4A1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"410184AF-B932-4AC9-984F-73FD58BB4CF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B265F073-9E0A-4CA0-8296-AB52DEB1C323\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F664223-1CBC-4D8A-921B-F03AACA6672B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"987A8470-08BA-45DE-8EC0-CD2B4451EECD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BBC9542-FB77-4769-BF67-D42829703920\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74FDC18B-4662-422E-A86A-48FE821C056F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAB4AA2C-D1D9-44D8-9471-66EBDE9DC66D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBA3E7AE-CB74-48A8-A2B8-9FCADB6E40D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78E4461B-72F8-4F3D-A405-4AFA99EC8A32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"663DDC1C-E48A-4E84-A6CC-B46FC45D6A6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CEEC75B-10CE-4B7E-BA5F-6D661EC07FFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAEDED56-9387-4DAC-BF52-C32ECCB7D407\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA13F31C-BBD9-48C7-8499-92D0B5CA8CF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E57A9B28-734B-401D-B24C-A295F364D8E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F02289DF-4A02-4602-89B7-E9148236EE1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"723E7155-493D-4B5A-99E2-AB261838190E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82E37264-E4BA-4D9D-92E7-56DE6B5F918F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8704BE6D-2857-4328-9298-E0273376F2CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"731F1E65-1D53-443B-8E2F-8AF11191AFA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02A83822-822D-4A4D-B29B-A5BE6367A7DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8C32738-F08E-469C-8DE0-2708F30574A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B292187E-8EAD-49D2-B469-B14CA0656035\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7D131E1-24C1-48CF-B3DD-46B09A718FB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ABF1231-73CF-4D1B-860C-E76CD26A645E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7F88E38-4EC4-41DB-A59D-800997440C0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32FD6647-4101-4B36-9A9A-F70C29997148\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D248D668-A895-43B3-ADEF-1B22EE7DC76E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"858411B5-E904-45FA-8B33-5CC73B915B22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BB9336C-C893-4AB0-9402-868CE9960058\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4695F94-7AAE-4219-9EF6-CE6D0838192D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD7A0991-73F0-410D-855C-BFC88A66E61F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAF5CF9A-B3F2-4686-B933-7DB13AD2CF35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9858EAC3-C1CE-449B-A605-FFA337DA825D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7A8F905-A4C6-4EC6-B9E8-800948350B89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"565B48E3-1406-4E3C-B4A5-35865C5614E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46B6C4D7-B0A2-4DF1-B8DE-19C806D5FABB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AB82A90-C0BC-4BA8-88CA-4967BC3A4A7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"191A094B-E354-4767-AD43-87CE140BF851\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1289B9E-5725-42EF-8848-F545421A29E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"238A21CB-F8C5-468B-B523-6D014E2EA8AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DC52CDD-614D-4EA0-8DA8-D71189C42E8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4229DB2-8BBC-49F8-87A8-2E7D56EFD310\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0E91F46-D950-4894-BACF-05A70C7C6F7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E12B40B-5221-48A6-B2A6-D44CD5636BB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BCB77C9-ABE3-44A0-B377-7D7035E8A11F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D06639F5-5EE8-44F4-B48A-5694383154DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"637C3687-FBCC-41A0-BFE6-823BAE45FB92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2350A197-193F-4B22-80E8-3275C97C78EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"734C7A7E-ACCA-4B34-BF38-0FAED988CC6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D9ABAFC-B3B5-449D-A48E-2E978563EDE7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99019EA0-6576-4CE7-B60A-975D418AA917\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E846AEF-751D-40AD-84B5-EFDC9CF23E2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB9DD909-B2AC-46BA-B057-D239D0773CAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54F5C355-FDFC-4E71-93AA-218389EF10E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0A1CA1E-971D-4F67-864E-2E772C1E736B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B5F8391-D974-49AC-8550-ADB3FA6C0535\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8302BF58-9E54-40DA-BCFE-59CA52C460D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECCDE9EF-037B-4650-8131-4D57BE141277\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB8253DA-9A04-40D6-84C1-C682B4023D4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAF6D175-85C3-4C72-AD9F-31B47EF43154\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A5FC594-2092-4240-9538-235BBE236DD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87D95F00-EA89-4FDE-991C-56636B8E0331\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4158561F-8270-42D1-91D8-E063CE7F5505\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF0DEA96-0202-41EB-BDC3-24E2FC4415B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8BACE1C-5D66-4FBC-8F86-30215A623A94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF707146-0D64-4F3A-AE22-956EA1CB32B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8118C3F9-0853-4E87-9E65-86E1398B2780\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A298501-C4D7-48D4-90F9-15AFA59DED48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEE1B07B-3D92-4D2D-8667-D902F002277F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F05CB19-1059-4C4D-BFD7-9F51A22A4F97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5588732F-7F1A-4C24-B35F-30532107FFDE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A127DD5D-426D-4F24-A8C5-DC9DAC94B91C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26EE0BBD-3982-4B0F-82F6-D58E077C75DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAEEC918-EA25-4B38-B5C3-85899D3EBE6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"813965F4-3BDA-4478-8E6A-0FD52723B764\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C5EA2F4-F3EF-4305-B1A1-92F636ED688F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04384319-EE8C-45B4-8BDD-414502E7C02D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C52528CE-4F31-4E5F-8255-E576B20F3043\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6C3F422-F865-4160-AA24-1DAFAE63729C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D034E7F-4D17-49D7-BDB2-90CB4C709B30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C18E6B4-E947-403B-80FB-7095420D482B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2814CC9F-E027-4C5A-93AF-84EA445E6C12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24A470C3-AAAA-4A6E-B738-FEB69DB78B9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1236944-4942-40E4-9BA1-029FEAE94BBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"086CAB4B-A10A-4165-BC33-33CADCD23C0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAFB6B30-BFB0-4397-9E16-37D1A772E639\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFCB9D7B-7D0A-435D-8499-C16BE09E19FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64277594-9713-436B-8056-542CFA9F4CFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"589BB170-7CBA-4F28-99E3-9242B62E2918\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91B9C4D9-DA09-4377-9DCD-225857BD9FA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03D0265F-840B-45A1-90BD-9ED8846A9F63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74BAC0EC-2B38-4553-A399-4BD5483C4753\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4477EBA6-F0A7-452B-96E8-BA788370CCA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1285D817-B5B8-4940-925D-FCDD24810AE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D289F7B4-27CD-4433-BB45-06AF98A59B7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00168903-6012-4414-87D1-2EE52AA6D78E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AE8D524-577E-4994-8A4B-D15022C84D7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75977B0B-C44D-43BC-8D7A-AF966CDB1901\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE7F5D52-9F41-49A4-B941-E0D777203FF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52B5B3FD-5BEA-4DE8-B010-55FED1547167\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"167B1B04-5823-4038-A019-3975A3B447C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BA096E0-5480-47CB-822B-D11D7E20F69F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30357469-0B8F-4385-A282-2F50181EA442\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BE70772-7796-4594-880A-6AAD046E4D8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A9E2F8D-2974-4833-9EC2-233CEE257C26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17EE3078-454F-48F8-B201-3847DB40D5C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE32C500-55C2-41A7-8621-14EBF793BF11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52D3DF52-501A-4656-98F1-8DD51D04F31F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09578301-CF39-4C24-951A-535743E277EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A65F303-96C8-4884-8D6F-F439B86BA30C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E046105-9DF5-425F-A97E-16081D54613C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2987BCF-39E6-49B6-8DEE-963A38F12B07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AD92AD8-033A-4AAD-91E5-CB446CCE9732\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77E0E73A-F1B4-4E70-B9F1-EE97785B8891\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61D6E3CC-79B1-4995-9A76-41683C7F254A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FE5773D-3CD1-4E63-8983-E0105C46D185\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A7C307A-6576-4A0A-8F4E-0981C9EE2901\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18B3A53B-902C-46A5-8CE7-B55102703278\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB843479-729A-4E58-8027-0FC586F051AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AF5A233-1E77-49FD-AC2C-60D185481E28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18519CF2-B0DA-42DD-8A3E-9084298C210A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"329D5FCF-7EC5-4471-906B-3619A180BD52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DD43EAA-F3A5-4748-9187-A6E6707ACD11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6F3C14D-4BFC-4205-8781-95E6B28C83C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20942AD8-ADB7-4A50-BDBE-DB36249F4F52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EC6ED02-134B-4322-AB72-75A0AB22701E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FA74EEE-54CC-4F80-B1D3-99F7771335ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6B859F7-0373-4ADD-92B3-0FAB42FCF23C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAC76F31-00A5-4719-AA50-92F773919B3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49996F5A-51B2-4D4E-AE04-E98E093A76CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F8406B0-D1E5-4633-B17E-53DC99FE7622\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D49435C-7C33-454B-9F43-9C10F28A28A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D17E1A0F-1150-4899-81BC-BE84E4EF5FA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EADD98AE-BAB0-440D-AB9F-2D76BE5109E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED44A404-8548-4EDC-8928-4094D05A6A38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2AAD8F0-0D31-4806-8A88-A30E5BE43630\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8164EE5F-6ABA-4365-8718-2F98C2E57A0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7110AF9-A407-4EE2-9C46-E5F1E3638E9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A06696D-37F0-427D-BFC5-1606E7441C31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68A76015-0A05-4EC7-B136-DC13B55D881F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54464F6C-9B2D-46BA-AC44-506389F3EE0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FA11017-EA58-45EE-8408-FCCCF7183643\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"442AD778-D56F-4C30-BBF8-749D6AAC4737\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF7D3F31-AF4D-4C50-8590-A763AAC7AF07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"445BFC2E-38FA-4130-8550-0866EC4EDA33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6DC2746-CE41-40C9-8CFA-23231BBCAE77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C3A8976-5E4D-490A-A87D-A47D1B2B903C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C8535E6-220E-4747-8992-45B6EAFC555C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7479B49-F484-4DF2-86CB-E52EE89FA238\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6D68512-746D-4E95-857B-13A0B6313C5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4312BA84-F9A0-4BD4-8438-058E1E7D6C0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60E52DF5-C713-4BC4-B587-FF6BDA8509CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"304ADCAC-9E49-42BD-BC92-58D9B2AD52E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AB02172-B9A7-4801-88F2-98BF5843184A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5141380E-BD18-47C1-A84C-384BA821773D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AE6C49E-2359-4E44-9979-7D34F8460E35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C004B75F-37AF-4E61-98F3-1B09A7062DDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7126D19-C6D9-43CB-8809-647B1A20E7DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CC98503-A80A-4114-8BF2-E016659BE84E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3821412D-B010-49C4-A7B4-6C5FB6C603B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AD5B51A-AEA0-4DA2-BA60-94A2D5605352\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F96C6CA0-434D-428F-B629-A971C2937628\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"301AB72A-A6F2-42C8-A931-94EF2271443F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59414B5A-05B8-49AF-A197-2A31729DDB65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BFDD380-692F-41D7-996F-F97FC74DC7CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49602828-2BFC-4571-9F05-6210FD263DF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87E03978-E16D-4A9B-8AE7-9F4F1171C14A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03096A9A-5758-47E6-81E2-BCFE847C41F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"150CC865-7975-45EC-BFF7-A94146442BA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8FA1308-589B-432B-80F9-9A499D083ED5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6ED2453E-30E1-4620-BEC5-21B0083449E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FE8DD05-D700-4F89-9B01-D489029DF7A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"050957CA-6191-4F9F-9D07-48B342B3B1B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DACBF998-8B11-45C7-9017-486AED4FAE6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9F2F3C4-FC94-414A-A208-913A43D57D75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"641152EC-F4B4-4E5E-B396-AC4CAAB805BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4911E332-B8BA-4336-A448-3F70D2BBB147\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"330EC403-3174-4543-9BBE-CEC0ABC1575D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EF585D0-507E-491E-9C3B-78EE26F2F070\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F5D885A-85C4-4A11-B061-61EFF6B6E329\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0502B59F-933C-4E25-A2EC-9296B197E139\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99D9C0A9-2DFF-4760-8FED-AC2DA7968E51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5A1BAEC-18BF-4607-BFB7-48102E75186A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D49ED138-F42D-4451-A350-0B2DD5AB9444\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5ED91472-90FC-4AC8-96D5-1550A8502411\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2784E2AF-A5E5-4960-830C-B3EFB84043D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9112FA50-5527-4B20-80F5-2DE9E66D09F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73CE4E2E-B2BF-409E-B18C-D67DA810FE9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2B84D67-0B1D-4B74-BC85-AF8F933D8429\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCA05A18-1523-4EED-9D2E-0A258A33F24F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C34E70EB-92F0-43F6-8883-FE422BE1A3FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78D301F1-20C2-4756-9A90-37F14835CE14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA63B803-4D48-42E8-A793-F92ABCB8BFC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"129DB9CB-E878-4856-A954-15FFE1428636\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"730DB4AA-FD7D-40C6-8D7F-19937832EF9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07E86978-4820-422A-8C7C-FF0697DAED05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF813AD9-D296-4915-861C-8DE929E45FE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04A65469-083F-40B5-86C5-A2EAE5B2F00A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F1AA82E-BD86-40F5-B417-71DF6AF53A37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B71A6DB0-5EB0-4712-8480-CF427F521D33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8223D5A1-ADF1-43C6-AF91-EE5C413BCB37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DD69605-F52B-4623-921A-983A5A408ECA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1D5685F-6FFE-4A6A-9FF8-940C8DA36499\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3832D0A6-419D-4876-B5C4-920578F713F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"404E38E6-9EB3-41D0-97A7-DC579688BFB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40E4A921-AB28-47B7-B5A3-EB82193D15BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0357E48-2300-47B4-B9E5-9FE813A2FC09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96CC28B6-57D1-4919-AA55-A262CC16AFE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EB4C54D-1265-425A-B507-E1099844875A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97362147-3A71-430D-9064-4435D45C3B8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89212CF3-4E99-4389-94CE-F4211DDCA01B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"611C0A0A-1FA3-42F9-82E8-BFCB71A077DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36F027D9-DCB4-4A3D-8987-41F2941DBD45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E23BCEC9-2BFB-4B41-9A7A-18B1347C6202\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4924CE39-A846-4DB4-9547-6322FC5AD6B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C9E2C9A-94A1-456B-90D5-54932DF64C22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC04C652-B2D8-4002-A50E-8AFE83204A25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10D413F0-CDBC-4A63-B9A7-9E7725BA1E83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"754A8826-59F7-4A71-B74B-737BE9C7DE4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FADB6BDA-6825-489B-AB39-7729BA45DFD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7913F57E-E600-4767-AF51-D045E1898E72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD3783F4-5A05-45AA-9791-A681011FD78C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01E3114D-31D2-4DBF-A664-F4049D8B6266\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8EE6578-981D-470C-BB24-4960B3CB1478\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EE59839-8EB9-47FE-88E2-F0D54BE787A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75694A3D-080A-4AA7-97DF-5A5833C9D9F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E996176-3DEA-46E6-93B7-9C0DF32B59D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4417007D-126A-478B-87EA-039D088A4515\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F78C2825-F6A3-4188-9D25-59EAEC8A7B0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF2FA85D-B117-410D-B247-8C5A3479319A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A041D27-132C-4B15-976F-1750C039A89F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D495E06-BF2B-4C5A-881D-94C93CD2BA2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"088BC395-06D5-4156-85EB-63C4A9552898\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33A220A2-A6D2-46A7-B168-607400EEDCE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E79232F-7196-440B-82D4-165885251232\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED866954-77AB-4CA8-8AED-4252C595FC4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28A1F516-B180-45D4-8EB1-754B7497CB2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36758A04-64D3-4150-A004-CF042FA31CD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E01752E-F1DD-400A-A917-216CAF15B0F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD47EC58-F776-4F59-8F15-4B208904CF4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94565E35-8A58-4CB6-A489-C796DCB97FC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49964D35-5323-4412-BD54-661630F9A8CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0F66468-87D0-41FC-934B-5924BE2956CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45C0D99E-443E-4AB1-A07A-900A09FE177E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9DAEE52-09C3-4A09-9958-9D6807B2700B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B97690D4-E814-4D40-B170-BE56D7AE2C1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89804F2C-D32D-4444-ABEA-5B241153D096\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AAAAF9C-B29B-4020-BAFF-C87B1A08294A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C27B318-2AC1-423D-B0C8-583BB1800D5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E58E3D0-1154-4B13-BA16-67CE67DF0637\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32D2ACB3-B906-4944-A021-03C4645965BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E1A41BA-A1D6-484A-BAD2-68DF85598354\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11260C9D-69A9-4D81-9CCF-2E116DD75F7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C020F06-FD27-46E3-A48F-3F60F33BB969\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03C74F10-6A7F-4F68-8A34-E981E1760DE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24741B98-8D0E-4307-AAEF-A14B2531DCA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D4FA4BA-4304-4A70-9F86-120F2A3D8148\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"367FC8BA-F046-4264-A049-49E933E7698F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE9B68D3-1DFB-4468-85C4-AC13E6CBC111\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C966A016-B650-44D9-B8C4-1ED50AB318DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC448FF0-6D3F-4609-864B-4191905EE2B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FC246FE-4CA6-4B2D-83C3-D50A386C24A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"758A14DB-1BAF-442A-BA7C-5E9C67847BEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61309100-CFA7-4607-A236-8910838AA057\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82D76265-7BD0-4C51-AE77-22B22524DE81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE38B195-BB8D-4747-881D-E8033760B4C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AA8BE76-168D-48A3-8DF6-E91F44600408\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B656975-5D71-4712-9820-BDB7BC248AFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA045267-114D-4587-B6D7-E273C28DC9B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77018415-E122-406E-896D-1BC6CF790BE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4E1C012-3E05-44DB-B6D2-BFD619C034B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15D689D6-8594-42F2-8EEF-DCAEBA885A67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6446000-0494-4DC5-ABAA-F20A44546068\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99B94EEC-6690-45D0-B086-F4A5B25C25CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"832AB3CD-E3A1-4CCB-A210-287973563D0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A26C0CC-68AD-40F5-96B8-87E6C643F6F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99C4221A-9994-43B3-9C7A-E13815A50A10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20070B1D-B91C-40BA-A9D8-E80170A2933F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A70129C9-371F-4542-A388-C095869E593A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C4DE25F-168A-4C67-8B66-09F61F072BD4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58157F24-D89E-4552-8CE6-2F01E98BD1E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45ACBBEA-EC95-4F3E-B585-893DB6D21A0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6A5EC79-1B21-4BB3-8791-73507BC8D4DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0387587-AAB6-4284-8516-4DA3E3582D30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A238C975-9196-449F-9C15-ABB2E9FD1D06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F17F4A5-120B-4E00-97C8-8A85841ACBC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2537F047-64C9-4E73-B82C-310253184183\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A55857C-649D-46CE-AEDA-6E553E554FC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BA4892D-AFDF-4441-821E-5EBF7F64C9F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"327E06A3-7F0E-4498-8811-10C8D15398FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1624E6D6-858E-4085-B0B9-362B819EFD88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50D61F4A-40F0-477C-8326-7359D3626E77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1455B4DE-7F1C-4CF2-AE02-2EDD20025D62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B215788-860B-46CD-9A08-43AFF98FAEAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4EB132B-000C-4A17-AFB3-19F40A73D2CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C4815AE-B635-4545-83C2-5EC4E0128337\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0046C06-E3E6-4674-A4D1-332DD29D9552\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C191851-3DC3-41C7-AD89-81F091CCC83A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21126922-8E81-47F4-82D4-CBCDDACEC4FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"209E18B0-BBB5-4C65-B336-44340F7740DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C867C0B8-91A4-482A-B7DD-54AB9599AE52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30F03843-8A51-4CE1-BE6C-994BDE3A8F97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09854948-2657-4261-A32A-0523058F072E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D13904A5-266D-481C-A42A-734C3823A238\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACC82FCB-0541-45C4-8B7E-CB612D7F702A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"501E9355-0CDD-4951-BCC3-47962788BCCB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3D976D9-62F0-43C3-8359-E51E26B6CD87\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64ADE9AF-196F-4E0B-BC66-7DE0183F9032\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C90CCA48-1705-4564-AAF9-271201BD5113\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B82BAFF-17F5-465C-8032-67D5ECAB2921\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F831371E-7437-48D7-8281-1F406215041B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC4F06B5-615A-464A-A0C4-7AABEE8530CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92AF503A-A2B1-4FC3-858B-264049ADF0F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E702C7EC-B1D9-4BDF-B334-2004CD76B52B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E39F31D6-DC4B-46FE-BE5D-EA612D915A96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51CB8036-5F36-4CD4-9B3E-D2401F2E64F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9849BA3-3990-4E30-B99B-ADD043314CDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0A22E92-1EA7-45D9-AC86-EC3D9664C294\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7FA2911-6561-47BF-BEE8-DDA31642C346\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F829DED-4D92-401A-BD80-C070DE57FC7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F560575C-FD8E-485D-B50A-572604BBE903\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A38D00A-B9DC-44DF-8247-70355FF9A6EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"381EFC43-D5D9-4D10-90BE-4C333A9BA074\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBEDED18-2755-4C55-A1A1-04B4D5F40276\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F04B57EC-0731-40C8-939F-1C686A65A0FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE1D28F9-B135-441B-A9BF-792DD356E374\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D01CE3E-5C89-4FC0-9097-CAC483ACD441\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F52334F-BE6A-4FD4-9F63-AE9BB017115B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"707F6671-57AC-4DF4-8024-444502E5C92E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C1FCE07-F9E8-4B14-95CE-01784D472128\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C208711F-FC06-46C8-8849-27054DC1B264\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25AB8041-F201-4BB3-AAD9-199B06697DF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D75C474C-D5EF-42D6-9B2A-A504BEFCB982\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F566CD3-3649-492B-B0AB-A107E51675B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB9F3D74-AE72-4FC5-83E9-890781AF3093\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C69918C6-7AAD-4AA5-AB72-C275367B1008\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06155B0B-A5AD-4A82-8C02-D264981687A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F76C19A4-FA26-432A-9443-9F92B2A946EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99BEE9BE-E49A-489B-B333-95D0993F8FA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7427A678-EC47-4030-B905-619DD95F5A82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86749716-1C9F-4C2A-B2A7-E62DEC10EA30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD000B53-06DA-4ED4-B0EE-9CB201B75C8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8424463-C329-4BAA-8AA1-25CD8B63292E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52727E62-0048-4C56-BC8C-B3450D257B21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAA34B50-2330-4D77-BF1A-6F05F3EF222C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6421F69-1076-43D2-B273-DE80FB2D5F72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E611EDD-D44C-4311-B681-431D7C574528\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1886D007-85B6-4E5A-968D-A1FD476A08A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDDDCB65-4404-49BC-9515-ECECD58A667F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B8D3E00-64C3-407A-9B00-8B6E383F73FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB1B00A1-9C15-47C2-9F57-66586DEACC7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB5BF932-459F-4DD2-B160-5FE0371C7D83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A58ACE96-F1BE-4261-8F94-FC3C6E7C7561\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"783D6EA7-C016-4314-A87B-4FED1DC7114B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AD0176F-FFAE-4A85-9327-CE72FE059E90\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26D4CE1F-86C8-4E48-9146-9DB57BF540FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB7F9D65-5537-4C25-B02B-2393F60D1299\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F09C8A92-820D-4572-A797-180E17A7DEB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA7D77A2-0D9A-4D0D-B0DC-152757917BE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A07D3F1A-16CE-461F-A2F4-80FE5F841CB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C04557A-C508-4FAD-A535-1C0AEFF08075\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AFAE489-6679-4705-BF9C-BB6D385A1DC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"429A99C8-BC55-4887-893C-7124C1A5DB08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3A2B709-CC19-4116-A5BE-5DB5C8B45A12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F1F1377-6220-43FB-BEF9-BAA7B0158147\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18422CA8-3000-46B1-9065-2369E6B0BE16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D558C66-E80E-4FC7-A0DF-485466390C46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"860F22F6-4C87-47C5-965E-02A1AFF41A72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19A2CA86-BFA8-4C78-987D-AD26F32622F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"425F6D34-EE60-464B-8EA6-8116EDAA1219\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEB9F657-1239-4424-A2E8-F8BD98C0095E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F631403C-0A67-42CB-815C-133EB87E0C95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0453C0EA-BA67-49D5-964F-35493F97D905\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D4D237E-ACB7-4382-AF5B-D27E634BF867\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5461EB2-2958-4923-86AF-C74D449120B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45C22141-E698-4E38-AF50-9CE04C1168FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49D0E470-427D-4A68-AFD2-982A4F7CE2D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"713C4B7A-C38A-4818-A258-D07DEDEC906E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C59740BE-FC30-4400-B978-1DB41282971C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"839728F0-5F23-462F-B493-C37EE4C874F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F1B47DA-BA53-4D7A-9B5B-582238D5E99A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D452F1BF-1FA5-463C-8F13-6357509FB5D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF6D1F4C-B396-468C-BA32-9367A68C95DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B76A812F-D77A-49C8-B7A5-0C08258D4BBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E001AAB-07EC-47BF-BDE9-BB927872781D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1DF11F5-61E8-4A98-86C8-49D6B3224FCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D024802A-EA60-4D9B-B04C-027A0703EABD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA731F3C-1F04-4EE2-83EC-9486F5032903\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"544A59F6-E731-43C8-8455-69256933E71D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"624258EE-7FFF-4432-9B6D-4D60AA73CD9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69A2701A-35A8-4268-B9CF-40BA3219373B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15E671F6-8DED-4735-BE97-58A60E5B5C13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FC68B2A-8570-4311-BB60-49DBBDAF7430\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9826FA02-937E-4323-B9D5-8AE059ADBE95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B8630BB-48AA-4688-A6F0-212C1BB4D14C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"326105AC-3926-437E-8AFF-916960107050\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"866E1275-7541-4B80-8FDF-53246A204C15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E190929D-D3CC-46E1-A903-0848829061DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81E4EBCB-B660-4F6A-AD73-81B9D8964162\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55D58CC5-CB46-464D-93B8-6AD5A19AF097\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16541D3E-EBBD-4D92-96D8-F169733377AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F08D257-F570-4D39-A6E8-0F60E55472E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C20ED667-2BFB-41C7-82BA-9F0C0044DA08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6158ED8A-007E-48B7-99BF-8BA03BF584BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBA7096A-F321-49A0-911A-F9683ABE6E6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A471395-7F8F-4BA5-962D-4D8F271FAB47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9484380-92B9-44DB-8E20-DC8DE02D1CA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8010808D-805D-4CA3-9EA2-55EB1E57964C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9716FE9F-A056-42A3-A241-F2FE37A6386A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F73422A3-ECA0-4C41-9AA5-CF7D77885CF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A96A5AF-C9EF-4DED-AE25-4540A2B02915\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5115B12-053A-4866-A833-D6EC88D8F93E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5619D4D-9685-4595-8A5F-A18273FE4213\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B77E00E7-0EA4-4E32-A693-0E0F66BA4C57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAA3457E-7E1A-4878-9752-79382E954A66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68630C63-4457-4E12-B7BD-AD456B237FC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6FB5695-2950-4CEC-81B4-FD280F835330\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F340AF8-508F-449D-9AFA-4E55F069B4F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E944410E-D674-4141-B50C-9F55090325FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6438E07-0AC0-4BF9-B0F2-9072CA9639D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5079AA70-C864-4AE2-809C-52B50632F2B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A86291B-C986-4320-BCEF-9F5AD8B309D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1227659F-1393-4189-978B-CC3DC53BF407\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C2DB843-638F-41EF-B486-409318AA2DE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0004D8A-A186-4DA2-A7AB-18A6456438FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75B6BE9F-F113-4976-951D-53F2E183A95A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEB005F1-9719-4985-B9D9-2140C962ADD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A94D0C1B-F30F-4724-915E-192C53FAE58A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F247860-1D2C-415C-AFBD-26BD875AAF02\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9697EDCD-A742-4AC6-876E-1080AD684207\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E73924A-875B-44D0-8F7C-A822B0488126\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03751B92-EE07-4F16-A476-BD25561810BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3A630E1-6CAE-4809-AB18-5002F158AE90\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A67750FF-EF4B-414F-8ED4-299CAF33B0DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A82D885-82F5-4755-BC11-5899E28CEE42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88AF1366-8A14-4741-8146-886C31D8D347\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FD75301-E29C-47DC-B53F-DC44EA0C1885\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C944024-BEAA-43AF-A339-FD69C75E8240\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"435C69D1-3932-4379-8D18-B1E12D558325\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3572B700-73C0-41D1-95FD-FE9D5B0C1F80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97A40DC9-0D4E-4C91-8D1B-3CED95B3952E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16FB3E4B-05F8-411A-8C86-4ACE03815553\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E55EBC1-6F96-47CD-9503-7855EFB07240\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4208DBA1-7F85-4876-9B6C-D1B43EAAB2AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5ADC8E5-1CE7-4481-A9B5-61BFC6B4FF50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1789924-FADB-4076-8874-120B29EE6B86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC246667-2F6F-4024-9EAA-2CE3018235C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B21BA7F8-D4B5-4E6B-8FCE-04BBD3501AA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1341A5D4-A5CE-4D31-A178-01C3069D7A55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86A5C199-92E5-435C-AC40-175849285104\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67589F54-0A54-4DE7-9A47-A73DD05F7965\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDC34C8E-1BB9-43CC-9D89-9E6DC435B7EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BE5163E-9BCF-4BF8-BCB9-B48C4E7E1564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92C5DC8C-3318-440B-8B29-4827F343927B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ECC47D8-F602-4CEA-B19A-209CE76C9D36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7514ADD3-DECC-4CC2-9421-A609E526FDC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6ED2EC97-8B2D-47A9-8EC7-D1E0ACBB6C52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"691097C3-F91B-499B-BAEB-4E7E9C43B517\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B3DB1ED-017B-43EF-92A3-A8A88669FBC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19A49AAF-0F08-4151-8F74-4EF9C3415B00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F7A2018-BB4D-4DC1-813D-A4AA3F270893\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A95D91C4-C539-4458-A6C9-8AE17207AE30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37F9D218-8198-42C7-88FE-7C5382138324\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF8FDD81-95EE-4241-93C8-925085A4CE7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"614D9E35-10E0-4CCB-B817-C7C8C3947BE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F75F987E-F4DB-46FF-B048-21B4A4C07B10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05376F2C-30B6-406D-90F7-6C2E00E85171\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCDD3DF6-24BF-4C13-8F07-AF07327E5622\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1520A64-2157-45D7-A135-F900798C4EB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05A30F85-5367-4369-B7A5-176D71279FC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8803FF9-48D7-4AB0-8A17-4590CABD0BFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DC63B6B-5D6D-477B-9125-007F835981B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF385AC9-963E-4670-95A6-BE1EBC3890B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"943FA088-2902-45A9-A1BA-D612B46A50D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C80902D-9A6C-47D4-B56F-35C378FC0E63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1100B46C-8485-4048-BFF8-2BAB311EC04A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B9E1646-E154-41BA-B9FA-0839A898023D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03F4C8E6-0043-41A8-94EA-EEBAA1A081E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31C10985-CBF7-4717-A7D6-2594887D7CB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C49886C-B6A0-4D95-8533-329FE5A66F6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0788CF23-3FAF-44C9-9AAA-96E4818A1AEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24AF7001-64D1-4BFB-9280-0BA0FAD97A0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C6E420E-16DA-4FB1-9968-C93E229614FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07469E04-B3D2-41FE-A2E4-E25A977026CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60FF402E-5E4F-414A-A3AB-149548303616\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79E2B875-A270-45C0-A1B1-041264E5B290\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C828C8C-7ECB-4167-87A9-0F522C400C66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C2C887F-1EF7-468A-A6AE-440793C78DAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F2F3D7F-D884-4ACD-A103-060F57A9867B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD1FCAAD-7072-45EC-9ACB-08556458BAF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4446224-40E8-4AD0-8197-921D3473E19B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EA159D9-8C7F-4BE5-9093-A21C7D00F7EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B92B68FD-771A-4401-8B1D-B1A252356F62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B933941-0BE3-4EEB-8FDD-2DAA63343EE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D060EF0-B29C-4B54-86A0-FD5CFF7B80BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36F737C1-6011-42D2-9690-CA81EA0A283C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19CA7EB6-D1C9-48D9-A69A-2618800A6CE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CA1F3E5-ED7F-4E4C-AD0D-0EEC542A9E51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED6E3C9B-A661-4B37-B76D-A3F7BD638D4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56C909B0-8FB2-4220-AF93-EECB8D650CC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF36BAD0-A762-4F84-BE0B-060FE666ED67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"007337CD-94FB-4ED9-B4A3-9E0EC52D79B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCDFA137-F1FC-46BD-9872-D62671B1434D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E6DBCB3-E912-43A1-914B-5C7CCFAADE25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FCF36E2-0B42-4F23-97D6-9E79ECCA8FAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2C67312-E128-4833-A91E-D7A9F96A7AD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F19F408-FABD-4A68-8CDC-C763F0321FB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68A06EC2-E491-4CD5-9904-61A88EBB7FD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"789A8CAE-8D9E-4244-880D-FBE28EC53AED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F901EE11-D0C9-46F6-8316-D8F4F1D50260\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E549F600-B9CE-4843-A772-2DACC528903E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F28E733-87ED-4610-A8EE-BD37BED7685B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DB488DD-D97C-4E21-A055-E6CECBBBC34E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DC12C97-9966-40E2-8B23-B4453EC9EA6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2832E8BF-7AC7-444C-B297-66F770860571\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44AA72FB-E78D-419E-AA82-B0538C6504D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"687C3BF3-D71A-49AD-8A05-EAC07CBCD949\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90AF90D9-16C4-4F8A-9868-3E2823E3445C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C063C53-8970-45B1-85F8-FB2080BF4695\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64596ED7-794A-4D23-987B-D9AD59D48EA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FDA48F0-0F35-4A8F-8117-B0B28E00AB95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A561A8E8-79E2-4071-B57D-590C22EF86A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92E46658-60AB-4758-9236-3AC0E6464383\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"207B8FBA-E2FF-485A-9AD9-E604AE0FB903\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33F99640-C753-40BE-A0A1-4C2D92E7DB09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA1EC6D3-01CD-4CAB-817D-AE2E72FD0D03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F98247B-1839-4676-855B-827A4B6C016B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDBA35BD-1048-4B6E-96B2-1CFF615EB49A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6CEEEE2-D6A2-4342-8A73-934093948824\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"979FEE9F-A957-43B6-BB6D-1A851D6FA11C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A7AF59D-D05E-47F9-B493-B5CD6781FDDD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EF7EC93-0170-45A9-86C7-5460320B2AE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8A7B1C2-D2CE-485A-9376-27E14F3FA05A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5F803AC-DCC7-43FC-BEB3-AA7984E0506C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"560993AA-299D-42B7-B77F-1BD0D2114CCB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C582B1C-1DAC-48FD-82DD-7334C10A2175\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7862B0C-2C44-4110-A62A-083116129612\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"048C5996-F719-4338-B148-0DD1C13E02FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0196DA2F-CFA7-44D0-BDF5-37C7403E3B9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B9FF7FB-AB5A-4549-8C15-E69458C649E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CEF6608-B650-4C77-9823-0AD57B3484F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BE6A2D7-901C-45F9-B487-D674047D522E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCFCAC5E-6CF1-4EC1-A24C-688DD1016A96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1ADCB509-5B0E-4592-8B23-EC25A3F79D41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB51691F-089F-4016-B25E-238074B06C0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBAAC728-6A0F-4675-9677-AAF7DD5D38ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC7E1AFD-9BCE-4487-A8DE-F9C60529CA7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EA37503-FD3D-4220-933C-234631D6EDEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72992831-2A76-456B-A80C-944BDD8591E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A79C2131-5566-4CC2-B6ED-38E3F6964500\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60BFDAA6-3DFC-4908-BC33-B05BAB462F94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6266056-770A-4E2D-A4FC-F1475257648E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"929AA8F3-8BDF-4614-9806-6D4231735616\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"605D7552-8184-4B11-96FD-FE501A6C97DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3144BBDE-CC96-4408-AA02-ECC3BF902A34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B8BA77A-34E3-4B9E-822A-7B7A90D35790\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7165B43-ED22-4714-8FA4-1E201D1BFA69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67CFB133-FAF0-431A-9765-8A9738D6D87C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2975B0F2-DB7C-4257-985A-482ED2725883\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70221E07-3C2E-4A82-8259-AD583EB5CDDD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"427DFD78-56CD-43C4-948E-F53AF9D669F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75AD7649-3FEA-4971-9886-6C9312B937A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4EE972C-6BAE-4342-BA01-1D685487F9C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27CDFE3B-C064-49A9-BD43-3F7612257A74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BD0EEC1-D695-41A5-8CD6-9E987A547CC4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DBF25B8-D474-4C6B-8E45-F57DDC7074E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DF18FD1-6670-4C3C-8000-A079C69D575E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D760EEAF-5CF5-4F25-8FA2-D4F75F4F5A91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"921EB5A5-F911-4FCE-A6F1-C66818B34678\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13878C13-1C7C-4B83-AF27-4998E8F659DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"023063E1-2DD7-487C-A8A7-939FAEE666A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77255CE6-D7B7-4B48-993C-7100A1170BC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B40AC368-3A14-4EFF-A8D0-7EFB4C83045D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C07E80D5-70A5-49C9-9044-D683C7ECCFF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63668AF4-F29C-4424-8EC5-2F0A5950DD58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E86616FE-0C3F-4984-A364-8A6A9F01DAD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09C1C7CD-538D-4D7A-A81C-10DF5376A479\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5922F749-2B23-44B8-8A46-F31BCAEAD279\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C48BBAF-6B27-43D6-B86B-40CD8E7BA056\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D75D0EEB-707C-4C86-A569-E91E9F00BA77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0FB0E20-0243-40A1-8DEF-37150791222E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68CFF26D-8AD3-4179-9E4C-F06D7C858C9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7541572C-229F-4963-B7F0-06EB3323E53B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85DE669C-27FD-4196-8B8C-1DA4EE4C1D6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"479F7C77-D16F-4E40-9026-3EB8422E0401\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A242AC2-9AA6-43FD-90F4-5BF6E80DBB5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04DB08C8-0018-4A8E-A206-097BDDF83B08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7193E85-30BE-42D5-A26B-3F88817F3574\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"446E8515-45FC-4B8B-8D12-60643D64C07F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBBDF6B2-D388-4639-87D8-064AA3F6B6FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00AAB8B6-B614-4EAA-BA90-C5326CB5D07A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A371DF9-E224-404F-99C2-C2A4607E62D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F40E356-365D-44B7-8C38-A0C89DDD6D3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3132029-89F8-4359-A0DC-A275785266A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B02F5685-0636-48AB-B222-434CA1F3B336\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E51FDD60-88E5-4A86-BB8E-4C2D7EDEFA03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3ED4693C-DECF-4434-90C0-56158F102E7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB408A6B-0842-43DA-9180-B0A299FCBCE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6215EBAC-7C75-4647-9970-482120897F1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B1BD2B6-1AF6-4AD4-94FA-94B453A21908\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D1FD6E8-80EC-461F-9ED1-CE5912399E80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E96F585E-BDEF-45EE-B0AB-94FE23753AC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3279C067-3058-4D46-A739-05404FD0E9B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB4DF0A7-8BC2-48AE-9036-FED6EEC57DF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0855225-F501-486A-BD03-2A86FD252B5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"214C7B0C-C438-4000-9F9B-6D83294243AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C91AA2E-4BB2-49C8-9364-4E363DF42CB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA26781F-5A1C-4DA5-835E-D984D697F22B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EEA4222-F25D-4457-80AA-6D05CA918D68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F3E60D1-5CF9-4F96-9EDB-D87F8CF57272\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4D321BC-6B1D-4C71-8E16-5A1319CEFD6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6777AC35-9D1F-4153-94AC-B25627D730E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5F063F4-8994-4E46-BA7B-A12A112009BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D6F2DE5-AF11-439A-8D37-30CB882ECD58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E213DD86-5419-42C8-BF38-7795DDB3C582\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A972291E-5231-439D-873B-2F87BCAF800A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C089CC54-3229-43D7-AA15-73CFA1A43EE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF268D83-C15D-4559-A46F-844E1D9264F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFE97C0D-3EA1-4314-A74A-7845C7778FB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34293F29-F327-4ADD-BF62-78F63F79BB96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"528C0A46-1CC4-4882-985A-0BB41525BC6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"643F3522-A452-4927-944D-532574EC4243\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58F40B78-4DBA-44EE-8420-086789EFF53D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"423BFD8F-4B50-43DA-9979-75FD18FBC953\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BAD4A68-0481-476F-BBBD-3D515331368C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"838CEB7C-7C4C-416C-86CE-6E8DD47EF25B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC7D021F-3C97-45B3-B1F7-0AC26959F22B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A31AEF3-448D-417B-9589-4BA0A06F2FE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7A1D96F-7FFD-413F-ABCE-4530C3D63040\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDB2B08B-D3C7-4B82-B170-471D6CDEFAE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B8343FE-1320-40AE-A37F-70EF1A4AC4B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD42BA5A-7DA0-409D-8685-E43CF9B61D9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5FF80E9-CF28-4EF6-9CFE-4B500A434674\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7896A6C6-5918-4C27-85AF-6FEEFC7F8FD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"647B77A4-2F49-4989-AF43-961D69037370\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"805B1E33-F279-4303-9DF3-C81039A40C1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B971EA9E-AE5C-4A1D-AD55-8241F7B38C9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE7E0AAE-6539-4024-9055-BE0BAD702143\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F1A8828-0765-4799-AD6C-143F45FAAD23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12D34618-1CCA-405B-A49C-EB384A09C2C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"575D6061-66BC-4862-BC84-ECD82D436E2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56B6EE64-1AD4-46B2-BA65-BB6282E56EB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11650B45-0BDA-42BF-AEF3-83B48DD6A71D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD3C92BA-827B-48AF-BBB3-FB60A9053C22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC097E24-F6C9-40D9-95E9-7EFDFA61AFF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EB44CA7-DFE6-4B1A-9A63-97AE30017E49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B305EFA-6226-412C-90EE-F0691F2DDDE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F3874FA-63CB-4B5D-8B64-CE920320A4E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0800ED17-50E4-43F3-B46C-591DFA818BA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A46B0405-F301-4209-8766-6E12EAFAD157\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F99F9F1F-A967-4884-96CF-4488102DC0A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA9B37AD-4599-425B-B39F-E571F4975266\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5A5F1CF-A1E6-45F1-8B09-36566778DB57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"698C8A49-888B-4675-B3B0-25EDE2FD515E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70D98F97-8EF4-48B5-84BE-C3CC27031FDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B473D1FA-909B-492E-9C5B-94B0E20E1C0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFD5EA7E-322E-4CE6-89D4-7DB1055C9034\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67836379-4E1A-45CD-9506-7D3F612E47C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B1BBC61-8664-4452-93A7-DDB4D2E4C802\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4F1B50C-FC5F-47F4-87BC-60E1BD3DD1F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"044F0375-DF2F-4D9B-AD7E-473D34165E8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CEE9B72-5C4C-40C0-A8A7-9DF11655DA43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A0655CA-A88C-4632-9A18-560E3F63B2F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C1454DD-DA51-4CBC-8BB2-09D5AB5777DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6965851-3B29-4C21-9556-97FD731EAA85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52984FD2-44E0-4E91-B290-0376737EEF6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C5D92E2-E718-4247-BA5D-DFE86C0F6AAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF933366-7503-4F8D-B7AA-F6A16210EC37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E2DAF5D-5BB7-49C6-8426-8B547505B6FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EABB21D-D021-434B-B147-CAF687097A5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7609424D-95F1-4493-A20C-B1BA4EC6439D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"966DC636-C802-4D9F-8162-652AFB931203\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A75794EB-A5AF-43F0-985F-D9E36F04C6D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31C2CFF0-98FD-4A0D-8949-D554B2FE53D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05F9217F-5028-4659-AA8E-F60548DE4D52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AC769DC-CF2E-4A3C-A610-264F024E6279\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B2B1CBF-D155-49BC-81A4-4172F177A5C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"370B2B32-519E-4373-8A04-5C5025D688BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83D9B562-C279-4A55-A347-F28FC4F9CD12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A8C2BA0-48A8-4107-8681-A7C34C553D8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1B009DE-A82F-4569-9B42-EC1EC4DA8A40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"683B6E83-37FF-4F9B-915F-059EBB29DB53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E218718F-4BE6-48B0-A204-9DD4A932A654\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB0AB327-B60A-473C-9D36-97766EE62D7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DA249EE-4786-4E27-8787-5E8B88C2AEB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEBD0529-1CF3-44E5-85B3-19A3323C9493\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D664EE97-07EC-410F-94C3-AEAB2C6A627D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D31DB981-03B1-4A84-8D87-CD407C3C149F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CBD155D-89D9-4677-A621-4D7613BE65C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D02BD0D4-FFFD-4355-97D8-170362F10B9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6635781A-2651-4EF2-A5AC-AEEEE63FDE6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DCE6930-760A-48C0-B964-1E3ED6A8517C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E52DE90-DF96-4CE7-B8D1-226BA50E4D09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8EB40E7-9B91-4106-B303-2B70AF395BFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EAB0D5CD-8AF3-409D-96A7-718641D4B90D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E420B0B-0CD5-41C7-B25A-3DB856055F9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B0C295B-0D63-4BE7-830D-D927E00C301C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"605C340D-2220-4669-B827-9009CB099E8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8791879D-2908-4F57-8DB3-6D24100A9108\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEBEDBBA-0427-4DE0-BA8D-737DE7DF80E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E823DC5B-98BE-4656-BFBF-3A7018F8F213\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64E8D558-ADE0-4358-9C76-7BD77BF23AA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7973B3D0-F244-4E26-88F5-A2D9BF2E4503\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68E6BAB9-CBA4-4362-BC82-00D2C5CC6FB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD3F4BFF-3CBE-4E4B-8B29-B203F99CFD8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F5CB567-4F86-4466-BE4D-BFF557ACAE0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A52611B-6583-4660-90D7-C9472728072B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E80C6E89-B57C-47BB-8B95-50C03DFB3B96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9AB685B-FEE1-41EF-A046-1B34619E12A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB9F6724-967A-4AF0-9896-12BF6164B2CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC1116BF-12D7-47CC-98DB-18B200CF9C16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FBB28DE-726B-4AF0-88A5-35987E1E648B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EA1DB22-8FBF-4CF6-AA96-5B68EE28877D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1880E2B8-5E0E-4603-8D17-3ABA43D28179\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FAFBB92-1917-4238-832B-195FBE418271\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91DFDF3F-9A3F-42B8-99A1-A3F76B198358\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8778F972-BF34-482F-9FA7-71A77F6138E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F288BB0-FE7A-4900-B227-BE80E4F4AADF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A8DC53A-90C6-47FE-89F1-A1FE8B1C07A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E16338-A094-4CA9-B77F-6FE42D3B422C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E07AB33-5351-487D-9602-495489C7C0B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22115ED6-1707-4840-B0D1-AD36BC0C75A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7C633BC-831F-4CB7-9D62-16693444B216\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CF5EE7E-F41B-44EC-9F69-7963B1BF1FB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DD501E1-E78F-44C6-8A13-C29337B07EBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9085BA0B-B7E2-4908-90C0-B4183891C718\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2267CB8-0EE9-4DBD-AD5F-8A13BB62673C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81971C2F-137A-4F11-8C93-3B99D4CD1B58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98E0BDAC-398E-406B-B2DB-AE049D6E98B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCB66D7E-B465-4A8B-8CBD-7E93CCA2CD6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86AFDE6C-DE58-4C4D-882E-474EF6C3D934\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"950C6BF9-AA47-4287-AC01-D183237490FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2355181D-D8EE-4F80-8280-13D5CBCF4779\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5209343F-66B0-4DC0-9111-E2E64CFF7409\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"720109A6-B79E-48E1-9AE7-7708B154788E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82FF0DBD-AE13-4232-80F7-F4C2E2CC9721\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5E944ED-8C02-46B8-BF95-0CE4C352753B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77AEA3D1-4846-46E2-9B80-20B19F00DC11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1576978F-E93D-4A47-90B6-6A4E3A7DE558\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D339FE5-001F-4005-88A5-CFFE37F9B63E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BDABA86-497E-497E-A5BA-46F913A4840A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD886F4C-DB6F-4DDD-9807-8BCBB625C226\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E16912A-7F6A-4A2B-B70F-D1FCD34BC7DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4C454B7-E5F4-4AAE-B577-FD71FA002C8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38BE2781-3A06-4D62-AC8B-68B721DA526B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9AE4EA5-B8C8-4AE2-9614-F9DBDB4D79DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DA23772-2EB8-4BEE-8703-26D967EC4503\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72DC766A-B1F9-4B83-9F9B-CF603EE476BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA594740-43C5-4F42-BA5B-00CA8AE7BB60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"572B16E2-8118-43A0-9A80-5D96831D55FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FB5C551-BADC-4A3A-93E5-2EBCA0704C51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5383B7A3-1569-4FEB-B299-B87CE8C8A87B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A05BBDE0-6C47-4489-9455-7DA7D230ECA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1789AA69-EA31-44D1-82E6-228E48E18586\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4A7D5FF-3B1F-4C64-BB81-7A349765520D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D93A92E9-C8D2-4F6E-A5CA-E8AFFEEC7E13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F0498B3-393A-4C32-B338-E6014B956755\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C451F752-6869-4AFA-BAE5-5C9A54427BF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83710FD1-099B-436D-9640-061D515E10BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"517B71CE-6156-40E1-B068-A2B733E205E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11DEEEE5-5055-4CE1-962C-C5F075F4CC02\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8718DDAB-3208-48CF-9BCE-54DA1257C16A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE1AA901-E822-4240-9D82-C9311E4F87B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1CDE3DF-8E79-4997-94EB-B517FFCAE55C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12A0DE13-EB0B-493B-BC84-3AEB3D454776\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1727697B-1F59-4E29-B036-C32E9076C523\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E69E827C-C0D0-46C7-913A-1C1E02CEAACE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2528F3F9-34DC-41DA-8926-382CB3EF5560\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E452C262-5A8D-4D97-BC7F-A4F5FF53A659\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D57BF69-D750-4278-98AA-976B0D28E347\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76ADAE30-6CAD-4F5B-B6F7-C18953144C63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A25D792-E21D-43EE-8B9D-67DE066DE5DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C669783-C058-4B4F-BB9A-84B2C4682247\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"159B088B-9A85-4CAA-854A-AA080E528F95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBE74A94-FE8F-4749-A35A-AB7D57E24913\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"990AC341-0E67-4A81-87E9-EE3EFD9E847E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53BC18B0-58F1-4477-9978-CA7383C197FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"474992FB-842D-4661-A565-44AF2CD78693\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"476E1B79-5342-4895-96D7-E97DFC1F5334\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBD318D5-89A6-4E28-939C-C5B61396806B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"981AD3FF-1D14-4ECD-8B6F-BCEB7F2409AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A32C7E89-32ED-4328-9313-FA7D3DDBDC58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2792EED8-2CBD-478E-BC09-05FE830B3147\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97B1AF2F-6E48-4DBD-A60E-3088CA4C3771\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34E1691D-65B3-45E4-A544-8B29E38D569D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E42F2703-B8AB-410E-AF7B-CD0BE777F061\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31244C94-00A3-499C-A91A-1BEF2FB0E6B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"878FF6E8-8A6D-44CE-9DD1-2C912AB8A193\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5078A95B-2BD8-4A37-A356-F53D1A53CB37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BFE67CD-DE53-4C4E-8245-35902AEFA6E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F231D31-3AAD-4C5D-A225-D2DF94486718\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5998DF5D-E785-45EC-B8D0-1F4EC4F96D50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EADFD013-0BFB-427C-98E6-F9E4774DCBC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58620B10-FEA6-456D-B6B5-2745F5DBE82D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8F698B1-D9CF-4FE5-933D-EFCEA3056E3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4858A1F0-97F2-4258-AB98-027BF1EC5117\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C961A8B-EAFD-4F66-9432-BCC0D154ECCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"052DE6CD-A1E7-4E81-B476-66EF451061C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BE1AE1E-6FC0-41D8-857C-C5A99CAF5823\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"751B3AC8-D45E-46B6-83D5-311B693F3C0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9588277A-0B97-4408-9CF7-11271CDAADD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"479FE854-85E5-4ED0-BFAF-2618C9053082\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E048B9BF-77C8-49F7-9F2D-9999F79BA264\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CD16D4D-E816-486D-96F4-5A2BF75B959F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"169C558E-1A83-47D5-A66B-035BD1DD56FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D683E509-3FB2-4175-BCAB-4EB1B5C04958\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FCFA915-5445-4732-9F8F-D7561BA4177F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63A9FD98-C22D-48F6-87A1-60791C818A1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85F99F24-1783-4E6E-BE61-04C2E80356ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74CC7EB9-3F59-4C0A-B3A1-984BCCFB25BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85289E4C-C813-4677-867D-EE8E98F4A1A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27C8150F-BEFA-406D-9F0D-E7CB187E26AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E807F90-819F-4103-B1F7-4CE46971BD63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD93203F-71B9-4F87-B5D8-FD273451C8A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E652C74-C48D-4F29-9E85-09325632443F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99158191-3013-4182-8A53-5DFCA1E2C60A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7E39A3E-7EAE-47C9-930B-58A980B73FC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFDA54BA-C00D-4890-9B7F-328257607B21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F5EFB1E-334C-4B55-8E2E-6AE19B34774D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8260DCA-2F0C-45F7-B35F-D489AF5639F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7778F81B-6D05-4666-B1D4-53DB0EC16858\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DC6706A-61F7-4AA0-B2FF-0FFDF739A644\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EF1B16B-02F2-4ECA-938E-B5CDCFC67816\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C5501D8-1B0D-4F5A-AFD7-C63181D3281F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1751F0CE-A0D3-40E2-8EEC-D31141FE33A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FF9AFA7-BBE8-4229-94CB-5A9596728BA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E23A777F-68A4-4217-A75A-4D8A27E6451A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CA27DFB-CDD1-4F52-86B3-DB2320A9C7B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"392A4337-11F6-4980-A138-4FDBCAD0EBA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2E9BB67-F1FF-4190-889F-78B965CCE934\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4185A70-5D10-448E-A9AB-AA9D5CDF0FF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35607317-0928-4297-A33E-D44BEE1BBEC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D48323B1-7FEB-451F-A064-23E7CE7F6403\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29EF4E8A-EF37-4DCC-B5D4-DA89AF31DD18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5763189-7980-4A72-92C9-1908FE9E15EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C53ACD49-DA21-4DDE-A0AA-FCCD59D29886\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4326D350-EBC2-48E6-A2C6-0499F6826CEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8594E6FE-B6DB-4343-B3DD-AEC19923DAF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BCADA00-E453-414D-9933-FCB43D21BBC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E62212D9-F707-4A8E-AB2A-A3985E7A4049\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"561755A8-8AAD-4F41-8266-747EFDAF2D55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6F4BB0F-DAF4-479B-B78A-7929C151AA1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A207312E-1D35-4464-A111-22C4C793E146\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9B16E32-07D5-445B-BAA5-4E4A0881BFC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CF08F6B-2ECB-414C-82D7-C06085BF8B10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21032BE3-74D8-4C3F-B461-158F475B6853\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F9AC992-59B7-44EE-9FF3-567AC48938AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B44B3BFF-649A-4C1E-9564-EFA007FA2BD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C04EDD71-15B3-4085-828C-BB7A43DBDCC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC1BA7AC-989B-4093-841A-C6D5978BF17F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1874F848-B15B-4369-A164-5FA11D2B9AFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E46F934-9765-43ED-88A7-A4778C99A976\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8D5217E-9520-4FDB-9330-C8DC2CDDAA70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B206674F-1A34-470B-820C-05F9C37792CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63AE2051-9F8E-4477-8E1E-38A1E06AD247\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B39281F-990C-4AA3-9287-CCB5BA7E8AC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EDC0FCF-BD22-42AD-8044-9A64215B91CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E0ED8AA-56D8-4CB6-A765-706BE87C9E30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA890C07-7940-4DF4-96FB-8F71A2EFE5C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E95A34F0-0B74-4031-BC9E-CBC93665BE68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BB22DF7-15CE-4340-A05F-BD39FCA41F50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BA72DC8-2E4E-453A-A3FB-20F31D32B973\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"758E45B6-7C7A-432D-891D-CB99077AE3B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26D7A401-BCE1-4673-93C9-67F009B75A39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E62119B-2A65-4473-B570-F118614B0ED6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E5319E0-909C-4688-AAA6-6A0B5D19FFDF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F83F9F9-D2DB-4D40-AD61-29E66B050B45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91BE6238-312E-4CF7-9E74-48CB5603B0FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33BA1BE0-0A78-4E94-A619-35735C913180\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24CA40FE-80C5-4A20-8219-CEF51F3162FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B10305C5-0C2C-48B7-A0AD-2B24AD722EBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33E8F127-6EAE-4302-BD52-7C3FCCA307D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D675EA9-33E7-45ED-B6A9-7117AD2FEE26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6E468FE-73BE-4B20-B774-58EC7CD20CDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FF6B19B-7D45-44B3-8524-407253B93EEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B803FAD-E54D-49FE-A078-029B8FFBBB98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC511505-ED67-45B4-B76C-56AB750C4408\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A430C232-79EB-4264-AE24-41D4A2A5D990\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A9E3D4B-A3DF-4858-8C64-0316B6E57435\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19108672-E1AA-41CC-B86C-061D3721C8B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"200D36CF-AEDE-4183-8C54-748E6E5A3218\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CF13A44-5163-4282-8EE8-7DC05499B5E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"827C12CE-D87D-489D-ABA7-BE0405EC33D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16AA78F7-520B-4FFC-838C-DC74FEE8E13F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CB2949C-4699-49EF-83EB-31199E0CE2DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66C169DC-EEFE-4DE6-A3D0-65B606527240\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD28227A-8888-43B2-BC41-8D54B49DA58C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7984BAEA-4518-4E17-830E-B34D09648BD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C2214E5-491E-448F-A4B6-A497FB44D722\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AE93013-C262-46A5-8E77-D647881EE632\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85B53CEC-943F-4966-8EC1-CB2C6AD6A15B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEAC04A3-EBE3-406B-B784-A3547162ECE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15720FFE-B2A4-4347-BCD7-DFA6774C0B8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50F46B0E-C746-44B4-B343-E3DCAB4B98DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AE30903-4F75-4D71-A8BB-44D1099E9837\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98311EAA-26C8-4092-8BE5-4E7BEAA68DD4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB8CF348-811C-4342-ACB9-AFCABCC34331\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71998EC5-EC0F-496C-B658-3CD91D824944\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1F19B2A-E7A1-4B97-AC40-02B0D3673555\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB6387C9-C0A8-4B26-BC62-802775CD0AD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFEB0164-77C2-4EC2-92FD-5FCE246119CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDB20210-337C-4220-8CA1-F4B2BC54EBC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F699569F-4F52-4CC0-90D9-CC4CBC32428A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBAED22B-D097-49C4-ADDF-4B3F3E1262D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7756B588-5A63-4508-8BDD-92DB8CB0F4AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"316E26AE-67A5-4E75-8F9B-ECF4A03AED51\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A51E86F5-8F94-4E7C-9A63-DAA3FCBE0438\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"001AB619-157E-40B4-B86C-5DB18245D62F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1221FB4F-488A-4A52-8788-82ECBF92113B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38D51E27-28A3-47A1-9C36-1A223858E352\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"365DF3EF-E7D1-41FC-8382-D3B095542D59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0B2B122-34A9-4534-A996-8FEAACA71A05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C850453B-CDB1-490D-B551-9AC0B27D8A67\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*\", \"matchCriteriaId\": \"CB66DB75-2B16-4EBF-9B93-CE49D8086E41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\", \"matchCriteriaId\": \"815D70A8-47D3-459C-A32C-9FEACA0659D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"588D4F37-0A56-47A4-B710-4D5F3D214FB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9070C9D8-A14A-467F-8253-33B966C16886\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3C19813-E823-456A-B1CE-EC0684CE1953\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD7447BC-F315-4298-A822-549942FC118B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_winac_rtx_\\\\(f\\\\)_firmware:2010:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"7151A19C-0AE5-4F66-9E3D-8BF675A8430C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_winac_rtx_\\\\(f\\\\)_firmware:2010:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEEB72F4-AE57-49DD-8876-1BCA7B805692\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_winac_rtx_\\\\(f\\\\)_firmware:2010:sp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"7929F123-AC76-4F49-940F-558CABC25E75\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_winac_rtx_\\\\(f\\\\)_2010:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6034789-ABD1-4035-8378-F0BA7157B087\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F59A04-14CF-49E2-9973-645477EA09DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9317C01-22AA-452B-BBBF-5FAFFFB8BEA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4534CF9-D9FD-4936-9D8C-077387028A05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D60384BD-284C-4A68-9EEF-0FAFDF0C21F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDA8DD5B-8A34-4CB3-B0FB-F82C73B25007\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"5.1.32\", \"matchCriteriaId\": \"C403C49F-3779-4A7A-8D12-B4A32BFD77CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.2.0\", \"versionEndExcluding\": \"5.2.6\", \"matchCriteriaId\": \"0AEC1DE4-F01C-4D21-8FB6-A0D4460D6CD0\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.\"}, {\"lang\": \"es\", \"value\": \"Los sistemas con microprocesadores con ejecuci\\u00f3n especulativa y predicci\\u00f3n indirecta de ramas podr\\u00edan permitir la revelaci\\u00f3n no autorizada de informaci\\u00f3n al atacante con acceso de usuario local mediante un an\\u00e1lisis de un canal lateral.\"}]",
"id": "CVE-2017-5715",
"lastModified": "2024-11-21T03:28:16.943",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\", \"baseScore\": 5.6, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.1, \"impactScore\": 4.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:M/Au:N/C:P/I:N/A:N\", \"baseScore\": 1.9, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.4, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-01-04T13:29:00.227",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4609\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4611\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4613\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4614\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/584653\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/102376\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1040071\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://xenbits.xen.org/xsa/advisory-254.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:0292\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/security/vulnerabilities/speculativeexecution\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cert.vde.com/en-us/advisories/vde-2018-002\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cert.vde.com/en-us/advisories/vde-2018-003\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html\", \"source\": \"secure@intel.com\"}, {\"url\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002\", \"source\": \"secure@intel.com\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"Vendor Advisory\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jun/36\", \"source\": \"secure@intel.com\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Nov/16\", \"source\": \"secure@intel.com\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr\", \"source\": \"secure@intel.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201810-06\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180104-0001/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.paloaltonetworks.com/CVE-2017-5715\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://spectreattack.com/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.citrix.com/article/CTX231399\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.f5.com/csp/article/K91229003\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.lenovo.com/us/en/solutions/LEN-18282\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3531-1/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3531-3/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3540-2/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3541-2/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3542-2/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3549-1/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3560-1/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3561-1/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3580-1/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3581-1/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3581-2/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3582-1/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3582-2/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3594-1/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3597-1/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3597-2/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3620-2/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3690-1/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3777-3/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/usn/usn-3516-1/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4120\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4187\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4188\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4213\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.exploit-db.com/exploits/43427/\", \"source\": \"secure@intel.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/180049\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.synology.com/support/security/Synology_SA_18_01\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.vmware.com/security/advisories/VMSA-2018-0007.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4609\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4611\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4613\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4614\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/584653\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/102376\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1040071\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://xenbits.xen.org/xsa/advisory-254.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:0292\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/security/vulnerabilities/speculativeexecution\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cert.vde.com/en-us/advisories/vde-2018-002\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cert.vde.com/en-us/advisories/vde-2018-003\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"Vendor Advisory\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jun/36\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Nov/16\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201810-06\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180104-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.paloaltonetworks.com/CVE-2017-5715\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://spectreattack.com/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.citrix.com/article/CTX231399\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.f5.com/csp/article/K91229003\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.lenovo.com/us/en/solutions/LEN-18282\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3531-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3531-3/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3540-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3541-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3542-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3549-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3560-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3561-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3580-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3581-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3581-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3582-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3582-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3594-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3597-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3597-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3620-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3690-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3777-3/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/usn/usn-3516-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4120\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4187\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4188\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4213\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.exploit-db.com/exploits/43427/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/180049\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.synology.com/support/security/Synology_SA_18_01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.vmware.com/security/advisories/VMSA-2018-0007.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-203\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-5715\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2018-01-04T13:29:00.227\",\"lastModified\":\"2025-05-06T15:15:51.640\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.\"},{\"lang\":\"es\",\"value\":\"Los sistemas con microprocesadores con ejecuci\u00f3n especulativa y predicci\u00f3n indirecta de ramas podr\u00edan permitir la revelaci\u00f3n no autorizada de informaci\u00f3n al atacante con acceso de usuario local mediante un an\u00e1lisis de un canal lateral.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":5.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.1,\"impactScore\":4.0},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":5.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.1,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":1.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-203\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-203\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD028C10-FD07-4206-A732-CCAC1B6D043D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704FAA50-1B7D-4917-AC4A-4C58785340F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6B95D3-75BD-4826-BFBE-9701CC0FF052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F66E31A6-EA01-40C8-8718-CE2C1F45EEB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBBE3B05-2063-49DE-A1D3-9D0A62E0CF5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"022F2CBE-EFB1-4962-AC91-D25AAB057DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C05CD9-551B-46EE-85F8-D18FF878FE8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DCCB5A5-20E3-4EC5-956C-EA7C0F33A026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C38C609-242E-4923-A81F-DAFBE7B6A927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AEB08B5-7CBA-479A-A41B-FD8A6D9E0875\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C4FDD7-F2EC-4EDB-ACC9-3D6B9152C855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E51DD0B-1EED-4BE9-B0A7-BE2E91CCA84C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7AC7C56-2205-4121-99E2-001A7488E0FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1677313-FF8F-493B-9DA3-C78F87581A17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B2A3CCE-FA57-43B5-B7DE-CFD0CC2ECD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85CA4444-5103-4451-8A7C-F6BBE714BBB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA1EB745-46D7-4088-93C6-E7156520B144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A93010C0-33B3-438F-94F6-8DA7A9D7B451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A988A78-6B3D-4599-A85C-42B4A294D86D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"246AA1B0-B6C8-406B-817D-26113DC63858\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EE5B42-FF05-447C-BACC-0E650E773E49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1F0E3C4-7E9B-435F-907E-4BF4F12AF314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D616C72-0863-478C-9E87-3963C83B87E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC333B0D-3A0E-4629-8016-68C060343874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6655535C-FF64-4F9E-8168-253AABCC4F5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBD68F3F-7E38-40B9-A20B-B9BB45E8D042\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EACEF19-83BC-4579-9274-BE367F914432\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24128A7F-2B0B-4923-BA9E-9F5093D29423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0990DD71-9E83-499D-9DAF-A466CF896CFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B7FEDEF-9772-4FB1-9261-020487A795AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE7B0F72-DEDF-40C4-887C-83725C52C92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9568C222-9816-4520-B01C-C1DC2A79002D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B2F8FAD-1688-4369-BB4B-9FA9F30A80A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53A1F23D-7226-4479-B51F-36376CC80B04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAB245C8-9918-41A0-9DFB-A11E4185C87A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9990DD08-BD81-4BFA-B3D4-0DECBF8CCC54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F752A3C8-18ED-4765-B6EC-C664154EB701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4F31C3F-7C0D-4D95-B4B9-89FD38076913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BEEE36E-E735-4A33-80B7-9407D072F6BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CB3D3DE-21BE-40C7-A510-AC97C92390DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9A9545-38A3-460D-AB1A-8B03BEB405A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1860D932-777D-41F2-94A2-D14AB1494AA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75165A10-2FD5-4370-814C-B60FDE339AFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454AC633-5F1C-47BB-8FA7-91A5C29A1DD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2394E8C-58D9-480B-87A7-A41CD7697FC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B9AC02B-D3AE-4FAF-836E-55515186A462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65AAC7A7-77CA-4C6C-BD96-92A253512F09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCD16C07-0050-495A-8722-7AC46F5920F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01423706-C82C-4457-9638-1A2380DE3826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A881E2D3-A668-465F-862B-F8C145BD5E8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E5B9B98-0EF0-4ACD-B378-F9DE5AB36CBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BDC6806-E4FC-4A6E-A6BB-88C18E47ABFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6602DD69-E59A-417D-B19F-CA16B01E652C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05C493EE-EF9F-47E2-8F88-86DF6C5F1FF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40010DAE-DD1A-4A81-B6E9-EDC1B0DDCAB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED96AC16-12CC-43F6-ACC8-009A06CDD8F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CE9DC29-C192-4553-AF29-D39290976F47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F625E647-B47E-404C-9C5B-72F3EB1C46F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3AF3279-89E7-4C91-8C5F-5AD5937CD0C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5878612-9825-4737-85A5-8227BA97CBA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F453D348-28CE-402B-9D40-A29436A24ECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36322F4B-83D7-468A-BB34-1C03729E9BF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD22811-C3C6-4B5E-98D5-D3F2240E6C8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C7D0BA-8F07-42AD-8BB9-C65472BE41C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A2A50E-94FA-44E9-A45D-3016750CFBDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5625CAD8-4A62-4747-B6D9-90E56F09B731\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43A234CE-D6AA-4A32-8425-1A4DDA0F6B6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78DE1A01-3AEF-41E6-97EE-CB93429C4A1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"410184AF-B932-4AC9-984F-73FD58BB4CF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B265F073-9E0A-4CA0-8296-AB52DEB1C323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F664223-1CBC-4D8A-921B-F03AACA6672B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"987A8470-08BA-45DE-8EC0-CD2B4451EECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BBC9542-FB77-4769-BF67-D42829703920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74FDC18B-4662-422E-A86A-48FE821C056F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAB4AA2C-D1D9-44D8-9471-66EBDE9DC66D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBA3E7AE-CB74-48A8-A2B8-9FCADB6E40D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E4461B-72F8-4F3D-A405-4AFA99EC8A32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"663DDC1C-E48A-4E84-A6CC-B46FC45D6A6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CEEC75B-10CE-4B7E-BA5F-6D661EC07FFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAEDED56-9387-4DAC-BF52-C32ECCB7D407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA13F31C-BBD9-48C7-8499-92D0B5CA8CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E57A9B28-734B-401D-B24C-A295F364D8E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F02289DF-4A02-4602-89B7-E9148236EE1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"723E7155-493D-4B5A-99E2-AB261838190E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82E37264-E4BA-4D9D-92E7-56DE6B5F918F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8704BE6D-2857-4328-9298-E0273376F2CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"731F1E65-1D53-443B-8E2F-8AF11191AFA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02A83822-822D-4A4D-B29B-A5BE6367A7DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C32738-F08E-469C-8DE0-2708F30574A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B292187E-8EAD-49D2-B469-B14CA0656035\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7D131E1-24C1-48CF-B3DD-46B09A718FB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ABF1231-73CF-4D1B-860C-E76CD26A645E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7F88E38-4EC4-41DB-A59D-800997440C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32FD6647-4101-4B36-9A9A-F70C29997148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D248D668-A895-43B3-ADEF-1B22EE7DC76E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"858411B5-E904-45FA-8B33-5CC73B915B22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BB9336C-C893-4AB0-9402-868CE9960058\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4695F94-7AAE-4219-9EF6-CE6D0838192D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD7A0991-73F0-410D-855C-BFC88A66E61F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAF5CF9A-B3F2-4686-B933-7DB13AD2CF35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9858EAC3-C1CE-449B-A605-FFA337DA825D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7A8F905-A4C6-4EC6-B9E8-800948350B89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565B48E3-1406-4E3C-B4A5-35865C5614E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46B6C4D7-B0A2-4DF1-B8DE-19C806D5FABB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AB82A90-C0BC-4BA8-88CA-4967BC3A4A7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"191A094B-E354-4767-AD43-87CE140BF851\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1289B9E-5725-42EF-8848-F545421A29E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"238A21CB-F8C5-468B-B523-6D014E2EA8AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC52CDD-614D-4EA0-8DA8-D71189C42E8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4229DB2-8BBC-49F8-87A8-2E7D56EFD310\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0E91F46-D950-4894-BACF-05A70C7C6F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E12B40B-5221-48A6-B2A6-D44CD5636BB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BCB77C9-ABE3-44A0-B377-7D7035E8A11F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D06639F5-5EE8-44F4-B48A-5694383154DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"637C3687-FBCC-41A0-BFE6-823BAE45FB92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2350A197-193F-4B22-80E8-3275C97C78EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"734C7A7E-ACCA-4B34-BF38-0FAED988CC6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D9ABAFC-B3B5-449D-A48E-2E978563EDE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99019EA0-6576-4CE7-B60A-975D418AA917\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E846AEF-751D-40AD-84B5-EFDC9CF23E2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB9DD909-B2AC-46BA-B057-D239D0773CAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54F5C355-FDFC-4E71-93AA-218389EF10E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A1CA1E-971D-4F67-864E-2E772C1E736B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B5F8391-D974-49AC-8550-ADB3FA6C0535\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8302BF58-9E54-40DA-BCFE-59CA52C460D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECCDE9EF-037B-4650-8131-4D57BE141277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB8253DA-9A04-40D6-84C1-C682B4023D4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF6D175-85C3-4C72-AD9F-31B47EF43154\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A5FC594-2092-4240-9538-235BBE236DD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87D95F00-EA89-4FDE-991C-56636B8E0331\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4158561F-8270-42D1-91D8-E063CE7F5505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF0DEA96-0202-41EB-BDC3-24E2FC4415B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8BACE1C-5D66-4FBC-8F86-30215A623A94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF707146-0D64-4F3A-AE22-956EA1CB32B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8118C3F9-0853-4E87-9E65-86E1398B2780\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A298501-C4D7-48D4-90F9-15AFA59DED48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEE1B07B-3D92-4D2D-8667-D902F002277F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F05CB19-1059-4C4D-BFD7-9F51A22A4F97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5588732F-7F1A-4C24-B35F-30532107FFDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A127DD5D-426D-4F24-A8C5-DC9DAC94B91C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26EE0BBD-3982-4B0F-82F6-D58E077C75DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAEEC918-EA25-4B38-B5C3-85899D3EBE6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"813965F4-3BDA-4478-8E6A-0FD52723B764\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C5EA2F4-F3EF-4305-B1A1-92F636ED688F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04384319-EE8C-45B4-8BDD-414502E7C02D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C52528CE-4F31-4E5F-8255-E576B20F3043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6C3F422-F865-4160-AA24-1DAFAE63729C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D034E7F-4D17-49D7-BDB2-90CB4C709B30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C18E6B4-E947-403B-80FB-7095420D482B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2814CC9F-E027-4C5A-93AF-84EA445E6C12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24A470C3-AAAA-4A6E-B738-FEB69DB78B9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1236944-4942-40E4-9BA1-029FEAE94BBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"086CAB4B-A10A-4165-BC33-33CADCD23C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAFB6B30-BFB0-4397-9E16-37D1A772E639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFCB9D7B-7D0A-435D-8499-C16BE09E19FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64277594-9713-436B-8056-542CFA9F4CFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"589BB170-7CBA-4F28-99E3-9242B62E2918\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91B9C4D9-DA09-4377-9DCD-225857BD9FA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D0265F-840B-45A1-90BD-9ED8846A9F63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74BAC0EC-2B38-4553-A399-4BD5483C4753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4477EBA6-F0A7-452B-96E8-BA788370CCA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1285D817-B5B8-4940-925D-FCDD24810AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D289F7B4-27CD-4433-BB45-06AF98A59B7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00168903-6012-4414-87D1-2EE52AA6D78E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AE8D524-577E-4994-8A4B-D15022C84D7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75977B0B-C44D-43BC-8D7A-AF966CDB1901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE7F5D52-9F41-49A4-B941-E0D777203FF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52B5B3FD-5BEA-4DE8-B010-55FED1547167\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"167B1B04-5823-4038-A019-3975A3B447C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BA096E0-5480-47CB-822B-D11D7E20F69F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30357469-0B8F-4385-A282-2F50181EA442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE70772-7796-4594-880A-6AAD046E4D8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A9E2F8D-2974-4833-9EC2-233CEE257C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17EE3078-454F-48F8-B201-3847DB40D5C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE32C500-55C2-41A7-8621-14EBF793BF11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D3DF52-501A-4656-98F1-8DD51D04F31F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09578301-CF39-4C24-951A-535743E277EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A65F303-96C8-4884-8D6F-F439B86BA30C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E046105-9DF5-425F-A97E-16081D54613C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2987BCF-39E6-49B6-8DEE-963A38F12B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AD92AD8-033A-4AAD-91E5-CB446CCE9732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77E0E73A-F1B4-4E70-B9F1-EE97785B8891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D6E3CC-79B1-4995-9A76-41683C7F254A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FE5773D-3CD1-4E63-8983-E0105C46D185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A7C307A-6576-4A0A-8F4E-0981C9EE2901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B3A53B-902C-46A5-8CE7-B55102703278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB843479-729A-4E58-8027-0FC586F051AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AF5A233-1E77-49FD-AC2C-60D185481E28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18519CF2-B0DA-42DD-8A3E-9084298C210A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"329D5FCF-7EC5-4471-906B-3619A180BD52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DD43EAA-F3A5-4748-9187-A6E6707ACD11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6F3C14D-4BFC-4205-8781-95E6B28C83C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20942AD8-ADB7-4A50-BDBE-DB36249F4F52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EC6ED02-134B-4322-AB72-75A0AB22701E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FA74EEE-54CC-4F80-B1D3-99F7771335ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6B859F7-0373-4ADD-92B3-0FAB42FCF23C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAC76F31-00A5-4719-AA50-92F773919B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49996F5A-51B2-4D4E-AE04-E98E093A76CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F8406B0-D1E5-4633-B17E-53DC99FE7622\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D49435C-7C33-454B-9F43-9C10F28A28A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D17E1A0F-1150-4899-81BC-BE84E4EF5FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EADD98AE-BAB0-440D-AB9F-2D76BE5109E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED44A404-8548-4EDC-8928-4094D05A6A38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2AAD8F0-0D31-4806-8A88-A30E5BE43630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8164EE5F-6ABA-4365-8718-2F98C2E57A0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7110AF9-A407-4EE2-9C46-E5F1E3638E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A06696D-37F0-427D-BFC5-1606E7441C31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A76015-0A05-4EC7-B136-DC13B55D881F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54464F6C-9B2D-46BA-AC44-506389F3EE0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FA11017-EA58-45EE-8408-FCCCF7183643\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"442AD778-D56F-4C30-BBF8-749D6AAC4737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF7D3F31-AF4D-4C50-8590-A763AAC7AF07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"445BFC2E-38FA-4130-8550-0866EC4EDA33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6DC2746-CE41-40C9-8CFA-23231BBCAE77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C3A8976-5E4D-490A-A87D-A47D1B2B903C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C8535E6-220E-4747-8992-45B6EAFC555C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7479B49-F484-4DF2-86CB-E52EE89FA238\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6D68512-746D-4E95-857B-13A0B6313C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4312BA84-F9A0-4BD4-8438-058E1E7D6C0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E52DF5-C713-4BC4-B587-FF6BDA8509CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"304ADCAC-9E49-42BD-BC92-58D9B2AD52E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AB02172-B9A7-4801-88F2-98BF5843184A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5141380E-BD18-47C1-A84C-384BA821773D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AE6C49E-2359-4E44-9979-7D34F8460E35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C004B75F-37AF-4E61-98F3-1B09A7062DDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7126D19-C6D9-43CB-8809-647B1A20E7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CC98503-A80A-4114-8BF2-E016659BE84E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3821412D-B010-49C4-A7B4-6C5FB6C603B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD5B51A-AEA0-4DA2-BA60-94A2D5605352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96C6CA0-434D-428F-B629-A971C2937628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"301AB72A-A6F2-42C8-A931-94EF2271443F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59414B5A-05B8-49AF-A197-2A31729DDB65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BFDD380-692F-41D7-996F-F97FC74DC7CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49602828-2BFC-4571-9F05-6210FD263DF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87E03978-E16D-4A9B-8AE7-9F4F1171C14A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03096A9A-5758-47E6-81E2-BCFE847C41F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"150CC865-7975-45EC-BFF7-A94146442BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8FA1308-589B-432B-80F9-9A499D083ED5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED2453E-30E1-4620-BEC5-21B0083449E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FE8DD05-D700-4F89-9B01-D489029DF7A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"050957CA-6191-4F9F-9D07-48B342B3B1B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DACBF998-8B11-45C7-9017-486AED4FAE6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F2F3C4-FC94-414A-A208-913A43D57D75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641152EC-F4B4-4E5E-B396-AC4CAAB805BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4911E332-B8BA-4336-A448-3F70D2BBB147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"330EC403-3174-4543-9BBE-CEC0ABC1575D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EF585D0-507E-491E-9C3B-78EE26F2F070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5D885A-85C4-4A11-B061-61EFF6B6E329\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0502B59F-933C-4E25-A2EC-9296B197E139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99D9C0A9-2DFF-4760-8FED-AC2DA7968E51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A1BAEC-18BF-4607-BFB7-48102E75186A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D49ED138-F42D-4451-A350-0B2DD5AB9444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ED91472-90FC-4AC8-96D5-1550A8502411\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2784E2AF-A5E5-4960-830C-B3EFB84043D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9112FA50-5527-4B20-80F5-2DE9E66D09F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73CE4E2E-B2BF-409E-B18C-D67DA810FE9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2B84D67-0B1D-4B74-BC85-AF8F933D8429\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCA05A18-1523-4EED-9D2E-0A258A33F24F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C34E70EB-92F0-43F6-8883-FE422BE1A3FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78D301F1-20C2-4756-9A90-37F14835CE14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA63B803-4D48-42E8-A793-F92ABCB8BFC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"129DB9CB-E878-4856-A954-15FFE1428636\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"730DB4AA-FD7D-40C6-8D7F-19937832EF9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07E86978-4820-422A-8C7C-FF0697DAED05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF813AD9-D296-4915-861C-8DE929E45FE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04A65469-083F-40B5-86C5-A2EAE5B2F00A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F1AA82E-BD86-40F5-B417-71DF6AF53A37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71A6DB0-5EB0-4712-8480-CF427F521D33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8223D5A1-ADF1-43C6-AF91-EE5C413BCB37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD69605-F52B-4623-921A-983A5A408ECA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D5685F-6FFE-4A6A-9FF8-940C8DA36499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3832D0A6-419D-4876-B5C4-920578F713F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"404E38E6-9EB3-41D0-97A7-DC579688BFB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40E4A921-AB28-47B7-B5A3-EB82193D15BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0357E48-2300-47B4-B9E5-9FE813A2FC09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96CC28B6-57D1-4919-AA55-A262CC16AFE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EB4C54D-1265-425A-B507-E1099844875A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97362147-3A71-430D-9064-4435D45C3B8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89212CF3-4E99-4389-94CE-F4211DDCA01B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"611C0A0A-1FA3-42F9-82E8-BFCB71A077DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36F027D9-DCB4-4A3D-8987-41F2941DBD45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E23BCEC9-2BFB-4B41-9A7A-18B1347C6202\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4924CE39-A846-4DB4-9547-6322FC5AD6B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C9E2C9A-94A1-456B-90D5-54932DF64C22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC04C652-B2D8-4002-A50E-8AFE83204A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D413F0-CDBC-4A63-B9A7-9E7725BA1E83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"754A8826-59F7-4A71-B74B-737BE9C7DE4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FADB6BDA-6825-489B-AB39-7729BA45DFD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7913F57E-E600-4767-AF51-D045E1898E72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3783F4-5A05-45AA-9791-A681011FD78C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01E3114D-31D2-4DBF-A664-F4049D8B6266\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8EE6578-981D-470C-BB24-4960B3CB1478\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE59839-8EB9-47FE-88E2-F0D54BE787A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75694A3D-080A-4AA7-97DF-5A5833C9D9F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E996176-3DEA-46E6-93B7-9C0DF32B59D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4417007D-126A-478B-87EA-039D088A4515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F78C2825-F6A3-4188-9D25-59EAEC8A7B0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF2FA85D-B117-410D-B247-8C5A3479319A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A041D27-132C-4B15-976F-1750C039A89F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D495E06-BF2B-4C5A-881D-94C93CD2BA2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"088BC395-06D5-4156-85EB-63C4A9552898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33A220A2-A6D2-46A7-B168-607400EEDCE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E79232F-7196-440B-82D4-165885251232\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED866954-77AB-4CA8-8AED-4252C595FC4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A1F516-B180-45D4-8EB1-754B7497CB2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36758A04-64D3-4150-A004-CF042FA31CD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E01752E-F1DD-400A-A917-216CAF15B0F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD47EC58-F776-4F59-8F15-4B208904CF4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94565E35-8A58-4CB6-A489-C796DCB97FC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49964D35-5323-4412-BD54-661630F9A8CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0F66468-87D0-41FC-934B-5924BE2956CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C0D99E-443E-4AB1-A07A-900A09FE177E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9DAEE52-09C3-4A09-9958-9D6807B2700B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B97690D4-E814-4D40-B170-BE56D7AE2C1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89804F2C-D32D-4444-ABEA-5B241153D096\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AAAAF9C-B29B-4020-BAFF-C87B1A08294A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C27B318-2AC1-423D-B0C8-583BB1800D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E58E3D0-1154-4B13-BA16-67CE67DF0637\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32D2ACB3-B906-4944-A021-03C4645965BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E1A41BA-A1D6-484A-BAD2-68DF85598354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11260C9D-69A9-4D81-9CCF-2E116DD75F7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C020F06-FD27-46E3-A48F-3F60F33BB969\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03C74F10-6A7F-4F68-8A34-E981E1760DE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24741B98-8D0E-4307-AAEF-A14B2531DCA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D4FA4BA-4304-4A70-9F86-120F2A3D8148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"367FC8BA-F046-4264-A049-49E933E7698F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE9B68D3-1DFB-4468-85C4-AC13E6CBC111\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C966A016-B650-44D9-B8C4-1ED50AB318DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC448FF0-6D3F-4609-864B-4191905EE2B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC246FE-4CA6-4B2D-83C3-D50A386C24A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758A14DB-1BAF-442A-BA7C-5E9C67847BEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61309100-CFA7-4607-A236-8910838AA057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82D76265-7BD0-4C51-AE77-22B22524DE81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE38B195-BB8D-4747-881D-E8033760B4C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AA8BE76-168D-48A3-8DF6-E91F44600408\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B656975-5D71-4712-9820-BDB7BC248AFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA045267-114D-4587-B6D7-E273C28DC9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77018415-E122-406E-896D-1BC6CF790BE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4E1C012-3E05-44DB-B6D2-BFD619C034B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D689D6-8594-42F2-8EEF-DCAEBA885A67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6446000-0494-4DC5-ABAA-F20A44546068\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99B94EEC-6690-45D0-B086-F4A5B25C25CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"832AB3CD-E3A1-4CCB-A210-287973563D0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A26C0CC-68AD-40F5-96B8-87E6C643F6F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C4221A-9994-43B3-9C7A-E13815A50A10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20070B1D-B91C-40BA-A9D8-E80170A2933F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A70129C9-371F-4542-A388-C095869E593A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C4DE25F-168A-4C67-8B66-09F61F072BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58157F24-D89E-4552-8CE6-2F01E98BD1E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45ACBBEA-EC95-4F3E-B585-893DB6D21A0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6A5EC79-1B21-4BB3-8791-73507BC8D4DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0387587-AAB6-4284-8516-4DA3E3582D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A238C975-9196-449F-9C15-ABB2E9FD1D06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F17F4A5-120B-4E00-97C8-8A85841ACBC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2537F047-64C9-4E73-B82C-310253184183\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A55857C-649D-46CE-AEDA-6E553E554FC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BA4892D-AFDF-4441-821E-5EBF7F64C9F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"327E06A3-7F0E-4498-8811-10C8D15398FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1624E6D6-858E-4085-B0B9-362B819EFD88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50D61F4A-40F0-477C-8326-7359D3626E77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1455B4DE-7F1C-4CF2-AE02-2EDD20025D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B215788-860B-46CD-9A08-43AFF98FAEAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4EB132B-000C-4A17-AFB3-19F40A73D2CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C4815AE-B635-4545-83C2-5EC4E0128337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0046C06-E3E6-4674-A4D1-332DD29D9552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C191851-3DC3-41C7-AD89-81F091CCC83A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21126922-8E81-47F4-82D4-CBCDDACEC4FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"209E18B0-BBB5-4C65-B336-44340F7740DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C867C0B8-91A4-482A-B7DD-54AB9599AE52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30F03843-8A51-4CE1-BE6C-994BDE3A8F97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09854948-2657-4261-A32A-0523058F072E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D13904A5-266D-481C-A42A-734C3823A238\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACC82FCB-0541-45C4-8B7E-CB612D7F702A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"501E9355-0CDD-4951-BCC3-47962788BCCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3D976D9-62F0-43C3-8359-E51E26B6CD87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64ADE9AF-196F-4E0B-BC66-7DE0183F9032\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C90CCA48-1705-4564-AAF9-271201BD5113\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B82BAFF-17F5-465C-8032-67D5ECAB2921\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F831371E-7437-48D7-8281-1F406215041B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4F06B5-615A-464A-A0C4-7AABEE8530CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92AF503A-A2B1-4FC3-858B-264049ADF0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E702C7EC-B1D9-4BDF-B334-2004CD76B52B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E39F31D6-DC4B-46FE-BE5D-EA612D915A96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51CB8036-5F36-4CD4-9B3E-D2401F2E64F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9849BA3-3990-4E30-B99B-ADD043314CDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0A22E92-1EA7-45D9-AC86-EC3D9664C294\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7FA2911-6561-47BF-BEE8-DDA31642C346\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F829DED-4D92-401A-BD80-C070DE57FC7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F560575C-FD8E-485D-B50A-572604BBE903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A38D00A-B9DC-44DF-8247-70355FF9A6EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"381EFC43-D5D9-4D10-90BE-4C333A9BA074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBEDED18-2755-4C55-A1A1-04B4D5F40276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F04B57EC-0731-40C8-939F-1C686A65A0FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE1D28F9-B135-441B-A9BF-792DD356E374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D01CE3E-5C89-4FC0-9097-CAC483ACD441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F52334F-BE6A-4FD4-9F63-AE9BB017115B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"707F6671-57AC-4DF4-8024-444502E5C92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C1FCE07-F9E8-4B14-95CE-01784D472128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C208711F-FC06-46C8-8849-27054DC1B264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25AB8041-F201-4BB3-AAD9-199B06697DF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75C474C-D5EF-42D6-9B2A-A504BEFCB982\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F566CD3-3649-492B-B0AB-A107E51675B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB9F3D74-AE72-4FC5-83E9-890781AF3093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C69918C6-7AAD-4AA5-AB72-C275367B1008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06155B0B-A5AD-4A82-8C02-D264981687A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F76C19A4-FA26-432A-9443-9F92B2A946EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99BEE9BE-E49A-489B-B333-95D0993F8FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7427A678-EC47-4030-B905-619DD95F5A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86749716-1C9F-4C2A-B2A7-E62DEC10EA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD000B53-06DA-4ED4-B0EE-9CB201B75C8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8424463-C329-4BAA-8AA1-25CD8B63292E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52727E62-0048-4C56-BC8C-B3450D257B21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAA34B50-2330-4D77-BF1A-6F05F3EF222C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6421F69-1076-43D2-B273-DE80FB2D5F72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E611EDD-D44C-4311-B681-431D7C574528\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1886D007-85B6-4E5A-968D-A1FD476A08A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDDDCB65-4404-49BC-9515-ECECD58A667F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8D3E00-64C3-407A-9B00-8B6E383F73FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB1B00A1-9C15-47C2-9F57-66586DEACC7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB5BF932-459F-4DD2-B160-5FE0371C7D83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A58ACE96-F1BE-4261-8F94-FC3C6E7C7561\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"783D6EA7-C016-4314-A87B-4FED1DC7114B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AD0176F-FFAE-4A85-9327-CE72FE059E90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26D4CE1F-86C8-4E48-9146-9DB57BF540FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB7F9D65-5537-4C25-B02B-2393F60D1299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F09C8A92-820D-4572-A797-180E17A7DEB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7D77A2-0D9A-4D0D-B0DC-152757917BE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07D3F1A-16CE-461F-A2F4-80FE5F841CB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C04557A-C508-4FAD-A535-1C0AEFF08075\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AFAE489-6679-4705-BF9C-BB6D385A1DC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"429A99C8-BC55-4887-893C-7124C1A5DB08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3A2B709-CC19-4116-A5BE-5DB5C8B45A12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1F1377-6220-43FB-BEF9-BAA7B0158147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18422CA8-3000-46B1-9065-2369E6B0BE16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D558C66-E80E-4FC7-A0DF-485466390C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F22F6-4C87-47C5-965E-02A1AFF41A72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A2CA86-BFA8-4C78-987D-AD26F32622F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"425F6D34-EE60-464B-8EA6-8116EDAA1219\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEB9F657-1239-4424-A2E8-F8BD98C0095E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F631403C-0A67-42CB-815C-133EB87E0C95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0453C0EA-BA67-49D5-964F-35493F97D905\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D4D237E-ACB7-4382-AF5B-D27E634BF867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5461EB2-2958-4923-86AF-C74D449120B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C22141-E698-4E38-AF50-9CE04C1168FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49D0E470-427D-4A68-AFD2-982A4F7CE2D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"713C4B7A-C38A-4818-A258-D07DEDEC906E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59740BE-FC30-4400-B978-1DB41282971C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"839728F0-5F23-462F-B493-C37EE4C874F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B47DA-BA53-4D7A-9B5B-582238D5E99A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D452F1BF-1FA5-463C-8F13-6357509FB5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF6D1F4C-B396-468C-BA32-9367A68C95DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76A812F-D77A-49C8-B7A5-0C08258D4BBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E001AAB-07EC-47BF-BDE9-BB927872781D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1DF11F5-61E8-4A98-86C8-49D6B3224FCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D024802A-EA60-4D9B-B04C-027A0703EABD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA731F3C-1F04-4EE2-83EC-9486F5032903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"544A59F6-E731-43C8-8455-69256933E71D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"624258EE-7FFF-4432-9B6D-4D60AA73CD9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69A2701A-35A8-4268-B9CF-40BA3219373B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15E671F6-8DED-4735-BE97-58A60E5B5C13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC68B2A-8570-4311-BB60-49DBBDAF7430\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9826FA02-937E-4323-B9D5-8AE059ADBE95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B8630BB-48AA-4688-A6F0-212C1BB4D14C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"326105AC-3926-437E-8AFF-916960107050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"866E1275-7541-4B80-8FDF-53246A204C15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E190929D-D3CC-46E1-A903-0848829061DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81E4EBCB-B660-4F6A-AD73-81B9D8964162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55D58CC5-CB46-464D-93B8-6AD5A19AF097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16541D3E-EBBD-4D92-96D8-F169733377AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F08D257-F570-4D39-A6E8-0F60E55472E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20ED667-2BFB-41C7-82BA-9F0C0044DA08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6158ED8A-007E-48B7-99BF-8BA03BF584BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBA7096A-F321-49A0-911A-F9683ABE6E6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A471395-7F8F-4BA5-962D-4D8F271FAB47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9484380-92B9-44DB-8E20-DC8DE02D1CA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8010808D-805D-4CA3-9EA2-55EB1E57964C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9716FE9F-A056-42A3-A241-F2FE37A6386A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F73422A3-ECA0-4C41-9AA5-CF7D77885CF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A96A5AF-C9EF-4DED-AE25-4540A2B02915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5115B12-053A-4866-A833-D6EC88D8F93E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5619D4D-9685-4595-8A5F-A18273FE4213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B77E00E7-0EA4-4E32-A693-0E0F66BA4C57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA3457E-7E1A-4878-9752-79382E954A66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68630C63-4457-4E12-B7BD-AD456B237FC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6FB5695-2950-4CEC-81B4-FD280F835330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F340AF8-508F-449D-9AFA-4E55F069B4F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E944410E-D674-4141-B50C-9F55090325FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6438E07-0AC0-4BF9-B0F2-9072CA9639D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5079AA70-C864-4AE2-809C-52B50632F2B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A86291B-C986-4320-BCEF-9F5AD8B309D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1227659F-1393-4189-978B-CC3DC53BF407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C2DB843-638F-41EF-B486-409318AA2DE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0004D8A-A186-4DA2-A7AB-18A6456438FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B6BE9F-F113-4976-951D-53F2E183A95A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB005F1-9719-4985-B9D9-2140C962ADD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A94D0C1B-F30F-4724-915E-192C53FAE58A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F247860-1D2C-415C-AFBD-26BD875AAF02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9697EDCD-A742-4AC6-876E-1080AD684207\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E73924A-875B-44D0-8F7C-A822B0488126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03751B92-EE07-4F16-A476-BD25561810BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A630E1-6CAE-4809-AB18-5002F158AE90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67750FF-EF4B-414F-8ED4-299CAF33B0DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A82D885-82F5-4755-BC11-5899E28CEE42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88AF1366-8A14-4741-8146-886C31D8D347\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FD75301-E29C-47DC-B53F-DC44EA0C1885\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C944024-BEAA-43AF-A339-FD69C75E8240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"435C69D1-3932-4379-8D18-B1E12D558325\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3572B700-73C0-41D1-95FD-FE9D5B0C1F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A40DC9-0D4E-4C91-8D1B-3CED95B3952E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16FB3E4B-05F8-411A-8C86-4ACE03815553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E55EBC1-6F96-47CD-9503-7855EFB07240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4208DBA1-7F85-4876-9B6C-D1B43EAAB2AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5ADC8E5-1CE7-4481-A9B5-61BFC6B4FF50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1789924-FADB-4076-8874-120B29EE6B86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC246667-2F6F-4024-9EAA-2CE3018235C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B21BA7F8-D4B5-4E6B-8FCE-04BBD3501AA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1341A5D4-A5CE-4D31-A178-01C3069D7A55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A5C199-92E5-435C-AC40-175849285104\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67589F54-0A54-4DE7-9A47-A73DD05F7965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDC34C8E-1BB9-43CC-9D89-9E6DC435B7EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BE5163E-9BCF-4BF8-BCB9-B48C4E7E1564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92C5DC8C-3318-440B-8B29-4827F343927B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ECC47D8-F602-4CEA-B19A-209CE76C9D36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7514ADD3-DECC-4CC2-9421-A609E526FDC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED2EC97-8B2D-47A9-8EC7-D1E0ACBB6C52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"691097C3-F91B-499B-BAEB-4E7E9C43B517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B3DB1ED-017B-43EF-92A3-A8A88669FBC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A49AAF-0F08-4151-8F74-4EF9C3415B00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F7A2018-BB4D-4DC1-813D-A4AA3F270893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A95D91C4-C539-4458-A6C9-8AE17207AE30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37F9D218-8198-42C7-88FE-7C5382138324\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF8FDD81-95EE-4241-93C8-925085A4CE7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"614D9E35-10E0-4CCB-B817-C7C8C3947BE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F75F987E-F4DB-46FF-B048-21B4A4C07B10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05376F2C-30B6-406D-90F7-6C2E00E85171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCDD3DF6-24BF-4C13-8F07-AF07327E5622\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1520A64-2157-45D7-A135-F900798C4EB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05A30F85-5367-4369-B7A5-176D71279FC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8803FF9-48D7-4AB0-8A17-4590CABD0BFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DC63B6B-5D6D-477B-9125-007F835981B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF385AC9-963E-4670-95A6-BE1EBC3890B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"943FA088-2902-45A9-A1BA-D612B46A50D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C80902D-9A6C-47D4-B56F-35C378FC0E63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1100B46C-8485-4048-BFF8-2BAB311EC04A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B9E1646-E154-41BA-B9FA-0839A898023D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03F4C8E6-0043-41A8-94EA-EEBAA1A081E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C10985-CBF7-4717-A7D6-2594887D7CB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C49886C-B6A0-4D95-8533-329FE5A66F6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0788CF23-3FAF-44C9-9AAA-96E4818A1AEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24AF7001-64D1-4BFB-9280-0BA0FAD97A0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C6E420E-16DA-4FB1-9968-C93E229614FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07469E04-B3D2-41FE-A2E4-E25A977026CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60FF402E-5E4F-414A-A3AB-149548303616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79E2B875-A270-45C0-A1B1-041264E5B290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C828C8C-7ECB-4167-87A9-0F522C400C66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C2C887F-1EF7-468A-A6AE-440793C78DAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F2F3D7F-D884-4ACD-A103-060F57A9867B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD1FCAAD-7072-45EC-9ACB-08556458BAF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4446224-40E8-4AD0-8197-921D3473E19B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EA159D9-8C7F-4BE5-9093-A21C7D00F7EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92B68FD-771A-4401-8B1D-B1A252356F62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B933941-0BE3-4EEB-8FDD-2DAA63343EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D060EF0-B29C-4B54-86A0-FD5CFF7B80BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36F737C1-6011-42D2-9690-CA81EA0A283C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19CA7EB6-D1C9-48D9-A69A-2618800A6CE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CA1F3E5-ED7F-4E4C-AD0D-0EEC542A9E51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED6E3C9B-A661-4B37-B76D-A3F7BD638D4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C909B0-8FB2-4220-AF93-EECB8D650CC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF36BAD0-A762-4F84-BE0B-060FE666ED67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"007337CD-94FB-4ED9-B4A3-9E0EC52D79B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCDFA137-F1FC-46BD-9872-D62671B1434D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E6DBCB3-E912-43A1-914B-5C7CCFAADE25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FCF36E2-0B42-4F23-97D6-9E79ECCA8FAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C67312-E128-4833-A91E-D7A9F96A7AD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F19F408-FABD-4A68-8CDC-C763F0321FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A06EC2-E491-4CD5-9904-61A88EBB7FD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"789A8CAE-8D9E-4244-880D-FBE28EC53AED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F901EE11-D0C9-46F6-8316-D8F4F1D50260\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E549F600-B9CE-4843-A772-2DACC528903E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F28E733-87ED-4610-A8EE-BD37BED7685B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DB488DD-D97C-4E21-A055-E6CECBBBC34E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DC12C97-9966-40E2-8B23-B4453EC9EA6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2832E8BF-7AC7-444C-B297-66F770860571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44AA72FB-E78D-419E-AA82-B0538C6504D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687C3BF3-D71A-49AD-8A05-EAC07CBCD949\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90AF90D9-16C4-4F8A-9868-3E2823E3445C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C063C53-8970-45B1-85F8-FB2080BF4695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64596ED7-794A-4D23-987B-D9AD59D48EA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FDA48F0-0F35-4A8F-8117-B0B28E00AB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A561A8E8-79E2-4071-B57D-590C22EF86A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92E46658-60AB-4758-9236-3AC0E6464383\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"207B8FBA-E2FF-485A-9AD9-E604AE0FB903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F99640-C753-40BE-A0A1-4C2D92E7DB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA1EC6D3-01CD-4CAB-817D-AE2E72FD0D03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F98247B-1839-4676-855B-827A4B6C016B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDBA35BD-1048-4B6E-96B2-1CFF615EB49A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6CEEEE2-D6A2-4342-8A73-934093948824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"979FEE9F-A957-43B6-BB6D-1A851D6FA11C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7AF59D-D05E-47F9-B493-B5CD6781FDDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF7EC93-0170-45A9-86C7-5460320B2AE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8A7B1C2-D2CE-485A-9376-27E14F3FA05A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5F803AC-DCC7-43FC-BEB3-AA7984E0506C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"560993AA-299D-42B7-B77F-1BD0D2114CCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C582B1C-1DAC-48FD-82DD-7334C10A2175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7862B0C-2C44-4110-A62A-083116129612\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"048C5996-F719-4338-B148-0DD1C13E02FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0196DA2F-CFA7-44D0-BDF5-37C7403E3B9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B9FF7FB-AB5A-4549-8C15-E69458C649E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CEF6608-B650-4C77-9823-0AD57B3484F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BE6A2D7-901C-45F9-B487-D674047D522E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCFCAC5E-6CF1-4EC1-A24C-688DD1016A96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ADCB509-5B0E-4592-8B23-EC25A3F79D41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB51691F-089F-4016-B25E-238074B06C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBAAC728-6A0F-4675-9677-AAF7DD5D38ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7E1AFD-9BCE-4487-A8DE-F9C60529CA7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EA37503-FD3D-4220-933C-234631D6EDEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72992831-2A76-456B-A80C-944BDD8591E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A79C2131-5566-4CC2-B6ED-38E3F6964500\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60BFDAA6-3DFC-4908-BC33-B05BAB462F94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6266056-770A-4E2D-A4FC-F1475257648E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"929AA8F3-8BDF-4614-9806-6D4231735616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"605D7552-8184-4B11-96FD-FE501A6C97DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3144BBDE-CC96-4408-AA02-ECC3BF902A34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8BA77A-34E3-4B9E-822A-7B7A90D35790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7165B43-ED22-4714-8FA4-1E201D1BFA69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67CFB133-FAF0-431A-9765-8A9738D6D87C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2975B0F2-DB7C-4257-985A-482ED2725883\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70221E07-3C2E-4A82-8259-AD583EB5CDDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"427DFD78-56CD-43C4-948E-F53AF9D669F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75AD7649-3FEA-4971-9886-6C9312B937A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4EE972C-6BAE-4342-BA01-1D685487F9C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27CDFE3B-C064-49A9-BD43-3F7612257A74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BD0EEC1-D695-41A5-8CD6-9E987A547CC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DBF25B8-D474-4C6B-8E45-F57DDC7074E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DF18FD1-6670-4C3C-8000-A079C69D575E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D760EEAF-5CF5-4F25-8FA2-D4F75F4F5A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921EB5A5-F911-4FCE-A6F1-C66818B34678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13878C13-1C7C-4B83-AF27-4998E8F659DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"023063E1-2DD7-487C-A8A7-939FAEE666A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77255CE6-D7B7-4B48-993C-7100A1170BC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B40AC368-3A14-4EFF-A8D0-7EFB4C83045D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C07E80D5-70A5-49C9-9044-D683C7ECCFF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63668AF4-F29C-4424-8EC5-2F0A5950DD58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E86616FE-0C3F-4984-A364-8A6A9F01DAD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C1C7CD-538D-4D7A-A81C-10DF5376A479\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5922F749-2B23-44B8-8A46-F31BCAEAD279\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C48BBAF-6B27-43D6-B86B-40CD8E7BA056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75D0EEB-707C-4C86-A569-E91E9F00BA77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0FB0E20-0243-40A1-8DEF-37150791222E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CFF26D-8AD3-4179-9E4C-F06D7C858C9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7541572C-229F-4963-B7F0-06EB3323E53B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85DE669C-27FD-4196-8B8C-1DA4EE4C1D6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479F7C77-D16F-4E40-9026-3EB8422E0401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A242AC2-9AA6-43FD-90F4-5BF6E80DBB5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04DB08C8-0018-4A8E-A206-097BDDF83B08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7193E85-30BE-42D5-A26B-3F88817F3574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"446E8515-45FC-4B8B-8D12-60643D64C07F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBBDF6B2-D388-4639-87D8-064AA3F6B6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00AAB8B6-B614-4EAA-BA90-C5326CB5D07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A371DF9-E224-404F-99C2-C2A4607E62D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F40E356-365D-44B7-8C38-A0C89DDD6D3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3132029-89F8-4359-A0DC-A275785266A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02F5685-0636-48AB-B222-434CA1F3B336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51FDD60-88E5-4A86-BB8E-4C2D7EDEFA03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ED4693C-DECF-4434-90C0-56158F102E7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB408A6B-0842-43DA-9180-B0A299FCBCE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6215EBAC-7C75-4647-9970-482120897F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B1BD2B6-1AF6-4AD4-94FA-94B453A21908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D1FD6E8-80EC-461F-9ED1-CE5912399E80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E96F585E-BDEF-45EE-B0AB-94FE23753AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3279C067-3058-4D46-A739-05404FD0E9B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB4DF0A7-8BC2-48AE-9036-FED6EEC57DF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0855225-F501-486A-BD03-2A86FD252B5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"214C7B0C-C438-4000-9F9B-6D83294243AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C91AA2E-4BB2-49C8-9364-4E363DF42CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA26781F-5A1C-4DA5-835E-D984D697F22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EEA4222-F25D-4457-80AA-6D05CA918D68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F3E60D1-5CF9-4F96-9EDB-D87F8CF57272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4D321BC-6B1D-4C71-8E16-5A1319CEFD6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6777AC35-9D1F-4153-94AC-B25627D730E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F063F4-8994-4E46-BA7B-A12A112009BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D6F2DE5-AF11-439A-8D37-30CB882ECD58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E213DD86-5419-42C8-BF38-7795DDB3C582\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A972291E-5231-439D-873B-2F87BCAF800A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C089CC54-3229-43D7-AA15-73CFA1A43EE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF268D83-C15D-4559-A46F-844E1D9264F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFE97C0D-3EA1-4314-A74A-7845C7778FB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34293F29-F327-4ADD-BF62-78F63F79BB96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"528C0A46-1CC4-4882-985A-0BB41525BC6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"643F3522-A452-4927-944D-532574EC4243\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58F40B78-4DBA-44EE-8420-086789EFF53D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"423BFD8F-4B50-43DA-9979-75FD18FBC953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BAD4A68-0481-476F-BBBD-3D515331368C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"838CEB7C-7C4C-416C-86CE-6E8DD47EF25B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC7D021F-3C97-45B3-B1F7-0AC26959F22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A31AEF3-448D-417B-9589-4BA0A06F2FE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A1D96F-7FFD-413F-ABCE-4530C3D63040\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDB2B08B-D3C7-4B82-B170-471D6CDEFAE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B8343FE-1320-40AE-A37F-70EF1A4AC4B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD42BA5A-7DA0-409D-8685-E43CF9B61D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5FF80E9-CF28-4EF6-9CFE-4B500A434674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7896A6C6-5918-4C27-85AF-6FEEFC7F8FD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"647B77A4-2F49-4989-AF43-961D69037370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"805B1E33-F279-4303-9DF3-C81039A40C1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B971EA9E-AE5C-4A1D-AD55-8241F7B38C9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7E0AAE-6539-4024-9055-BE0BAD702143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F1A8828-0765-4799-AD6C-143F45FAAD23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12D34618-1CCA-405B-A49C-EB384A09C2C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"575D6061-66BC-4862-BC84-ECD82D436E2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56B6EE64-1AD4-46B2-BA65-BB6282E56EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11650B45-0BDA-42BF-AEF3-83B48DD6A71D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3C92BA-827B-48AF-BBB3-FB60A9053C22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC097E24-F6C9-40D9-95E9-7EFDFA61AFF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB44CA7-DFE6-4B1A-9A63-97AE30017E49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B305EFA-6226-412C-90EE-F0691F2DDDE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F3874FA-63CB-4B5D-8B64-CE920320A4E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0800ED17-50E4-43F3-B46C-591DFA818BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46B0405-F301-4209-8766-6E12EAFAD157\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F99F9F1F-A967-4884-96CF-4488102DC0A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA9B37AD-4599-425B-B39F-E571F4975266\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5A5F1CF-A1E6-45F1-8B09-36566778DB57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"698C8A49-888B-4675-B3B0-25EDE2FD515E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70D98F97-8EF4-48B5-84BE-C3CC27031FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B473D1FA-909B-492E-9C5B-94B0E20E1C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD5EA7E-322E-4CE6-89D4-7DB1055C9034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67836379-4E1A-45CD-9506-7D3F612E47C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B1BBC61-8664-4452-93A7-DDB4D2E4C802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4F1B50C-FC5F-47F4-87BC-60E1BD3DD1F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"044F0375-DF2F-4D9B-AD7E-473D34165E8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CEE9B72-5C4C-40C0-A8A7-9DF11655DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A0655CA-A88C-4632-9A18-560E3F63B2F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C1454DD-DA51-4CBC-8BB2-09D5AB5777DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6965851-3B29-4C21-9556-97FD731EAA85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52984FD2-44E0-4E91-B290-0376737EEF6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C5D92E2-E718-4247-BA5D-DFE86C0F6AAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF933366-7503-4F8D-B7AA-F6A16210EC37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E2DAF5D-5BB7-49C6-8426-8B547505B6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EABB21D-D021-434B-B147-CAF687097A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7609424D-95F1-4493-A20C-B1BA4EC6439D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"966DC636-C802-4D9F-8162-652AFB931203\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A75794EB-A5AF-43F0-985F-D9E36F04C6D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C2CFF0-98FD-4A0D-8949-D554B2FE53D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F9217F-5028-4659-AA8E-F60548DE4D52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AC769DC-CF2E-4A3C-A610-264F024E6279\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B2B1CBF-D155-49BC-81A4-4172F177A5C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370B2B32-519E-4373-8A04-5C5025D688BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83D9B562-C279-4A55-A347-F28FC4F9CD12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A8C2BA0-48A8-4107-8681-A7C34C553D8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1B009DE-A82F-4569-9B42-EC1EC4DA8A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"683B6E83-37FF-4F9B-915F-059EBB29DB53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E218718F-4BE6-48B0-A204-9DD4A932A654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0AB327-B60A-473C-9D36-97766EE62D7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA249EE-4786-4E27-8787-5E8B88C2AEB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEBD0529-1CF3-44E5-85B3-19A3323C9493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D664EE97-07EC-410F-94C3-AEAB2C6A627D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D31DB981-03B1-4A84-8D87-CD407C3C149F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CBD155D-89D9-4677-A621-4D7613BE65C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D02BD0D4-FFFD-4355-97D8-170362F10B9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6635781A-2651-4EF2-A5AC-AEEEE63FDE6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DCE6930-760A-48C0-B964-1E3ED6A8517C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E52DE90-DF96-4CE7-B8D1-226BA50E4D09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8EB40E7-9B91-4106-B303-2B70AF395BFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAB0D5CD-8AF3-409D-96A7-718641D4B90D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E420B0B-0CD5-41C7-B25A-3DB856055F9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0C295B-0D63-4BE7-830D-D927E00C301C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"605C340D-2220-4669-B827-9009CB099E8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8791879D-2908-4F57-8DB3-6D24100A9108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEBEDBBA-0427-4DE0-BA8D-737DE7DF80E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E823DC5B-98BE-4656-BFBF-3A7018F8F213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64E8D558-ADE0-4358-9C76-7BD77BF23AA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7973B3D0-F244-4E26-88F5-A2D9BF2E4503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68E6BAB9-CBA4-4362-BC82-00D2C5CC6FB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD3F4BFF-3CBE-4E4B-8B29-B203F99CFD8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F5CB567-4F86-4466-BE4D-BFF557ACAE0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A52611B-6583-4660-90D7-C9472728072B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E80C6E89-B57C-47BB-8B95-50C03DFB3B96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9AB685B-FEE1-41EF-A046-1B34619E12A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB9F6724-967A-4AF0-9896-12BF6164B2CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC1116BF-12D7-47CC-98DB-18B200CF9C16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FBB28DE-726B-4AF0-88A5-35987E1E648B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA1DB22-8FBF-4CF6-AA96-5B68EE28877D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1880E2B8-5E0E-4603-8D17-3ABA43D28179\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FAFBB92-1917-4238-832B-195FBE418271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91DFDF3F-9A3F-42B8-99A1-A3F76B198358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8778F972-BF34-482F-9FA7-71A77F6138E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F288BB0-FE7A-4900-B227-BE80E4F4AADF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A8DC53A-90C6-47FE-89F1-A1FE8B1C07A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E16338-A094-4CA9-B77F-6FE42D3B422C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E07AB33-5351-487D-9602-495489C7C0B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22115ED6-1707-4840-B0D1-AD36BC0C75A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C633BC-831F-4CB7-9D62-16693444B216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CF5EE7E-F41B-44EC-9F69-7963B1BF1FB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD501E1-E78F-44C6-8A13-C29337B07EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9085BA0B-B7E2-4908-90C0-B4183891C718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2267CB8-0EE9-4DBD-AD5F-8A13BB62673C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81971C2F-137A-4F11-8C93-3B99D4CD1B58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E0BDAC-398E-406B-B2DB-AE049D6E98B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB66D7E-B465-4A8B-8CBD-7E93CCA2CD6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86AFDE6C-DE58-4C4D-882E-474EF6C3D934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"950C6BF9-AA47-4287-AC01-D183237490FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2355181D-D8EE-4F80-8280-13D5CBCF4779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5209343F-66B0-4DC0-9111-E2E64CFF7409\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"720109A6-B79E-48E1-9AE7-7708B154788E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82FF0DBD-AE13-4232-80F7-F4C2E2CC9721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5E944ED-8C02-46B8-BF95-0CE4C352753B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77AEA3D1-4846-46E2-9B80-20B19F00DC11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1576978F-E93D-4A47-90B6-6A4E3A7DE558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D339FE5-001F-4005-88A5-CFFE37F9B63E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BDABA86-497E-497E-A5BA-46F913A4840A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD886F4C-DB6F-4DDD-9807-8BCBB625C226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E16912A-7F6A-4A2B-B70F-D1FCD34BC7DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4C454B7-E5F4-4AAE-B577-FD71FA002C8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38BE2781-3A06-4D62-AC8B-68B721DA526B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9AE4EA5-B8C8-4AE2-9614-F9DBDB4D79DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA23772-2EB8-4BEE-8703-26D967EC4503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72DC766A-B1F9-4B83-9F9B-CF603EE476BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA594740-43C5-4F42-BA5B-00CA8AE7BB60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"572B16E2-8118-43A0-9A80-5D96831D55FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FB5C551-BADC-4A3A-93E5-2EBCA0704C51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5383B7A3-1569-4FEB-B299-B87CE8C8A87B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A05BBDE0-6C47-4489-9455-7DA7D230ECA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1789AA69-EA31-44D1-82E6-228E48E18586\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A7D5FF-3B1F-4C64-BB81-7A349765520D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93A92E9-C8D2-4F6E-A5CA-E8AFFEEC7E13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F0498B3-393A-4C32-B338-E6014B956755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C451F752-6869-4AFA-BAE5-5C9A54427BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83710FD1-099B-436D-9640-061D515E10BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"517B71CE-6156-40E1-B068-A2B733E205E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11DEEEE5-5055-4CE1-962C-C5F075F4CC02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8718DDAB-3208-48CF-9BCE-54DA1257C16A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE1AA901-E822-4240-9D82-C9311E4F87B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1CDE3DF-8E79-4997-94EB-B517FFCAE55C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A0DE13-EB0B-493B-BC84-3AEB3D454776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1727697B-1F59-4E29-B036-C32E9076C523\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E69E827C-C0D0-46C7-913A-1C1E02CEAACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2528F3F9-34DC-41DA-8926-382CB3EF5560\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E452C262-5A8D-4D97-BC7F-A4F5FF53A659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D57BF69-D750-4278-98AA-976B0D28E347\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76ADAE30-6CAD-4F5B-B6F7-C18953144C63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A25D792-E21D-43EE-8B9D-67DE066DE5DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C669783-C058-4B4F-BB9A-84B2C4682247\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"159B088B-9A85-4CAA-854A-AA080E528F95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBE74A94-FE8F-4749-A35A-AB7D57E24913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"990AC341-0E67-4A81-87E9-EE3EFD9E847E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53BC18B0-58F1-4477-9978-CA7383C197FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474992FB-842D-4661-A565-44AF2CD78693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476E1B79-5342-4895-96D7-E97DFC1F5334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBD318D5-89A6-4E28-939C-C5B61396806B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"981AD3FF-1D14-4ECD-8B6F-BCEB7F2409AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A32C7E89-32ED-4328-9313-FA7D3DDBDC58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2792EED8-2CBD-478E-BC09-05FE830B3147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97B1AF2F-6E48-4DBD-A60E-3088CA4C3771\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E1691D-65B3-45E4-A544-8B29E38D569D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42F2703-B8AB-410E-AF7B-CD0BE777F061\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31244C94-00A3-499C-A91A-1BEF2FB0E6B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"878FF6E8-8A6D-44CE-9DD1-2C912AB8A193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5078A95B-2BD8-4A37-A356-F53D1A53CB37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BFE67CD-DE53-4C4E-8245-35902AEFA6E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F231D31-3AAD-4C5D-A225-D2DF94486718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5998DF5D-E785-45EC-B8D0-1F4EC4F96D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EADFD013-0BFB-427C-98E6-F9E4774DCBC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58620B10-FEA6-456D-B6B5-2745F5DBE82D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8F698B1-D9CF-4FE5-933D-EFCEA3056E3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4858A1F0-97F2-4258-AB98-027BF1EC5117\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C961A8B-EAFD-4F66-9432-BCC0D154ECCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"052DE6CD-A1E7-4E81-B476-66EF451061C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE1AE1E-6FC0-41D8-857C-C5A99CAF5823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"751B3AC8-D45E-46B6-83D5-311B693F3C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9588277A-0B97-4408-9CF7-11271CDAADD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479FE854-85E5-4ED0-BFAF-2618C9053082\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E048B9BF-77C8-49F7-9F2D-9999F79BA264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CD16D4D-E816-486D-96F4-5A2BF75B959F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"169C558E-1A83-47D5-A66B-035BD1DD56FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D683E509-3FB2-4175-BCAB-4EB1B5C04958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FCFA915-5445-4732-9F8F-D7561BA4177F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63A9FD98-C22D-48F6-87A1-60791C818A1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F99F24-1783-4E6E-BE61-04C2E80356ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74CC7EB9-3F59-4C0A-B3A1-984BCCFB25BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85289E4C-C813-4677-867D-EE8E98F4A1A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27C8150F-BEFA-406D-9F0D-E7CB187E26AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E807F90-819F-4103-B1F7-4CE46971BD63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD93203F-71B9-4F87-B5D8-FD273451C8A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E652C74-C48D-4F29-9E85-09325632443F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99158191-3013-4182-8A53-5DFCA1E2C60A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7E39A3E-7EAE-47C9-930B-58A980B73FC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFDA54BA-C00D-4890-9B7F-328257607B21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5EFB1E-334C-4B55-8E2E-6AE19B34774D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8260DCA-2F0C-45F7-B35F-D489AF5639F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7778F81B-6D05-4666-B1D4-53DB0EC16858\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DC6706A-61F7-4AA0-B2FF-0FFDF739A644\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF1B16B-02F2-4ECA-938E-B5CDCFC67816\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C5501D8-1B0D-4F5A-AFD7-C63181D3281F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1751F0CE-A0D3-40E2-8EEC-D31141FE33A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FF9AFA7-BBE8-4229-94CB-5A9596728BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E23A777F-68A4-4217-A75A-4D8A27E6451A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA27DFB-CDD1-4F52-86B3-DB2320A9C7B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"392A4337-11F6-4980-A138-4FDBCAD0EBA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2E9BB67-F1FF-4190-889F-78B965CCE934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4185A70-5D10-448E-A9AB-AA9D5CDF0FF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35607317-0928-4297-A33E-D44BEE1BBEC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D48323B1-7FEB-451F-A064-23E7CE7F6403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29EF4E8A-EF37-4DCC-B5D4-DA89AF31DD18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5763189-7980-4A72-92C9-1908FE9E15EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C53ACD49-DA21-4DDE-A0AA-FCCD59D29886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4326D350-EBC2-48E6-A2C6-0499F6826CEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8594E6FE-B6DB-4343-B3DD-AEC19923DAF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BCADA00-E453-414D-9933-FCB43D21BBC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E62212D9-F707-4A8E-AB2A-A3985E7A4049\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"561755A8-8AAD-4F41-8266-747EFDAF2D55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6F4BB0F-DAF4-479B-B78A-7929C151AA1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A207312E-1D35-4464-A111-22C4C793E146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B16E32-07D5-445B-BAA5-4E4A0881BFC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CF08F6B-2ECB-414C-82D7-C06085BF8B10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21032BE3-74D8-4C3F-B461-158F475B6853\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F9AC992-59B7-44EE-9FF3-567AC48938AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B44B3BFF-649A-4C1E-9564-EFA007FA2BD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C04EDD71-15B3-4085-828C-BB7A43DBDCC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC1BA7AC-989B-4093-841A-C6D5978BF17F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1874F848-B15B-4369-A164-5FA11D2B9AFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E46F934-9765-43ED-88A7-A4778C99A976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8D5217E-9520-4FDB-9330-C8DC2CDDAA70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B206674F-1A34-470B-820C-05F9C37792CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63AE2051-9F8E-4477-8E1E-38A1E06AD247\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B39281F-990C-4AA3-9287-CCB5BA7E8AC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EDC0FCF-BD22-42AD-8044-9A64215B91CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E0ED8AA-56D8-4CB6-A765-706BE87C9E30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA890C07-7940-4DF4-96FB-8F71A2EFE5C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E95A34F0-0B74-4031-BC9E-CBC93665BE68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BB22DF7-15CE-4340-A05F-BD39FCA41F50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BA72DC8-2E4E-453A-A3FB-20F31D32B973\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758E45B6-7C7A-432D-891D-CB99077AE3B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26D7A401-BCE1-4673-93C9-67F009B75A39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E62119B-2A65-4473-B570-F118614B0ED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E5319E0-909C-4688-AAA6-6A0B5D19FFDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F83F9F9-D2DB-4D40-AD61-29E66B050B45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91BE6238-312E-4CF7-9E74-48CB5603B0FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33BA1BE0-0A78-4E94-A619-35735C913180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24CA40FE-80C5-4A20-8219-CEF51F3162FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B10305C5-0C2C-48B7-A0AD-2B24AD722EBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33E8F127-6EAE-4302-BD52-7C3FCCA307D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D675EA9-33E7-45ED-B6A9-7117AD2FEE26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6E468FE-73BE-4B20-B774-58EC7CD20CDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF6B19B-7D45-44B3-8524-407253B93EEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B803FAD-E54D-49FE-A078-029B8FFBBB98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC511505-ED67-45B4-B76C-56AB750C4408\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A430C232-79EB-4264-AE24-41D4A2A5D990\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A9E3D4B-A3DF-4858-8C64-0316B6E57435\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19108672-E1AA-41CC-B86C-061D3721C8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"200D36CF-AEDE-4183-8C54-748E6E5A3218\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF13A44-5163-4282-8EE8-7DC05499B5E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"827C12CE-D87D-489D-ABA7-BE0405EC33D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16AA78F7-520B-4FFC-838C-DC74FEE8E13F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CB2949C-4699-49EF-83EB-31199E0CE2DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66C169DC-EEFE-4DE6-A3D0-65B606527240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD28227A-8888-43B2-BC41-8D54B49DA58C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7984BAEA-4518-4E17-830E-B34D09648BD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C2214E5-491E-448F-A4B6-A497FB44D722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AE93013-C262-46A5-8E77-D647881EE632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85B53CEC-943F-4966-8EC1-CB2C6AD6A15B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEAC04A3-EBE3-406B-B784-A3547162ECE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15720FFE-B2A4-4347-BCD7-DFA6774C0B8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50F46B0E-C746-44B4-B343-E3DCAB4B98DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AE30903-4F75-4D71-A8BB-44D1099E9837\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98311EAA-26C8-4092-8BE5-4E7BEAA68DD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB8CF348-811C-4342-ACB9-AFCABCC34331\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71998EC5-EC0F-496C-B658-3CD91D824944\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1F19B2A-E7A1-4B97-AC40-02B0D3673555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6387C9-C0A8-4B26-BC62-802775CD0AD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFEB0164-77C2-4EC2-92FD-5FCE246119CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDB20210-337C-4220-8CA1-F4B2BC54EBC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F699569F-4F52-4CC0-90D9-CC4CBC32428A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBAED22B-D097-49C4-ADDF-4B3F3E1262D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7756B588-5A63-4508-8BDD-92DB8CB0F4AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"316E26AE-67A5-4E75-8F9B-ECF4A03AED51\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A51E86F5-8F94-4E7C-9A63-DAA3FCBE0438\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"001AB619-157E-40B4-B86C-5DB18245D62F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1221FB4F-488A-4A52-8788-82ECBF92113B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38D51E27-28A3-47A1-9C36-1A223858E352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"365DF3EF-E7D1-41FC-8382-D3B095542D59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B2B122-34A9-4534-A996-8FEAACA71A05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C850453B-CDB1-490D-B551-9AC0B27D8A67\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"CB66DB75-2B16-4EBF-9B93-CE49D8086E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"588D4F37-0A56-47A4-B710-4D5F3D214FB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9070C9D8-A14A-467F-8253-33B966C16886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C19813-E823-456A-B1CE-EC0684CE1953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_winac_rtx_\\\\(f\\\\)_firmware:2010:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"7151A19C-0AE5-4F66-9E3D-8BF675A8430C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_winac_rtx_\\\\(f\\\\)_firmware:2010:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEEB72F4-AE57-49DD-8876-1BCA7B805692\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_winac_rtx_\\\\(f\\\\)_firmware:2010:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7929F123-AC76-4F49-940F-558CABC25E75\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_winac_rtx_\\\\(f\\\\)_2010:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6034789-ABD1-4035-8378-F0BA7157B087\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9317C01-22AA-452B-BBBF-5FAFFFB8BEA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4534CF9-D9FD-4936-9D8C-077387028A05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D60384BD-284C-4A68-9EEF-0FAFDF0C21F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDA8DD5B-8A34-4CB3-B0FB-F82C73B25007\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.1.32\",\"matchCriteriaId\":\"C403C49F-3779-4A7A-8D12-B4A32BFD77CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.2.0\",\"versionEndExcluding\":\"5.2.6\",\"matchCriteriaId\":\"0AEC1DE4-F01C-4D21-8FB6-A0D4460D6CD0\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4609\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4611\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4613\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4614\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/584653\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/102376\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040071\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-254.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0292\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/speculativeexecution\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2018-002\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2018-003\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html\",\"source\":\"secure@intel.com\"},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002\",\"source\":\"secure@intel.com\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jun/36\",\"source\":\"secure@intel.com\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Nov/16\",\"source\":\"secure@intel.com\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201810-06\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180104-0001/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2017-5715\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://spectreattack.com/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.citrix.com/article/CTX231399\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K91229003\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.lenovo.com/us/en/solutions/LEN-18282\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3531-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3531-3/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3540-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3541-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3542-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3549-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3560-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3561-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3580-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3581-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3581-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3582-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3582-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3594-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3597-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3597-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3620-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3690-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3777-3/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/usn/usn-3516-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4120\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4187\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4188\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4213\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/43427/\",\"source\":\"secure@intel.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/180049\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/support/security/Synology_SA_18_01\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.vmware.com/security/advisories/VMSA-2018-0007.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4609\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4611\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4613\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4614\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/584653\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/102376\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040071\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-254.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0292\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/speculativeexecution\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2018-002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2018-003\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jun/36\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Nov/16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201810-06\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180104-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2017-5715\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://spectreattack.com/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.citrix.com/article/CTX231399\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K91229003\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.lenovo.com/us/en/solutions/LEN-18282\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3531-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3531-3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3540-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3541-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3542-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3549-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3560-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3561-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3580-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3581-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3581-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3582-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3582-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3594-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3597-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3597-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3620-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3690-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3777-3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/usn/usn-3516-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4120\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4187\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4213\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/43427/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/180049\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/support/security/Synology_SA_18_01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.vmware.com/security/advisories/VMSA-2018-0007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4609\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3560-1/\", \"name\": \"USN-3560-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html\", \"name\": \"[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4187\", \"name\": \"DSA-4187\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3542-2/\", \"name\": \"USN-3542-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/201810-06\", \"name\": \"GLSA-201810-06\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\", \"x_transferred\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3540-2/\", \"name\": \"USN-3540-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/security/vulnerabilities/speculativeexecution\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html\", \"name\": \"[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3597-1/\", \"name\": \"USN-3597-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html\", \"name\": \"[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html\", \"name\": \"SUSE-SU-2018:0012\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html\", \"name\": \"SUSE-SU-2018:0011\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4611\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4213\", \"name\": \"DSA-4213\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"https://cert.vde.com/en-us/advisories/vde-2018-002\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4120\", \"name\": \"DSA-4120\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html\", \"name\": \"openSUSE-SU-2018:0013\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3580-1/\", \"name\": \"USN-3580-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://support.f5.com/csp/article/K91229003\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3531-3/\", \"name\": \"USN-3531-3\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3620-2/\", \"name\": \"USN-3620-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html\", \"name\": \"openSUSE-SU-2018:0022\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3582-1/\", \"name\": \"USN-3582-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4188\", \"name\": \"DSA-4188\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:0292\", \"name\": \"RHSA-2018:0292\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://xenbits.xen.org/xsa/advisory-254.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180104-0001/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html\", \"name\": \"SUSE-SU-2018:0019\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://www.synology.com/support/security/Synology_SA_18_01\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/102376\", \"name\": \"102376\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3594-1/\", \"name\": \"USN-3594-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/584653\", \"name\": \"VU#584653\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT-VN\", \"x_transferred\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/180049\", \"name\": \"VU#180049\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT-VN\", \"x_transferred\"]}, {\"url\": \"https://cert.vde.com/en-us/advisories/vde-2018-003\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html\", \"name\": \"SUSE-SU-2018:0009\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3690-1/\", \"name\": \"USN-3690-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3549-1/\", \"name\": \"USN-3549-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html\", \"name\": \"SUSE-SU-2018:0007\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://support.citrix.com/article/CTX231399\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://spectreattack.com/\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3531-1/\", \"name\": \"USN-3531-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc\", \"name\": \"FreeBSD-SA-18:03\", \"tags\": [\"vendor-advisory\", \"x_refsource_FREEBSD\", \"x_transferred\"]}, {\"url\": \"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html\", \"name\": \"SUSE-SU-2018:0006\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3581-1/\", \"name\": \"USN-3581-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securitytracker.com/id/1040071\", \"name\": \"1040071\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html\", \"name\": \"[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3597-2/\", \"name\": \"USN-3597-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3581-2/\", \"name\": \"USN-3581-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4614\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html\", \"name\": \"SUSE-SU-2018:0010\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html\", \"name\": \"[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel\", \"name\": \"20180104 CPU Side-Channel Information Disclosure Vulnerabilities\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/usn/usn-3516-1/\", \"name\": \"USN-3516-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/43427/\", \"name\": \"43427\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html\", \"name\": \"SUSE-SU-2018:0020\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3541-2/\", \"name\": \"USN-3541-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://support.lenovo.com/us/en/solutions/LEN-18282\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3777-3/\", \"name\": \"USN-3777-3\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html\", \"name\": \"openSUSE-SU-2018:0023\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://www.vmware.com/security/advisories/VMSA-2018-0007.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html\", \"name\": \"SUSE-SU-2018:0008\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4613\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3561-1/\", \"name\": \"USN-3561-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3582-2/\", \"name\": \"USN-3582-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jun/36\", \"name\": \"20190624 [SECURITY] [DSA 4469-1] libvirt security update\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"]}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc\", \"name\": \"FreeBSD-SA-19:26\", \"tags\": [\"vendor-advisory\", \"x_refsource_FREEBSD\", \"x_transferred\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Nov/16\", \"name\": \"20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://security.paloaltonetworks.com/CVE-2017-5715\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html\", \"name\": \"[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html\", \"name\": \"[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T15:11:48.456Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 5.6, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2017-5715\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-23T13:31:09.657900Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-203\", \"description\": \"CWE-203 Observable Discrepancy\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-05T13:21:38.296Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Intel Corporation\", \"product\": \"Microprocessors with Speculative Execution\", \"versions\": [{\"status\": \"affected\", \"version\": \"All\"}]}], \"datePublic\": \"2018-01-03T00:00:00.000Z\", \"references\": [{\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4609\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://usn.ubuntu.com/3560-1/\", \"name\": \"USN-3560-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html\", \"name\": \"[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4187\", \"name\": \"DSA-4187\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"https://usn.ubuntu.com/3542-2/\", \"name\": \"USN-3542-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://security.gentoo.org/glsa/201810-06\", \"name\": \"GLSA-201810-06\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://usn.ubuntu.com/3540-2/\", \"name\": \"USN-3540-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://access.redhat.com/security/vulnerabilities/speculativeexecution\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html\", \"name\": \"[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://usn.ubuntu.com/3597-1/\", \"name\": \"USN-3597-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html\", \"name\": \"[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html\", \"name\": \"SUSE-SU-2018:0012\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html\", \"name\": \"SUSE-SU-2018:0011\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4611\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4213\", \"name\": \"DSA-4213\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"https://cert.vde.com/en-us/advisories/vde-2018-002\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4120\", \"name\": \"DSA-4120\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html\", \"name\": \"openSUSE-SU-2018:0013\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://usn.ubuntu.com/3580-1/\", \"name\": \"USN-3580-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://support.f5.com/csp/article/K91229003\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://usn.ubuntu.com/3531-3/\", \"name\": \"USN-3531-3\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://usn.ubuntu.com/3620-2/\", \"name\": \"USN-3620-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html\", \"name\": \"openSUSE-SU-2018:0022\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://usn.ubuntu.com/3582-1/\", \"name\": \"USN-3582-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4188\", \"name\": \"DSA-4188\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:0292\", \"name\": \"RHSA-2018:0292\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://xenbits.xen.org/xsa/advisory-254.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180104-0001/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html\", \"name\": \"SUSE-SU-2018:0019\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://www.synology.com/support/security/Synology_SA_18_01\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securityfocus.com/bid/102376\", \"name\": \"102376\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://usn.ubuntu.com/3594-1/\", \"name\": \"USN-3594-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/584653\", \"name\": \"VU#584653\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT-VN\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/180049\", \"name\": \"VU#180049\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT-VN\"]}, {\"url\": \"https://cert.vde.com/en-us/advisories/vde-2018-003\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html\", \"name\": \"SUSE-SU-2018:0009\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://usn.ubuntu.com/3690-1/\", \"name\": \"USN-3690-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://usn.ubuntu.com/3549-1/\", \"name\": \"USN-3549-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html\", \"name\": \"SUSE-SU-2018:0007\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://support.citrix.com/article/CTX231399\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://spectreattack.com/\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://usn.ubuntu.com/3531-1/\", \"name\": \"USN-3531-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc\", \"name\": \"FreeBSD-SA-18:03\", \"tags\": [\"vendor-advisory\", \"x_refsource_FREEBSD\"]}, {\"url\": \"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html\", \"name\": \"SUSE-SU-2018:0006\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://usn.ubuntu.com/3581-1/\", \"name\": \"USN-3581-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securitytracker.com/id/1040071\", \"name\": \"1040071\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html\", \"name\": \"[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://usn.ubuntu.com/3597-2/\", \"name\": \"USN-3597-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://usn.ubuntu.com/3581-2/\", \"name\": \"USN-3581-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4614\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html\", \"name\": \"SUSE-SU-2018:0010\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html\", \"name\": \"[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel\", \"name\": \"20180104 CPU Side-Channel Information Disclosure Vulnerabilities\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}, {\"url\": \"https://usn.ubuntu.com/usn/usn-3516-1/\", \"name\": \"USN-3516-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://www.exploit-db.com/exploits/43427/\", \"name\": \"43427\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html\", \"name\": \"SUSE-SU-2018:0020\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://usn.ubuntu.com/3541-2/\", \"name\": \"USN-3541-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://support.lenovo.com/us/en/solutions/LEN-18282\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://usn.ubuntu.com/3777-3/\", \"name\": \"USN-3777-3\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html\", \"name\": \"openSUSE-SU-2018:0023\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://www.vmware.com/security/advisories/VMSA-2018-0007.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html\", \"name\": \"SUSE-SU-2018:0008\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4613\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://usn.ubuntu.com/3561-1/\", \"name\": \"USN-3561-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://usn.ubuntu.com/3582-2/\", \"name\": \"USN-3582-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jun/36\", \"name\": \"20190624 [SECURITY] [DSA 4469-1] libvirt security update\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"]}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc\", \"name\": \"FreeBSD-SA-19:26\", \"tags\": [\"vendor-advisory\", \"x_refsource_FREEBSD\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Nov/16\", \"name\": \"20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"]}, {\"url\": \"http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://security.paloaltonetworks.com/CVE-2017-5715\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html\", \"name\": \"[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html\", \"name\": \"[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Information Disclosure\"}]}], \"providerMetadata\": {\"orgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"shortName\": \"intel\", \"dateUpdated\": \"2021-08-16T08:06:27.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"All\"}]}, \"product_name\": \"Microprocessors with Speculative Execution\"}]}, \"vendor_name\": \"Intel Corporation\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4609\", \"name\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4609\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://usn.ubuntu.com/3560-1/\", \"name\": \"USN-3560-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html\", \"name\": \"[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update\", \"refsource\": \"MLIST\"}, {\"url\": \"https://www.debian.org/security/2018/dsa-4187\", \"name\": \"DSA-4187\", \"refsource\": \"DEBIAN\"}, {\"url\": \"https://usn.ubuntu.com/3542-2/\", \"name\": \"USN-3542-2\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://security.gentoo.org/glsa/201810-06\", \"name\": \"GLSA-201810-06\", \"refsource\": \"GENTOO\"}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"name\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\", \"name\": \"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://usn.ubuntu.com/3540-2/\", \"name\": \"USN-3540-2\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://access.redhat.com/security/vulnerabilities/speculativeexecution\", \"name\": \"https://access.redhat.com/security/vulnerabilities/speculativeexecution\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002\", \"name\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html\", \"name\": \"[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update\", \"refsource\": \"MLIST\"}, {\"url\": \"https://usn.ubuntu.com/3597-1/\", \"name\": \"USN-3597-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html\", \"name\": \"[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update\", \"refsource\": \"MLIST\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html\", \"name\": \"SUSE-SU-2018:0012\", \"refsource\": \"SUSE\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html\", \"name\": \"SUSE-SU-2018:0011\", \"refsource\": \"SUSE\"}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4611\", \"name\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4611\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html\", \"name\": \"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://www.debian.org/security/2018/dsa-4213\", \"name\": \"DSA-4213\", \"refsource\": \"DEBIAN\"}, {\"url\": \"https://cert.vde.com/en-us/advisories/vde-2018-002\", \"name\": \"https://cert.vde.com/en-us/advisories/vde-2018-002\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://www.debian.org/security/2018/dsa-4120\", \"name\": \"DSA-4120\", \"refsource\": \"DEBIAN\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html\", \"name\": \"openSUSE-SU-2018:0013\", \"refsource\": \"SUSE\"}, {\"url\": \"https://usn.ubuntu.com/3580-1/\", \"name\": \"USN-3580-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://support.f5.com/csp/article/K91229003\", \"name\": \"https://support.f5.com/csp/article/K91229003\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://usn.ubuntu.com/3531-3/\", \"name\": \"USN-3531-3\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://usn.ubuntu.com/3620-2/\", \"name\": \"USN-3620-2\", \"refsource\": \"UBUNTU\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html\", \"name\": \"openSUSE-SU-2018:0022\", \"refsource\": \"SUSE\"}, {\"url\": \"https://usn.ubuntu.com/3582-1/\", \"name\": \"USN-3582-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://www.debian.org/security/2018/dsa-4188\", \"name\": \"DSA-4188\", \"refsource\": \"DEBIAN\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:0292\", \"name\": \"RHSA-2018:0292\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://xenbits.xen.org/xsa/advisory-254.html\", \"name\": \"http://xenbits.xen.org/xsa/advisory-254.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180104-0001/\", \"name\": \"https://security.netapp.com/advisory/ntap-20180104-0001/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html\", \"name\": \"SUSE-SU-2018:0019\", \"refsource\": \"SUSE\"}, {\"url\": \"https://www.synology.com/support/security/Synology_SA_18_01\", \"name\": \"https://www.synology.com/support/security/Synology_SA_18_01\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html\", \"name\": \"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt\", \"name\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securityfocus.com/bid/102376\", \"name\": \"102376\", \"refsource\": \"BID\"}, {\"url\": \"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability\", \"name\": \"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://usn.ubuntu.com/3594-1/\", \"name\": \"USN-3594-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/584653\", \"name\": \"VU#584653\", \"refsource\": \"CERT-VN\"}, {\"url\": \"https://www.kb.cert.org/vuls/id/180049\", \"name\": \"VU#180049\", \"refsource\": \"CERT-VN\"}, {\"url\": \"https://cert.vde.com/en-us/advisories/vde-2018-003\", \"name\": \"https://cert.vde.com/en-us/advisories/vde-2018-003\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\", \"name\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html\", \"name\": \"SUSE-SU-2018:0009\", \"refsource\": \"SUSE\"}, {\"url\": \"https://usn.ubuntu.com/3690-1/\", \"name\": \"USN-3690-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us\", \"name\": \"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001\", \"name\": \"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us\", \"name\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html\", \"name\": \"https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://usn.ubuntu.com/3549-1/\", \"name\": \"USN-3549-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html\", \"name\": \"SUSE-SU-2018:0007\", \"refsource\": \"SUSE\"}, {\"url\": \"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/\", \"name\": \"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://support.citrix.com/article/CTX231399\", \"name\": \"https://support.citrix.com/article/CTX231399\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\", \"name\": \"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://spectreattack.com/\", \"name\": \"https://spectreattack.com/\", \"refsource\": \"MISC\"}, {\"url\": \"https://usn.ubuntu.com/3531-1/\", \"name\": \"USN-3531-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc\", \"name\": \"FreeBSD-SA-18:03\", \"refsource\": \"FREEBSD\"}, {\"url\": \"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/\", \"name\": \"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html\", \"name\": \"SUSE-SU-2018:0006\", \"refsource\": \"SUSE\"}, {\"url\": \"https://usn.ubuntu.com/3581-1/\", \"name\": \"USN-3581-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/\", \"name\": \"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securitytracker.com/id/1040071\", \"name\": \"1040071\", \"refsource\": \"SECTRACK\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html\", \"name\": \"[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update\", \"refsource\": \"MLIST\"}, {\"url\": \"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr\", \"name\": \"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://usn.ubuntu.com/3597-2/\", \"name\": \"USN-3597-2\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://usn.ubuntu.com/3581-2/\", \"name\": \"USN-3581-2\", \"refsource\": \"UBUNTU\"}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4614\", \"name\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4614\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html\", \"name\": \"SUSE-SU-2018:0010\", \"refsource\": \"SUSE\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html\", \"name\": \"[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update\", \"refsource\": \"MLIST\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel\", \"name\": \"20180104 CPU Side-Channel Information Disclosure Vulnerabilities\", \"refsource\": \"CISCO\"}, {\"url\": \"https://usn.ubuntu.com/usn/usn-3516-1/\", \"name\": \"USN-3516-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html\", \"name\": \"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://www.exploit-db.com/exploits/43427/\", \"name\": \"43427\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html\", \"name\": \"SUSE-SU-2018:0020\", \"refsource\": \"SUSE\"}, {\"url\": \"https://usn.ubuntu.com/3541-2/\", \"name\": \"USN-3541-2\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html\", \"name\": \"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://support.lenovo.com/us/en/solutions/LEN-18282\", \"name\": \"https://support.lenovo.com/us/en/solutions/LEN-18282\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://usn.ubuntu.com/3777-3/\", \"name\": \"USN-3777-3\", \"refsource\": \"UBUNTU\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html\", \"name\": \"openSUSE-SU-2018:0023\", \"refsource\": \"SUSE\"}, {\"url\": \"https://www.vmware.com/security/advisories/VMSA-2018-0007.html\", \"name\": \"https://www.vmware.com/security/advisories/VMSA-2018-0007.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html\", \"name\": \"SUSE-SU-2018:0008\", \"refsource\": \"SUSE\"}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4613\", \"name\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4613\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://usn.ubuntu.com/3561-1/\", \"name\": \"USN-3561-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://usn.ubuntu.com/3582-2/\", \"name\": \"USN-3582-2\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://seclists.org/bugtraq/2019/Jun/36\", \"name\": \"20190624 [SECURITY] [DSA 4469-1] libvirt security update\", \"refsource\": \"BUGTRAQ\"}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt\", \"name\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\", \"name\": \"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf\", \"name\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc\", \"name\": \"FreeBSD-SA-19:26\", \"refsource\": \"FREEBSD\"}, {\"url\": \"https://seclists.org/bugtraq/2019/Nov/16\", \"name\": \"20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu\", \"refsource\": \"BUGTRAQ\"}, {\"url\": \"http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html\", \"name\": \"http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://security.paloaltonetworks.com/CVE-2017-5715\", \"name\": \"https://security.paloaltonetworks.com/CVE-2017-5715\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html\", \"name\": \"[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html\", \"name\": \"[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update\", \"refsource\": \"MLIST\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Information Disclosure\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2017-5715\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"secure@intel.com\", \"DATE_PUBLIC\": \"2018-01-03T00:00:00\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2017-5715\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-06T14:59:36.405Z\", \"dateReserved\": \"2017-02-01T00:00:00.000Z\", \"assignerOrgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"datePublished\": \"2018-01-04T13:00:00.000Z\", \"assignerShortName\": \"intel\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2023-AVI-0067
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 9 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 9 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 9 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3077"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0399"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 23 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0400"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0395"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0440"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0392"
}
],
"reference": "CERTFR-2023-AVI-0067",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de Red Hat\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, un\ncontournement de la politique de s\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0392 du 24 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0440 du 24 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0399 du 24 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0400 du 24 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0334 du 23 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0395 du 24 janvier 2023",
"url": null
}
]
}
CERTFR-2018-AVI-091
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-17864",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17864"
},
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"name": "CVE-2017-17862",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17862"
},
{
"name": "CVE-2017-17712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17712"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-091",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180482-1 du 20 f\u00e9vrier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180482-1/"
}
]
}
CERTFR-2018-AVI-016
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits VMware. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | ESXi | ESXi version 6.5 sans les correctifs de sécurité ESXi650-201801401-BG et ESXi650-201801402-BG | ||
| VMware | ESXi | ESXi version 5.5 sans le correctif de sécurité ESXi550-201801401-BG | ||
| VMware | Fusion | Fusion versions 8.x sur OS X versions antérieures à 8.5.10 | ||
| VMware | N/A | VC version 6.5 antérieures à 6.5 U1e | ||
| VMware | ESXi | ESXi version 6.0 sans les correctifs de sécurité ESXi600-201801401-BG et ESXi600-201801402-BG | ||
| VMware | N/A | Workstation versions 14.x antérieures à 14.1.1 | ||
| VMware | N/A | VC version 6.0 antérieures à 6.0 U3d | ||
| VMware | Fusion | Fusion versions 10.x sur OS X versions antérieures à 10.1.1 | ||
| VMware | N/A | VC version 5.5 antérieures à 5.5 U3g |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ESXi version 6.5 sans les correctifs de s\u00e9curit\u00e9 ESXi650-201801401-BG et ESXi650-201801402-BG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi version 5.5 sans le correctif de s\u00e9curit\u00e9 ESXi550-201801401-BG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Fusion versions 8.x sur OS X versions ant\u00e9rieures \u00e0 8.5.10",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VC version 6.5 ant\u00e9rieures \u00e0 6.5 U1e",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi version 6.0 sans les correctifs de s\u00e9curit\u00e9 ESXi600-201801401-BG et ESXi600-201801402-BG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Workstation versions 14.x ant\u00e9rieures \u00e0 14.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VC version 6.0 ant\u00e9rieures \u00e0 6.0 U3d",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Fusion versions 10.x sur OS X versions ant\u00e9rieures \u00e0 10.1.1",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VC version 5.5 ant\u00e9rieures \u00e0 5.5 U3g",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2018-0004 du 10 janvier 2018",
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0004.html"
}
],
"reference": "CERTFR-2018-AVI-016",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits VMware. Elle permet\n\u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2018-0004 du 9 janvier 2018",
"url": null
}
]
}
CERTFR-2021-AVI-456
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2021-24489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24489"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-456",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer un contournement\nde la politique de s\u00e9curit\u00e9, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4985-1 du 09 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-4985-1"
}
]
}
CERTFR-2018-AVI-124
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Elles permettent à un attaquant de provoquer un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux 7 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux 6.7 Extended Update Support |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux 7",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux 6.7 Extended Update Support",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16994"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-17712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17712"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-124",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-03-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0502 du 13 mars 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0502"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0496 du 13 mars 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0496"
}
]
}
CERTFR-2018-AVI-124
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Elles permettent à un attaquant de provoquer un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux 7 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux 6.7 Extended Update Support |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux 7",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux 6.7 Extended Update Support",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16994"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-17712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17712"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-124",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-03-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0502 du 13 mars 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0502"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0496 du 13 mars 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0496"
}
]
}
CERTFR-2018-AVI-161
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module pour Public Cloud 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 6 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module pour Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12190"
},
{
"name": "CVE-2018-1068",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1068"
},
{
"name": "CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"name": "CVE-2017-18221",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18221"
},
{
"name": "CVE-2018-6927",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6927"
},
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2016-7915",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7915"
},
{
"name": "CVE-2017-18079",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18079"
},
{
"name": "CVE-2017-16644",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16644"
},
{
"name": "CVE-2017-13215",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13215"
},
{
"name": "CVE-2017-18208",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18208"
},
{
"name": "CVE-2017-15299",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15299"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2017-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13166"
},
{
"name": "CVE-2018-1066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1066"
},
{
"name": "CVE-2017-16914",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16914"
},
{
"name": "CVE-2015-1142857",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1142857"
},
{
"name": "CVE-2017-16913",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16913"
},
{
"name": "CVE-2017-18204",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18204"
},
{
"name": "CVE-2017-16912",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16912"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-16911",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16911"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2017-17741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17741"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-161",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-03-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0841-1 du 29 mars 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180841-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0848-1 du 29 mars 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180848-1/"
}
]
}
CERTFR-2018-AVI-014
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Point of Sale 11-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 6 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 11-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Point of Sale 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-14106",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14106"
},
{
"name": "CVE-2017-15274",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15274"
},
{
"name": "CVE-2017-16527",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16527"
},
{
"name": "CVE-2017-16531",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16531"
},
{
"name": "CVE-2017-7472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7472"
},
{
"name": "CVE-2017-16525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16525"
},
{
"name": "CVE-2017-16939",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16939"
},
{
"name": "CVE-2017-16536",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16536"
},
{
"name": "CVE-2017-14340",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14340"
},
{
"name": "CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"name": "CVE-2017-1000251",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000251"
},
{
"name": "CVE-2017-13167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13167"
},
{
"name": "CVE-2017-16649",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16649"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2017-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15115"
},
{
"name": "CVE-2017-16538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16538"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"name": "CVE-2017-15265",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-16537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16537"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-15868",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15868"
},
{
"name": "CVE-2017-16535",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16535"
},
{
"name": "CVE-2017-14140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14140"
},
{
"name": "CVE-2017-16534",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16534"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
},
{
"name": "CVE-2017-16529",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16529"
},
{
"name": "CVE-2017-15102",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15102"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0041-1du 8 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180041-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0051-1du 9 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180051-1/"
}
],
"reference": "CERTFR-2018-AVI-014",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-09T00:00:00.000000"
},
{
"description": "Ajout d\u0027un bulletin et mise \u00e0 jour des syst\u00e8mes affect\u00e9s",
"revision_date": "2018-01-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0041-1 du 8 janvier 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0040-1 du 8 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180040-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0051-1 du 9 janvier 2018",
"url": null
}
]
}
CERTFR-2018-AVI-339
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Contrail Service Orchestration (CSO) versions antérieures à 4.0.0 et 3.3.0 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 18.1R1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X46-D45, 12.1X46-D67, 12.1X46-D76, 12.1X46-D77, 12.3R11, 12.3R12-S10, 12.3X48-D20, 12.3X48-D25, 12.3X48-D55, 12.3X48-D66, 12.3X48-D70, 12.3X54-D34, 14.1X53-D30, 14.1X53-D47, 15.1F5-S5, 15.1F6-S1, 15.1F6-S10, 15.1F7, 15.1R4-S5, 15.1R4-S9, 15.1R5, 15.1R6-S6, 15.1R7, 15.1R7-S1, 15.1R8, 15.1X49-D110, 15.1X49-D131, 15.1X49-D140, 15.1X49-D20, 15.1X49-D35, 15.1X53-D233, 15.1X53-D234, 15.1X53-D47, 15.1X53-D470, 15.1X53-D471, 15.1X53-D490, 15.1X53-D59, 15.1X53-D60, 15.1X53-D67, 15.1X54-D70, 15.1X8.3, 16.1R2, 16.1R3, 16.1R3-S8, 16.1R3-S9, 16.1R4-S10, 16.1R4-S8, 16.1R4-S9, 16.1R5-S4, 16.1R6-S1, 16.1R6-S3, 16.1R6-S4, 16.1R7, 16.1X65-D46, 16.1X65-D47, 16.2R1, 16.2R1-S6, 16.2R1-S7, 16.2R2-S5, 16.2R2-S6, 16.2R3, 17.1R1-S7, 17.1R2-S7, 17.1R3, 17.2R1-S4, 17.2R1-S6, 17.2R2-S4, 17.2R2-S5, 17.2R3, 17.2X75-D100, 17.2X75-D110, 17.2X75-D70, 17.2X75-D90, 17.2X75-D91, 17.3R1, 17.3R1-S4, 17.3R2, 17.3R2-S2, 17.3R3, 17.4R1-S2, 17.4R1-S3, 17.4R1-S4, 17.4R2, 18.1R1, 18.1R2, 18.1X75-D10, 18.2R1, 18.2X75-D10 et 18.2X75-D5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 4.0.0 et 3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 18.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D45, 12.1X46-D67, 12.1X46-D76, 12.1X46-D77, 12.3R11, 12.3R12-S10, 12.3X48-D20, 12.3X48-D25, 12.3X48-D55, 12.3X48-D66, 12.3X48-D70, 12.3X54-D34, 14.1X53-D30, 14.1X53-D47, 15.1F5-S5, 15.1F6-S1, 15.1F6-S10, 15.1F7, 15.1R4-S5, 15.1R4-S9, 15.1R5, 15.1R6-S6, 15.1R7, 15.1R7-S1, 15.1R8, 15.1X49-D110, 15.1X49-D131, 15.1X49-D140, 15.1X49-D20, 15.1X49-D35, 15.1X53-D233, 15.1X53-D234, 15.1X53-D47, 15.1X53-D470, 15.1X53-D471, 15.1X53-D490, 15.1X53-D59, 15.1X53-D60, 15.1X53-D67, 15.1X54-D70, 15.1X8.3, 16.1R2, 16.1R3, 16.1R3-S8, 16.1R3-S9, 16.1R4-S10, 16.1R4-S8, 16.1R4-S9, 16.1R5-S4, 16.1R6-S1, 16.1R6-S3, 16.1R6-S4, 16.1R7, 16.1X65-D46, 16.1X65-D47, 16.2R1, 16.2R1-S6, 16.2R1-S7, 16.2R2-S5, 16.2R2-S6, 16.2R3, 17.1R1-S7, 17.1R2-S7, 17.1R3, 17.2R1-S4, 17.2R1-S6, 17.2R2-S4, 17.2R2-S5, 17.2R3, 17.2X75-D100, 17.2X75-D110, 17.2X75-D70, 17.2X75-D90, 17.2X75-D91, 17.3R1, 17.3R1-S4, 17.3R2, 17.3R2-S2, 17.3R3, 17.4R1-S2, 17.4R1-S3, 17.4R1-S4, 17.4R2, 18.1R1, 18.1R2, 18.1X75-D10, 18.2R1, 18.2X75-D10 et 18.2X75-D5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-7407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7407"
},
{
"name": "CVE-2018-0027",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0027"
},
{
"name": "CVE-2016-8615",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8615"
},
{
"name": "CVE-2015-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3153"
},
{
"name": "CVE-2018-0024",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0024"
},
{
"name": "CVE-2017-1000257",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000257"
},
{
"name": "CVE-2016-8619",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8619"
},
{
"name": "CVE-2013-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1944"
},
{
"name": "CVE-2018-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2603"
},
{
"name": "CVE-2017-8818",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8818"
},
{
"name": "CVE-2018-0031",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0031"
},
{
"name": "CVE-2018-0035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0035"
},
{
"name": "CVE-2018-1000115",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000115"
},
{
"name": "CVE-2016-9952",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9952"
},
{
"name": "CVE-2017-10295",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10295"
},
{
"name": "CVE-2013-4545",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4545"
},
{
"name": "CVE-2015-7236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7236"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2016-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4802"
},
{
"name": "CVE-2017-10388",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10388"
},
{
"name": "CVE-2016-9953",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9953"
},
{
"name": "CVE-2016-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8624"
},
{
"name": "CVE-2018-0039",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0039"
},
{
"name": "CVE-2016-8616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8616"
},
{
"name": "CVE-2015-3148",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3148"
},
{
"name": "CVE-2016-8620",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8620"
},
{
"name": "CVE-2014-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3613"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2013-6422",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6422"
},
{
"name": "CVE-2018-0042",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0042"
},
{
"name": "CVE-2018-2618",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2618"
},
{
"name": "CVE-2018-1000005",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000005"
},
{
"name": "CVE-2016-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8617"
},
{
"name": "CVE-2016-0754",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0754"
},
{
"name": "CVE-2017-1000101",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000101"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2014-8150",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8150"
},
{
"name": "CVE-2014-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3707"
},
{
"name": "CVE-2016-8618",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8618"
},
{
"name": "CVE-2018-0037",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0037"
},
{
"name": "CVE-2015-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3143"
},
{
"name": "CVE-2018-0040",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0040"
},
{
"name": "CVE-2016-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5419"
},
{
"name": "CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"name": "CVE-2018-2637",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2637"
},
{
"name": "CVE-2017-10198",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10198"
},
{
"name": "CVE-2017-10355",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10355"
},
{
"name": "CVE-2016-8623",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8623"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2016-3739",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3739"
},
{
"name": "CVE-2018-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2663"
},
{
"name": "CVE-2017-15896",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15896"
},
{
"name": "CVE-2018-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2579"
},
{
"name": "CVE-2017-8816",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8816"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2016-7167",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7167"
},
{
"name": "CVE-2017-9502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9502"
},
{
"name": "CVE-2018-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0030"
},
{
"name": "CVE-2018-0034",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0034"
},
{
"name": "CVE-2018-2633",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2633"
},
{
"name": "CVE-2000-0973",
"url": "https://www.cve.org/CVERecord?id=CVE-2000-0973"
},
{
"name": "CVE-2014-0139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0139"
},
{
"name": "CVE-2016-5420",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5420"
},
{
"name": "CVE-2016-7141",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7141"
},
{
"name": "CVE-2014-0138",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0138"
},
{
"name": "CVE-2016-8621",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8621"
},
{
"name": "CVE-2018-0029",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0029"
},
{
"name": "CVE-2018-0025",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0025"
},
{
"name": "CVE-2017-1000254",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000254"
},
{
"name": "CVE-2018-2599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2599"
},
{
"name": "CVE-2017-8817",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8817"
},
{
"name": "CVE-2017-10356",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10356"
},
{
"name": "CVE-2018-0038",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0038"
},
{
"name": "CVE-2016-9586",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9586"
},
{
"name": "CVE-2017-1000100",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000100"
},
{
"name": "CVE-2017-10345",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10345"
},
{
"name": "CVE-2018-0041",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0041"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-2629",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2629"
},
{
"name": "CVE-2016-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8622"
},
{
"name": "CVE-2013-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2174"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-0032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0032"
},
{
"name": "CVE-2016-5421",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5421"
},
{
"name": "CVE-2018-2678",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2678"
},
{
"name": "CVE-2014-0015",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0015"
},
{
"name": "CVE-2017-1000099",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000099"
},
{
"name": "CVE-2018-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2588"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2017-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3145"
},
{
"name": "CVE-2016-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
},
{
"name": "CVE-2018-0026",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0026"
},
{
"name": "CVE-2016-0755",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0755"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-339",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10869 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10869\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10866 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10866\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10874 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10874\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10863 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10863\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10871 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10871\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10857 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10857\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10868 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10868\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10859 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10859\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10872 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10872\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10858 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10858\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10861 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10861\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10860 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10860\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10864 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10864\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10873 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10873\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10865 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10865\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2018-AVI-175
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour ARM 64 7 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM System z (Structure A) 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power 9 7 ppc64le |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux pour ARM 64 7 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM System z (Structure A) 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power 9 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12190"
},
{
"name": "CVE-2017-1000410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000410"
},
{
"name": "CVE-2018-6927",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6927"
},
{
"name": "CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"name": "CVE-2017-15299",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15299"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"name": "CVE-2017-17448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17448"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-1000255",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000255"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2017-11473",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11473"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-175",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service,\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0654 du 10 avril 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0654"
}
]
}
CERTFR-2018-AVI-161
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module pour Public Cloud 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 6 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module pour Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12190"
},
{
"name": "CVE-2018-1068",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1068"
},
{
"name": "CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"name": "CVE-2017-18221",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18221"
},
{
"name": "CVE-2018-6927",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6927"
},
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2016-7915",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7915"
},
{
"name": "CVE-2017-18079",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18079"
},
{
"name": "CVE-2017-16644",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16644"
},
{
"name": "CVE-2017-13215",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13215"
},
{
"name": "CVE-2017-18208",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18208"
},
{
"name": "CVE-2017-15299",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15299"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2017-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13166"
},
{
"name": "CVE-2018-1066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1066"
},
{
"name": "CVE-2017-16914",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16914"
},
{
"name": "CVE-2015-1142857",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1142857"
},
{
"name": "CVE-2017-16913",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16913"
},
{
"name": "CVE-2017-18204",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18204"
},
{
"name": "CVE-2017-16912",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16912"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-16911",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16911"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2017-17741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17741"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-161",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-03-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0841-1 du 29 mars 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180841-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0848-1 du 29 mars 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180848-1/"
}
]
}
CERTFR-2018-AVI-004
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat . Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 6.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64 | ||
| Oracle | Virtualization | Red Hat Virtualization Host 4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 6 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.3 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.4 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.7 ppc64 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 x86_64",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 6 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.3 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.4 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-004",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-04T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0020 du 04 janvier 2018",
"revision_date": "2018-01-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat . Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0011 du 03 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0011"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0009 du 03 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0009"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0010 du 03 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0010"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0008 du 03 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0008"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0020 du 04 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0020"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0017 du 04 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0017"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0007 du 03 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0007"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0016 du 04 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0016"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0018 du 04 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0018"
}
]
}
CERTFR-2018-AVI-134
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-134",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-03-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3597-2 du 15 mars 2018",
"url": "https://usn.ubuntu.com/3597-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3597-1 du 15 mars 2018",
"url": "https://usn.ubuntu.com/3597-1/"
}
]
}
CERTFR-2018-AVI-028
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans le microgiciel Intel pour SUSE. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP2 et 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS et 12-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Point of Sale 11-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4 | ||
| SUSE | N/A | SUSE OpenStack Cloud 6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2 et 12-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 11-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP2 et 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-LTSS et 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Point of Sale 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2 et 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-028",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le microgiciel Intel pour SUSE.\nElle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le microgiciel Intel pour SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0067-1 du 11 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180067-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0068-1 du 11 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180068-1/"
}
]
}
CERTFR-2018-AVI-012
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les microgiciels Intel et AMD pour les systèmes RedHat. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server version AUS 6.5 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0040 du 5 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0040"
}
],
"reference": "CERTFR-2018-AVI-012",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les microgiciels Intel et AMD\npour les syst\u00e8mes RedHat. Elle permet \u00e0 un attaquant de provoquer une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les microgiciels Intel et AMD pour les syst\u00e8mes RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0040 du 5 janvier 2018",
"url": null
}
]
}
CERTFR-2018-AVI-048
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 11-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-048",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0171-1 du 22 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180171-1/"
}
]
}
CERTFR-2018-AVI-170
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.10 sur Raspberry Pi 2",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 12.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0861"
},
{
"name": "CVE-2017-16646",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16646"
},
{
"name": "CVE-2017-18203",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18203"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2017-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12762"
},
{
"name": "CVE-2018-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5344"
},
{
"name": "CVE-2017-16536",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16536"
},
{
"name": "CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"name": "CVE-2017-1000407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000407"
},
{
"name": "CVE-2018-6927",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6927"
},
{
"name": "CVE-2017-11472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11472"
},
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-16649",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16649"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"name": "CVE-2017-16528",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16528"
},
{
"name": "CVE-2017-11089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11089"
},
{
"name": "CVE-2017-17862",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17862"
},
{
"name": "CVE-2018-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8043"
},
{
"name": "CVE-2017-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16994"
},
{
"name": "CVE-2017-18208",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18208"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2017-16914",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16914"
},
{
"name": "CVE-2017-18075",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18075"
},
{
"name": "CVE-2017-16537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16537"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"name": "CVE-2018-1000026",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000026"
},
{
"name": "CVE-2017-16913",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16913"
},
{
"name": "CVE-2017-18204",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18204"
},
{
"name": "CVE-2017-16532",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16532"
},
{
"name": "CVE-2017-16650",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16650"
},
{
"name": "CVE-2017-16647",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16647"
},
{
"name": "CVE-2017-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16645"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2017-17448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17448"
},
{
"name": "CVE-2017-16912",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16912"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-16911",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16911"
},
{
"name": "CVE-2017-7518",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7518"
},
{
"name": "CVE-2017-16995",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16995"
},
{
"name": "CVE-2017-17741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17741"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-170",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-05T00:00:00.000000"
},
{
"description": "Ajout des bulletins de s\u00e9curit\u00e9 Ubuntu du 05 avril 2018",
"revision_date": "2018-04-06T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu . Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3620-2 du 05 avril 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3617-3 du 04 avril 2018",
"url": "https://usn.ubuntu.com/3617-3/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3619-1 du 04 avril 2018",
"url": "https://usn.ubuntu.com/3619-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3620-2 du 04 avril 2018",
"url": "https://usn.ubuntu.com/3620-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3620-1 du 04 avril 2018",
"url": "https://usn.ubuntu.com/3620-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3619-2 du 05 avril 2018",
"url": null
}
]
}
CERTFR-2018-AVI-118
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans le noyau Linux d'Ubuntu. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-118",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-03-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux d\u0027Ubuntu. Elle\npermet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu 3594-1 du 9 mars 2018",
"url": "https://usn.ubuntu.com/3594-1/"
}
]
}
CERTFR-2018-AVI-048
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 11-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-048",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0171-1 du 22 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180171-1/"
}
]
}
CERTFR-2019-AVI-425
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Toutes les versions d\u0027Android sans le correctif de s\u00e9curit\u00e9 2019-09-01",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-2258",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2258"
},
{
"name": "CVE-2019-10495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10495"
},
{
"name": "CVE-2019-2123",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2123"
},
{
"name": "CVE-2019-10533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10533"
},
{
"name": "CVE-2019-10522",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10522"
},
{
"name": "CVE-2019-2331",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2331"
},
{
"name": "CVE-2019-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10534"
},
{
"name": "CVE-2019-2275",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2275"
},
{
"name": "CVE-2019-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2283"
},
{
"name": "CVE-2019-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2174"
},
{
"name": "CVE-2018-20669",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20669"
},
{
"name": "CVE-2019-10488",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10488"
},
{
"name": "CVE-2017-17768",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17768"
},
{
"name": "CVE-2019-2108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2108"
},
{
"name": "CVE-2018-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6240"
},
{
"name": "CVE-2019-10505",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10505"
},
{
"name": "CVE-2019-2175",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2175"
},
{
"name": "CVE-2019-10541",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10541"
},
{
"name": "CVE-2019-2249",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2249"
},
{
"name": "CVE-2019-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10531"
},
{
"name": "CVE-2019-2115",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2115"
},
{
"name": "CVE-2019-2325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2325"
},
{
"name": "CVE-2019-9254",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9254"
},
{
"name": "CVE-2019-2324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2324"
},
{
"name": "CVE-2019-2103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2103"
},
{
"name": "CVE-2019-10529",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10529"
},
{
"name": "CVE-2019-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2179"
},
{
"name": "CVE-2019-2181",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2181"
},
{
"name": "CVE-2019-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2176"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2019-2316",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2316"
},
{
"name": "CVE-2019-2177",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2177"
},
{
"name": "CVE-2019-2332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2332"
},
{
"name": "CVE-2018-11891",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11891"
},
{
"name": "CVE-2019-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2124"
},
{
"name": "CVE-2019-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2285"
},
{
"name": "CVE-2019-10515",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10515"
},
{
"name": "CVE-2019-2323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2323"
},
{
"name": "CVE-2019-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2178"
},
{
"name": "CVE-2019-10491",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10491"
},
{
"name": "CVE-2019-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2180"
},
{
"name": "CVE-2019-10496",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10496"
},
{
"name": "CVE-2019-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10524"
},
{
"name": "CVE-2019-10512",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10512"
},
{
"name": "CVE-2019-10504",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10504"
},
{
"name": "CVE-2019-2246",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2246"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-425",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android du 01 septembre 2019",
"url": "https://source.android.com/security/bulletin/2019-09-01.html"
}
]
}
CERTFR-2018-AVI-049
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 12.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-049",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3542-2 du 22 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3542-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3540-2 du 22 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3540-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3542-1 du 22 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3542-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3531-2 du 22 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3531-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3541-1 du 22 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3541-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3541-2 du 22 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3541-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3540-1 du 22 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3540-1/"
}
]
}
CERTFR-2018-AVI-104
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-18079",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18079"
},
{
"name": "CVE-2017-13215",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13215"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2015-1142857",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1142857"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2017-17741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17741"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-104",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service \u00e0 distance, un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0555-1 du 27 f\u00e9vrier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180555-1/"
}
]
}
CERTFR-2018-AVI-032
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13167"
},
{
"name": "CVE-2017-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15115"
},
{
"name": "CVE-2017-16538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16538"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"name": "CVE-2017-15868",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15868"
},
{
"name": "CVE-2017-17448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17448"
},
{
"name": "CVE-2017-16534",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16534"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-032",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180115-1 du 16 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180115-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180113-1 du 16 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180113-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180114-1 du 16 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180114-1/"
}
]
}
CERTFR-2018-AVI-079
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat . Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 5 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 5 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 5 x86_64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 5 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 5 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-079",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat . Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0292 du 09 f\u00e9vrier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
}
]
}
CERTFR-2018-AVI-208
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Microsoft Windows. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows 10",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-208",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Microsoft Windows. Elle permet \u00e0\nun attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft KB4091666 du 24 avril 2018",
"url": "https://support.microsoft.com/en-sg/help/4091666/kb4091666-intel-microcode-updates"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft KB4091664 du 24 avril 2018",
"url": "https://support.microsoft.com/en-gb/help/4091664/kb4091664-intel-microcode-updates"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft KB4090007 du 24 avril 2018",
"url": "https://support.microsoft.com/en-us/help/4090007/intel-microcode-updates"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft KB4091663 du 24 avril 2018",
"url": "https://support.microsoft.com/fr-fr/help/4091663/kb4091663-intel-microcode-updates"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft KB4078407 du 24 avril 2018",
"url": "https://support.microsoft.com/en-us/help/4078407/update-to-enable-mitigation-against-spectre-variant-2"
}
]
}
CERTFR-2018-AVI-196
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP3 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-17975",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17975"
},
{
"name": "CVE-2017-17864",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17864"
},
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"name": "CVE-2017-16644",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16644"
},
{
"name": "CVE-2017-17862",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17862"
},
{
"name": "CVE-2017-18208",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18208"
},
{
"name": "CVE-2017-17712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17712"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2017-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13166"
},
{
"name": "CVE-2018-8087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8087"
},
{
"name": "CVE-2018-1000026",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000026"
},
{
"name": "CVE-2017-16913",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16913"
},
{
"name": "CVE-2017-18174",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18174"
},
{
"name": "CVE-2017-16912",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16912"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2017-15951",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15951"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-196",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180986-1 du 19 avril 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180986-1/"
}
]
}
CERTFR-2018-AVI-083
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 12 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2017-18079",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18079"
},
{
"name": "CVE-2017-13215",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13215"
},
{
"name": "CVE-2017-17712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17712"
},
{
"name": "CVE-2015-1142857",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1142857"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2017-17741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17741"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-083",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180433-1 du 13 f\u00e9vrier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180433-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180437-1 du 13 f\u00e9vrier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180437-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180436-1 du 13 f\u00e9vrier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180436-1/"
}
]
}
CERTFR-2018-AVI-205
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2929"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-205",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:1252 du 25 avril 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1252"
}
]
}
CERTFR-2018-AVI-039
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle Virtualization. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Virtualization | Oracle Secure Global Desktop (SGD) version 5.3 | ||
| Oracle | Virtualization | Oracle VM VirtualBox versions antérieures à 5.1.32 | ||
| Oracle | Virtualization | Oracle VM VirtualBox versions antérieures à 5.2.6 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Secure Global Desktop (SGD) version 5.3",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle VM VirtualBox versions ant\u00e9rieures \u00e0 5.1.32",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle VM VirtualBox versions ant\u00e9rieures \u00e0 5.2.6",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2698"
},
{
"name": "CVE-2018-2690",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2690"
},
{
"name": "CVE-2018-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2687"
},
{
"name": "CVE-2018-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2685"
},
{
"name": "CVE-2018-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2694"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-5645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5645"
},
{
"name": "CVE-2018-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2693"
},
{
"name": "CVE-2018-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2689"
},
{
"name": "CVE-2018-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2686"
},
{
"name": "CVE-2018-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2688"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2676"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-039",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle\nVirtualization. Elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des\ndonn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Virtualization",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2018-3236628 du 16 janvier 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2018verbose-3236630#OVIR du 16 janvier 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018verbose-3236630.html#OVIR"
}
]
}
CERTFR-2019-AVI-425
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Toutes les versions d\u0027Android sans le correctif de s\u00e9curit\u00e9 2019-09-01",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-2258",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2258"
},
{
"name": "CVE-2019-10495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10495"
},
{
"name": "CVE-2019-2123",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2123"
},
{
"name": "CVE-2019-10533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10533"
},
{
"name": "CVE-2019-10522",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10522"
},
{
"name": "CVE-2019-2331",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2331"
},
{
"name": "CVE-2019-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10534"
},
{
"name": "CVE-2019-2275",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2275"
},
{
"name": "CVE-2019-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2283"
},
{
"name": "CVE-2019-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2174"
},
{
"name": "CVE-2018-20669",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20669"
},
{
"name": "CVE-2019-10488",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10488"
},
{
"name": "CVE-2017-17768",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17768"
},
{
"name": "CVE-2019-2108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2108"
},
{
"name": "CVE-2018-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6240"
},
{
"name": "CVE-2019-10505",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10505"
},
{
"name": "CVE-2019-2175",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2175"
},
{
"name": "CVE-2019-10541",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10541"
},
{
"name": "CVE-2019-2249",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2249"
},
{
"name": "CVE-2019-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10531"
},
{
"name": "CVE-2019-2115",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2115"
},
{
"name": "CVE-2019-2325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2325"
},
{
"name": "CVE-2019-9254",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9254"
},
{
"name": "CVE-2019-2324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2324"
},
{
"name": "CVE-2019-2103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2103"
},
{
"name": "CVE-2019-10529",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10529"
},
{
"name": "CVE-2019-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2179"
},
{
"name": "CVE-2019-2181",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2181"
},
{
"name": "CVE-2019-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2176"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2019-2316",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2316"
},
{
"name": "CVE-2019-2177",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2177"
},
{
"name": "CVE-2019-2332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2332"
},
{
"name": "CVE-2018-11891",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11891"
},
{
"name": "CVE-2019-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2124"
},
{
"name": "CVE-2019-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2285"
},
{
"name": "CVE-2019-10515",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10515"
},
{
"name": "CVE-2019-2323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2323"
},
{
"name": "CVE-2019-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2178"
},
{
"name": "CVE-2019-10491",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10491"
},
{
"name": "CVE-2019-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2180"
},
{
"name": "CVE-2019-10496",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10496"
},
{
"name": "CVE-2019-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10524"
},
{
"name": "CVE-2019-10512",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10512"
},
{
"name": "CVE-2019-10504",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10504"
},
{
"name": "CVE-2019-2246",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2246"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-425",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android du 01 septembre 2019",
"url": "https://source.android.com/security/bulletin/2019-09-01.html"
}
]
}
CERTFR-2018-AVI-014
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Point of Sale 11-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 6 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 11-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Point of Sale 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-14106",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14106"
},
{
"name": "CVE-2017-15274",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15274"
},
{
"name": "CVE-2017-16527",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16527"
},
{
"name": "CVE-2017-16531",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16531"
},
{
"name": "CVE-2017-7472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7472"
},
{
"name": "CVE-2017-16525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16525"
},
{
"name": "CVE-2017-16939",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16939"
},
{
"name": "CVE-2017-16536",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16536"
},
{
"name": "CVE-2017-14340",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14340"
},
{
"name": "CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"name": "CVE-2017-1000251",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000251"
},
{
"name": "CVE-2017-13167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13167"
},
{
"name": "CVE-2017-16649",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16649"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2017-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15115"
},
{
"name": "CVE-2017-16538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16538"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"name": "CVE-2017-15265",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-16537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16537"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-15868",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15868"
},
{
"name": "CVE-2017-16535",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16535"
},
{
"name": "CVE-2017-14140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14140"
},
{
"name": "CVE-2017-16534",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16534"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
},
{
"name": "CVE-2017-16529",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16529"
},
{
"name": "CVE-2017-15102",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15102"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0041-1du 8 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180041-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0051-1du 9 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180051-1/"
}
],
"reference": "CERTFR-2018-AVI-014",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-09T00:00:00.000000"
},
{
"description": "Ajout d\u0027un bulletin et mise \u00e0 jour des syst\u00e8mes affect\u00e9s",
"revision_date": "2018-01-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0041-1 du 8 janvier 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0040-1 du 8 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180040-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0051-1 du 9 janvier 2018",
"url": null
}
]
}
CERTFR-2018-AVI-013
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iOS versions ant\u00e9rieures \u00e0 11.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS High Sierra versions ant\u00e9rieures \u00e0 10.13.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 11.0.2",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-013",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nElles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208401 du 8 janvier 2018",
"url": "https://support.apple.com/fr-fr/HT208401"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208397 du 8 janvier 2018",
"url": "https://support.apple.com/fr-fr/HT208397"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208403 du 8 janvier 2018",
"url": "https://support.apple.com/fr-fr/HT208403"
}
]
}
CERTFR-2018-AVI-005
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4 | ||
| SUSE | N/A | OpenStack Cloud Magnum Orchestration 7 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA | ||
| SUSE | N/A | SUSE Container as a Service Platform ALL | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for Raspberry Pi 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "OpenStack Cloud Magnum Orchestration 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Container as a Service Platform ALL",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-14106",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14106"
},
{
"name": "CVE-2017-7472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7472"
},
{
"name": "CVE-2017-16939",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16939"
},
{
"name": "CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"name": "CVE-2017-13167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13167"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2017-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15115"
},
{
"name": "CVE-2017-16538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16538"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-15868",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15868"
},
{
"name": "CVE-2017-16534",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16534"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-005",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180011-1 du 04 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180011-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180012-1 du 04 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180012-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180010-1 du 04 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180010-1/"
}
]
}
CERTFR-2018-AVI-216
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Android toutes versions n\u0027int\u00e9grant pas le correctif de s\u00e9curit\u00e9 du 07 mai 2018",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-15832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15832"
},
{
"name": "CVE-2018-5852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5852"
},
{
"name": "CVE-2018-5845",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5845"
},
{
"name": "CVE-2018-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6246"
},
{
"name": "CVE-2018-3578",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3578"
},
{
"name": "CVE-2018-6254",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6254"
},
{
"name": "CVE-2018-3582",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3582"
},
{
"name": "CVE-2017-13312",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13312"
},
{
"name": "CVE-2017-13322",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13322"
},
{
"name": "CVE-2018-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5344"
},
{
"name": "CVE-2017-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15857"
},
{
"name": "CVE-2017-15843",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15843"
},
{
"name": "CVE-2017-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6293"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2017-13319",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13319"
},
{
"name": "CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"name": "CVE-2017-13318",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13318"
},
{
"name": "CVE-2017-18153",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18153"
},
{
"name": "CVE-2017-13313",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13313"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2018-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3576"
},
{
"name": "CVE-2018-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3572"
},
{
"name": "CVE-2018-3579",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3579"
},
{
"name": "CVE-2018-3581",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3581"
},
{
"name": "CVE-2017-6289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6289"
},
{
"name": "CVE-2017-13317",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13317"
},
{
"name": "CVE-2018-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3565"
},
{
"name": "CVE-2017-13316",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13316"
},
{
"name": "CVE-2017-13310",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13310"
},
{
"name": "CVE-2017-13315",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13315"
},
{
"name": "CVE-2018-5843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5843"
},
{
"name": "CVE-2018-3571",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3571"
},
{
"name": "CVE-2017-13321",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13321"
},
{
"name": "CVE-2017-18154",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18154"
},
{
"name": "CVE-2018-5844",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5844"
},
{
"name": "CVE-2018-5842",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5842"
},
{
"name": "CVE-2017-18070",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18070"
},
{
"name": "CVE-2018-5851",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5851"
},
{
"name": "CVE-2017-13314",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13314"
},
{
"name": "CVE-2017-13323",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13323"
},
{
"name": "CVE-2017-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15854"
},
{
"name": "CVE-2017-13320",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13320"
},
{
"name": "CVE-2018-5850",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5850"
},
{
"name": "CVE-2018-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5841"
},
{
"name": "CVE-2018-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5846"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-5847",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5847"
},
{
"name": "CVE-2018-5849",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5849"
},
{
"name": "CVE-2018-5840",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5840"
},
{
"name": "CVE-2017-13311",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13311"
},
{
"name": "CVE-2018-3562",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3562"
},
{
"name": "CVE-2018-5853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5853"
},
{
"name": "CVE-2017-15842",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15842"
},
{
"name": "CVE-2017-16643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16643"
},
{
"name": "CVE-2018-3580",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3580"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13309",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13309"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-216",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-05-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel/Nexus du 7 mai 2018",
"url": "https://source.android.com/security/bulletin/pixel/2018-05-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android du 7 mai 2018",
"url": "https://source.android.com/security/bulletin/2018-05-01"
}
]
}
CERTFR-2018-AVI-095
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans SCADA les produits Siemens . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Se r\u00e9f\u00e9rer aux avis du constructeur pour les syst\u00e8mes affect\u00e9s (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5705",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5705"
},
{
"name": "CVE-2017-5708",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5708"
},
{
"name": "CVE-2017-5710",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5710"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5706",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5706"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5712"
},
{
"name": "CVE-2017-5707",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5707"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-15361",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15361"
},
{
"name": "CVE-2017-5709",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5709"
},
{
"name": "CVE-2017-5711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5711"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-095",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans SCADA les produits\nSiemens . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, une ex\u00e9cution de code\narbitraire et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans SCADA les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SCADA Siemens ssa-470231 du 22 f\u00e9vrier 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-470231.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SCADA Siemens ssa-168644 du 22 f\u00e9vrier 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-168644.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SCADA Siemens ssa-892715 du 22 f\u00e9vrier 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf"
}
]
}
CERTFR-2018-AVI-094
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu . Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 12.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12190"
},
{
"name": "CVE-2017-12153",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12153"
},
{
"name": "CVE-2017-15274",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15274"
},
{
"name": "CVE-2017-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0861"
},
{
"name": "CVE-2017-16525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16525"
},
{
"name": "CVE-2018-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5344"
},
{
"name": "CVE-2015-8952",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8952"
},
{
"name": "CVE-2017-14051",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14051"
},
{
"name": "CVE-2017-0750",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0750"
},
{
"name": "CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"name": "CVE-2017-1000407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000407"
},
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15115"
},
{
"name": "CVE-2017-14489",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14489"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-17712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17712"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-15868",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15868"
},
{
"name": "CVE-2017-7542",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7542"
},
{
"name": "CVE-2017-14140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14140"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-7889",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7889"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
},
{
"name": "CVE-2017-14156",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14156"
},
{
"name": "CVE-2017-15102",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15102"
},
{
"name": "CVE-2017-5669",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5669"
},
{
"name": "CVE-2017-12192",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12192"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-094",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-22T00:00:00.000000"
},
{
"description": "Ajout des avis de s\u00e9curit\u00e9 Ubuntu du 23 f\u00e9vrier 2018",
"revision_date": "2018-02-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu . Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3582-2 du 21 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3582-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3580-1 du 21 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3580-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3583-1 du 23 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3583-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3582-1 du 21 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3582-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3583-2 du 23 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3583-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3581-2 du 21 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3581-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3581-3 du 23 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3581-3/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3581-1 du 21 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3581-1/"
}
]
}
CERTFR-2018-AVI-012
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les microgiciels Intel et AMD pour les systèmes RedHat. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server version AUS 6.5 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0040 du 5 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0040"
}
],
"reference": "CERTFR-2018-AVI-012",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les microgiciels Intel et AMD\npour les syst\u00e8mes RedHat. Elle permet \u00e0 un attaquant de provoquer une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les microgiciels Intel et AMD pour les syst\u00e8mes RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0040 du 5 janvier 2018",
"url": null
}
]
}
CERTFR-2018-AVI-095
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans SCADA les produits Siemens . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Se r\u00e9f\u00e9rer aux avis du constructeur pour les syst\u00e8mes affect\u00e9s (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5705",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5705"
},
{
"name": "CVE-2017-5708",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5708"
},
{
"name": "CVE-2017-5710",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5710"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5706",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5706"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5712"
},
{
"name": "CVE-2017-5707",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5707"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-15361",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15361"
},
{
"name": "CVE-2017-5709",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5709"
},
{
"name": "CVE-2017-5711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5711"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-095",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans SCADA les produits\nSiemens . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, une ex\u00e9cution de code\narbitraire et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans SCADA les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SCADA Siemens ssa-470231 du 22 f\u00e9vrier 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-470231.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SCADA Siemens ssa-168644 du 22 f\u00e9vrier 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-168644.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SCADA Siemens ssa-892715 du 22 f\u00e9vrier 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf"
}
]
}
CERTFR-2018-AVI-091
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-17864",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17864"
},
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"name": "CVE-2017-17862",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17862"
},
{
"name": "CVE-2017-17712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17712"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-091",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180482-1 du 20 f\u00e9vrier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180482-1/"
}
]
}
CERTFR-2018-AVI-206
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12190"
},
{
"name": "CVE-2017-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0861"
},
{
"name": "CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"name": "CVE-2017-18203",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18203"
},
{
"name": "CVE-2015-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5156"
},
{
"name": "CVE-2018-6927",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6927"
},
{
"name": "CVE-2016-7915",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7915"
},
{
"name": "CVE-2018-7757",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7757"
},
{
"name": "CVE-2018-8822",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8822"
},
{
"name": "CVE-2017-16644",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16644"
},
{
"name": "CVE-2017-18208",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18208"
},
{
"name": "CVE-2018-10087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10087"
},
{
"name": "CVE-2017-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13166"
},
{
"name": "CVE-2017-16914",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16914"
},
{
"name": "CVE-2017-16913",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16913"
},
{
"name": "CVE-2017-16912",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16912"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-16911",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16911"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-206",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1080-1 du 25 avril 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181080-1/"
}
]
}
CERTFR-2018-AVI-371
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-3688",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3688"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-371",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-08-03T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:2189-1 du 3 ao\u00fbt 2018",
"revision_date": "2018-08-06T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance\u00a0et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:2189-1 du 3 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182189-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:2177-1 du 2 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182177-1/"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2023-AVI-0220
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SINEC NMS | ||
| Siemens | N/A | De nombreuses références SCALANCE et SIPROTEC (se référer aux bulletins de sécurité de l'éditeur pour les versions affectées) | ||
| Siemens | N/A | RUGGEDCOM CROSSBOW versions antérieures à V5.3 | ||
| Siemens | N/A | Mendix SAML (Mendix 9 compatible, New Track) versions 3.1.9 à 3.2.x antérieures à V3.3.0 | ||
| Siemens | N/A | Mendix SAML (Mendix 7 compatible) versions antérieures à V1.17.3 | ||
| Siemens | N/A | Mendix SAML (Mendix 8 compatible) versions antérieures à V2.3.0 | ||
| Siemens | N/A | SINEMA Server V14 | ||
| Siemens | N/A | Mendix SAML (Mendix 9 compatible, Upgrade Track) versions 3.1.9 à 3.2.x antérieures à V3.3.0 | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) et NAM (6GK6108-4AM00-2DA2) versions antérieures à V7.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SINEC NMS",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "De nombreuses r\u00e9f\u00e9rences SCALANCE et SIPROTEC (se r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour les versions affect\u00e9es)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM CROSSBOW versions ant\u00e9rieures \u00e0 V5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 9 compatible, New Track) versions 3.1.9 \u00e0 3.2.x ant\u00e9rieures \u00e0 V3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 7 compatible) versions ant\u00e9rieures \u00e0 V1.17.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 8 compatible) versions ant\u00e9rieures \u00e0 V2.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA Server V14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 9 compatible, Upgrade Track) versions 3.1.9 \u00e0 3.2.x ant\u00e9rieures \u00e0 V3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) et NAM (6GK6108-4AM00-2DA2) versions ant\u00e9rieures \u00e0 V7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2019-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1125"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2022-24282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24282"
},
{
"name": "CVE-2019-1071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1071"
},
{
"name": "CVE-2022-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28356"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2018-12886",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12886"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2380"
},
{
"name": "CVE-2021-42373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42373"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-42377",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42377"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-24281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24281"
},
{
"name": "CVE-2022-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23037"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-23395",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23395"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2022-23042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23042"
},
{
"name": "CVE-2023-25957",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25957"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2021-42380",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
},
{
"name": "CVE-2022-38767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38767"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2022-23036",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23036"
},
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2023-27462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27462"
},
{
"name": "CVE-2022-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23038"
},
{
"name": "CVE-2023-27309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27309"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0494"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2022-23039",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23039"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2022-23040",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23040"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"name": "CVE-2022-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0547"
},
{
"name": "CVE-2021-42383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
},
{
"name": "CVE-2022-23041",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23041"
},
{
"name": "CVE-2022-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32981"
},
{
"name": "CVE-2022-26490",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26490"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2019-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1073"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-4149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4149"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2022-1199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1199"
},
{
"name": "CVE-2021-42375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42375"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2022-28390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28390"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2023-27310",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27310"
},
{
"name": "CVE-2022-30065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30065"
},
{
"name": "CVE-2022-25311",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25311"
},
{
"name": "CVE-2022-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
},
{
"name": "CVE-2023-27463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27463"
},
{
"name": "CVE-2022-1198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1198"
},
{
"name": "CVE-2022-20158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20158"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0220",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-419740 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-419740.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-320629 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-320629.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-250085 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-250085.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-203374 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-203374.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-851884 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-851884.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-565386 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-565386.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-260625 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-260625.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-726834 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-726834.html"
}
]
}
CERTFR-2023-AVI-0733
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMIT Simulation Platform toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1515R-2 PN (6AG1515-2RM00-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00) versions antérieures à 2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518HF-4 PN (6ES7518-4JP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK (6ES7518-4AP00-3AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1517H-3 PN (6AG1517-3HP00-4AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL (6AG2516-3AN01-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AM03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | JT2Go versions antérieures à 14.3.0.1 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK02-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN (6ES7516-2PN00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-S5 CC (6GK6015-0AL20-1AF1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN (6ES7513-2PL00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK (6ES7518-4FP00-3AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-1AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL (6AG2516-3AN02-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517H-3 PN (6ES7517-3HP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | RUGGEDCOM APE1808W10 CC (6GK6015-0AL20-0GJ1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | QMS Automotive versions antérieures à 12.39 | ||
| Siemens | N/A | Parasolid versions 36.0.x antérieures à 36.0.142 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.3.x antérieures à 14.3.0.1 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-1AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | PSS(R)ODMS versions 13.1.x antérieures à 13.1.12.1 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-S1 CC (6GK6015-0AL20-1AB1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TM01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.2.x antérieures à 14.2.0.6 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FP03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-1AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RL00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | PSS(R)E V35 toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UM01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FM03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK02-1AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | RUGGEDCOM APE1808 SAM-L CC (6GK6015-0AL20-0GN1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-S5 (6GK6015-0AL20-1AF0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00) versions antérieures à 2.2 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | PSS(R)CAPE versions 15.x antérieures à 15.0.22 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK01-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | RUGGEDCOM APE1808 ADM CC (6GK6015-0AL20-0GL1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808 ADM (6GK6015-0AL20-0GL0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-S3 (6GK6015-0AL20-1AD0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SJ01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | PSS(R)CAPE versions 14.x antérieures à 14.2023-08-23 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1510SP F-1 PN (6AG1510-1SJ01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AP03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | RUGGEDCOM APE1808 CKP CC (6GK6015-0AL20-0GK1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FL03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RM03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | PSS(R)ODMS V13.0 toutes versions | ||
| Siemens | N/A | SIMATIC WinCC OA versions 3.19.x antérieures à 3.19 P006 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | Parasolid versions 35.1.x antérieures à 35.1.184 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL (6AG2510-1SJ01-1AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL (6AG2515-2FM01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-S3 CC (6GK6015-0AL20-1AD1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK01-1AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808 ELAN (6GK6015-0AL20-0GP0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-P CC (6GK6015-0AL20-1AA1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RM00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | Parasolid versions 35.0.x antérieures à 35.0.253 | ||
| Siemens | N/A | SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN (6ES7516-2GN00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1515F-2 PN RAIL (6AG2515-2FM02-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TL03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808 CLOUDCONNECT (6GK6015-0AL20-0GM0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DJ01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.1.x antérieures à 14.1.0.11 | ||
| Siemens | N/A | RUGGEDCOM APE1808 SAM-L (6GK6015-0AL20-0GN0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) versions antérieures à 21.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller V2 versions antérieures à 21.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808LNX (6GK6015-0AL20-0GH0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808 CLOUDCONNECT CC (6GK6015-0AL20-0GM1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808LNX CC (6GK6015-0AL20-0GH1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-P (6GK6015-0AL20-1AA0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | PSS(R)E versions 34.x antérieures à 34.9.6 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | Parasolid versions 34.1.x antérieures à 34.1.258 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL (6AG2515-2RM00-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UL03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AL03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-S1 (6GK6015-0AL20-1AB0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | RUGGEDCOM APE1808W10 (6GK6015-0AL20-0GJ0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN (6ES7513-2GL00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808 ELAN CC (6GK6015-0AL20-0GP1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | Teamcenter Visualization versions 13.3.x antérieures à 13.3.0.12 | ||
| Siemens | N/A | RUGGEDCOM APE1808 CKP (6GK6015-0AL20-0GK0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1518HF-4 PN (6AG1518-4JP00-4AB0) versions antérieures à 3.0.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMIT Simulation Platform toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1515R-2 PN (6AG1515-2RM00-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00) versions ant\u00e9rieures \u00e0 2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518HF-4 PN (6ES7518-4JP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK (6ES7518-4AP00-3AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1517H-3 PN (6AG1517-3HP00-4AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL (6AG2516-3AN01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT2Go versions ant\u00e9rieures \u00e0 14.3.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK02-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN (6ES7516-2PN00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-S5 CC (6GK6015-0AL20-1AF1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN (6ES7513-2PL00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK (6ES7518-4FP00-3AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL (6AG2516-3AN02-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517H-3 PN (6ES7517-3HP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808W10 CC (6GK6015-0AL20-0GJ1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "QMS Automotive versions ant\u00e9rieures \u00e0 12.39",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid versions 36.0.x ant\u00e9rieures \u00e0 36.0.142",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.3.x ant\u00e9rieures \u00e0 14.3.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PSS(R)ODMS versions 13.1.x ant\u00e9rieures \u00e0 13.1.12.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-S1 CC (6GK6015-0AL20-1AB1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TM01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.2.x ant\u00e9rieures \u00e0 14.2.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FP03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RL00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PSS(R)E V35 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UM01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK02-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 SAM-L CC (6GK6015-0AL20-0GN1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-S5 (6GK6015-0AL20-1AF0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00) versions ant\u00e9rieures \u00e0 2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PSS(R)CAPE versions 15.x ant\u00e9rieures \u00e0 15.0.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 ADM CC (6GK6015-0AL20-0GL1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 ADM (6GK6015-0AL20-0GL0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-S3 (6GK6015-0AL20-1AD0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SJ01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PSS(R)CAPE versions 14.x ant\u00e9rieures \u00e0 14.2023-08-23",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1510SP F-1 PN (6AG1510-1SJ01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AP03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 CKP CC (6GK6015-0AL20-0GK1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FL03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PSS(R)ODMS V13.0 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA versions 3.19.x ant\u00e9rieures \u00e0 3.19 P006",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid versions 35.1.x ant\u00e9rieures \u00e0 35.1.184",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL (6AG2510-1SJ01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL (6AG2515-2FM01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-S3 CC (6GK6015-0AL20-1AD1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 ELAN (6GK6015-0AL20-0GP0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-P CC (6GK6015-0AL20-1AA1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RM00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid versions 35.0.x ant\u00e9rieures \u00e0 35.0.253",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN (6ES7516-2GN00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1515F-2 PN RAIL (6AG2515-2FM02-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TL03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 CLOUDCONNECT (6GK6015-0AL20-0GM0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DJ01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.1.x ant\u00e9rieures \u00e0 14.1.0.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 SAM-L (6GK6015-0AL20-0GN0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 21.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 Software Controller V2 versions ant\u00e9rieures \u00e0 21.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808LNX (6GK6015-0AL20-0GH0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 CLOUDCONNECT CC (6GK6015-0AL20-0GM1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808LNX CC (6GK6015-0AL20-0GH1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-P (6GK6015-0AL20-1AA0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PSS(R)E versions 34.x ant\u00e9rieures \u00e0 34.9.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid versions 34.1.x ant\u00e9rieures \u00e0 34.1.258",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL (6AG2515-2RM00-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UL03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AL03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-S1 (6GK6015-0AL20-1AB0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808W10 (6GK6015-0AL20-0GJ0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN (6ES7513-2GL00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 ELAN CC (6GK6015-0AL20-0GP1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 13.3.x ant\u00e9rieures \u00e0 13.3.0.12",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 CKP (6GK6015-0AL20-0GK0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1518HF-4 PN (6AG1518-4JP00-4AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-40728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40728"
},
{
"name": "CVE-2022-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35894"
},
{
"name": "CVE-2022-32953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32953"
},
{
"name": "CVE-2023-40724",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40724"
},
{
"name": "CVE-2023-27373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27373"
},
{
"name": "CVE-2023-3935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3935"
},
{
"name": "CVE-2023-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38072"
},
{
"name": "CVE-2023-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38075"
},
{
"name": "CVE-2022-30283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30283"
},
{
"name": "CVE-2023-38073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38073"
},
{
"name": "CVE-2023-40730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40730"
},
{
"name": "CVE-2023-24932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24932"
},
{
"name": "CVE-2023-40732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40732"
},
{
"name": "CVE-2022-32475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32475"
},
{
"name": "CVE-2022-29275",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29275"
},
{
"name": "CVE-2022-35893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35893"
},
{
"name": "CVE-2022-32954",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32954"
},
{
"name": "CVE-2023-40725",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40725"
},
{
"name": "CVE-2021-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38578"
},
{
"name": "CVE-2022-32469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32469"
},
{
"name": "CVE-2022-43958",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43958"
},
{
"name": "CVE-2023-41033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41033"
},
{
"name": "CVE-2022-27405",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27405"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2023-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38071"
},
{
"name": "CVE-2022-35895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35895"
},
{
"name": "CVE-2023-40726",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40726"
},
{
"name": "CVE-2022-24350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24350"
},
{
"name": "CVE-2023-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38070"
},
{
"name": "CVE-2022-32470",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32470"
},
{
"name": "CVE-2023-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38074"
},
{
"name": "CVE-2022-35896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35896"
},
{
"name": "CVE-2022-36338",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36338"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2023-28831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28831"
},
{
"name": "CVE-2022-32477",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32477"
},
{
"name": "CVE-2023-40727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40727"
},
{
"name": "CVE-2022-32471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32471"
},
{
"name": "CVE-2023-40731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40731"
},
{
"name": "CVE-2023-31041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31041"
},
{
"name": "CVE-2023-40729",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40729"
},
{
"name": "CVE-2022-30772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30772"
},
{
"name": "CVE-2023-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38076"
},
{
"name": "CVE-2023-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41032"
},
{
"name": "CVE-2022-24351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24351"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0733",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-278349 du 12 septembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-981975.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-147266 du 12 septembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-147266.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-240541 du 12 septembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-957369.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-957369 du 12 septembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-240541.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-190839 du 12 septembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-190839.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-981975 du 12 septembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-711309.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-711309 du 12 septembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-278349.html"
}
]
}
CERTFR-2018-AVI-013
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iOS versions ant\u00e9rieures \u00e0 11.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS High Sierra versions ant\u00e9rieures \u00e0 10.13.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 11.0.2",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-013",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nElles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208401 du 8 janvier 2018",
"url": "https://support.apple.com/fr-fr/HT208401"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208397 du 8 janvier 2018",
"url": "https://support.apple.com/fr-fr/HT208397"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208403 du 8 janvier 2018",
"url": "https://support.apple.com/fr-fr/HT208403"
}
]
}
CERTFR-2022-AVI-637
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits AMD. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à la confidentialité des données et une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | Processeurs AMD Ryzen Threadripper troisième génération | ||
| N/A | N/A | Processeurs AMD Athlon X4 | ||
| N/A | N/A | Processeurs AMD Athlon Mobile avec circuit graphique Radeon | ||
| N/A | N/A | Processeurs AMD Ryzen 4000 Séries Mobile avec circuit graphique Radeon | ||
| N/A | N/A | Processeurs AMD Ryzen 3000 Séries Desktop | ||
| N/A | N/A | Processeurs AMD EPYC seconde génération | ||
| N/A | N/A | Processeurs AMD Ryzen 4000 Séries Desktop avec circuit graphique Radeon | ||
| N/A | N/A | Processeurs AMD Ryzen Threadripper PRO | ||
| N/A | N/A | Processeurs AMD Ryzen Threadripper deuxième génération | ||
| N/A | N/A | Processeurs AMD Séries A APUs septième génération | ||
| N/A | N/A | Processeurs AMD Ryzen 2000 Séries Desktop | ||
| N/A | N/A | Processeurs AMD Athlon 3000 Séries Mobile avec Radeon | ||
| N/A | N/A | Processeurs AMD Ryzen 5000 Séries Mobile avec circuit graphique Radeon | ||
| N/A | N/A | Processeurs AMD EPYC première génération | ||
| N/A | N/A | Processeurs AMD Ryzen 2000 Séries Mobile | ||
| N/A | N/A | Processeurs AMD Ryzen 3000 Séries Mobile ou AMD Ryzen Mobile seconde génération avec circuit graphique Radeon |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Processeurs AMD Ryzen Threadripper troisi\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Athlon X4",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Athlon Mobile avec circuit graphique Radeon",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen 4000 S\u00e9ries Mobile avec circuit graphique Radeon",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen 3000 S\u00e9ries Desktop",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD EPYC seconde g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen 4000 S\u00e9ries Desktop avec circuit graphique Radeon",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen Threadripper PRO",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen Threadripper deuxi\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD S\u00e9ries A APUs septi\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen 2000 S\u00e9ries Desktop",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Athlon 3000 S\u00e9ries Mobile avec Radeon",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen 5000 S\u00e9ries Mobile avec circuit graphique Radeon",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD EPYC premi\u00e8re g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen 2000 S\u00e9ries Mobile",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen 3000 S\u00e9ries Mobile ou AMD Ryzen Mobile seconde g\u00e9n\u00e9ration avec circuit graphique Radeon",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-637",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits AMD.\nElles permettent \u00e0 un attaquant de provoquer un contournement de la\npolitique de s\u00e9curit\u00e9, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et\nune ex\u00e9cution de code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits AMD",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 AMD amd-sb-1037 du 12 juillet 2022",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
]
}
CERTFR-2018-AVI-016
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits VMware. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | ESXi | ESXi version 6.5 sans les correctifs de sécurité ESXi650-201801401-BG et ESXi650-201801402-BG | ||
| VMware | ESXi | ESXi version 5.5 sans le correctif de sécurité ESXi550-201801401-BG | ||
| VMware | Fusion | Fusion versions 8.x sur OS X versions antérieures à 8.5.10 | ||
| VMware | N/A | VC version 6.5 antérieures à 6.5 U1e | ||
| VMware | ESXi | ESXi version 6.0 sans les correctifs de sécurité ESXi600-201801401-BG et ESXi600-201801402-BG | ||
| VMware | N/A | Workstation versions 14.x antérieures à 14.1.1 | ||
| VMware | N/A | VC version 6.0 antérieures à 6.0 U3d | ||
| VMware | Fusion | Fusion versions 10.x sur OS X versions antérieures à 10.1.1 | ||
| VMware | N/A | VC version 5.5 antérieures à 5.5 U3g |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ESXi version 6.5 sans les correctifs de s\u00e9curit\u00e9 ESXi650-201801401-BG et ESXi650-201801402-BG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi version 5.5 sans le correctif de s\u00e9curit\u00e9 ESXi550-201801401-BG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Fusion versions 8.x sur OS X versions ant\u00e9rieures \u00e0 8.5.10",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VC version 6.5 ant\u00e9rieures \u00e0 6.5 U1e",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi version 6.0 sans les correctifs de s\u00e9curit\u00e9 ESXi600-201801401-BG et ESXi600-201801402-BG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Workstation versions 14.x ant\u00e9rieures \u00e0 14.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VC version 6.0 ant\u00e9rieures \u00e0 6.0 U3d",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Fusion versions 10.x sur OS X versions ant\u00e9rieures \u00e0 10.1.1",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VC version 5.5 ant\u00e9rieures \u00e0 5.5 U3g",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2018-0004 du 10 janvier 2018",
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0004.html"
}
],
"reference": "CERTFR-2018-AVI-016",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits VMware. Elle permet\n\u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2018-0004 du 9 janvier 2018",
"url": null
}
]
}
CERTFR-2018-AVI-044
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Moxa . Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Moxa | N/A | Moxa DA-680A Series | ||
| Moxa | N/A | Moxa V2403 Series | ||
| Moxa | V2201 Series | Moxa V2201 Series | ||
| Moxa | N/A | Moxa V2416A Series | ||
| Moxa | N/A | Moxa V2616A Series | ||
| Moxa | N/A | Moxa V2426A Series | ||
| Moxa | MC-1100 Series | Moxa MC-1100 Series | ||
| Moxa | N/A | Moxa V2406A Series | ||
| Moxa | N/A | Moxa DA-820 Series | ||
| Moxa | DA-720 Series | Moxa DA-720 Series |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Moxa DA-680A Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa V2403 Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa V2201 Series",
"product": {
"name": "V2201 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa V2416A Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa V2616A Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa V2426A Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa MC-1100 Series",
"product": {
"name": "MC-1100 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa V2406A Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa DA-820 Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa DA-720 Series",
"product": {
"name": "DA-720 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-044",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Moxa .\nElles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Moxa",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Moxa du 18 janvier 2018",
"url": "https://www.moxa.com/support/faq/faq_detail.aspx?id=2708"
}
]
}
CERTFR-2018-AVI-205
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2929"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-205",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:1252 du 25 avril 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1252"
}
]
}
CERTFR-2018-AVI-118
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans le noyau Linux d'Ubuntu. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-118",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-03-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux d\u0027Ubuntu. Elle\npermet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu 3594-1 du 9 mars 2018",
"url": "https://usn.ubuntu.com/3594-1/"
}
]
}
CERTFR-2023-AVI-0048
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 17 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0187"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 10 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0058"
}
],
"reference": "CERTFR-2023-AVI-0048",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de Red Hat\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0187 du 17 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0058 du 10 janvier 2023",
"url": null
}
]
}
CERTFR-2018-AVI-027
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits NVIDIA. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| FreeBSD | N/A | GeForce pour Linux, FreeBSD et Solaris versions R384 antérieures à 384.111 | ||
| FreeBSD | N/A | Quadro, NVS pour Linux, FreeBSD et Solaris versions R384 antérieures à 384.111 | ||
| Microsoft | Windows | Quadro, NVS pour Windows versions R384 antérieures à 386.07 | ||
| N/A | N/A | Tesla pour Linux versions R384 antérieures à 384.111 | ||
| Microsoft | Windows | Quadro, NVS pour Windows versions R390 antérieures à 390.65 | ||
| Microsoft | Windows | GeForce pour Windows versions antérieures à 390.65 | ||
| Microsoft | Windows | Tesla pour Windows versions R384 antérieures à 386.07 | ||
| FreeBSD | N/A | GeForce pour Linux, FreeBSD et Solaris versions R390 antérieures à 390.12 | ||
| FreeBSD | N/A | Quadro, NVS pour Linux, FreeBSD et Solaris versions R390 antérieures à 390.12 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GeForce pour Linux, FreeBSD et Solaris versions R384 ant\u00e9rieures \u00e0 384.111",
"product": {
"name": "N/A",
"vendor": {
"name": "FreeBSD",
"scada": false
}
}
},
{
"description": "Quadro, NVS pour Linux, FreeBSD et Solaris versions R384 ant\u00e9rieures \u00e0 384.111",
"product": {
"name": "N/A",
"vendor": {
"name": "FreeBSD",
"scada": false
}
}
},
{
"description": "Quadro, NVS pour Windows versions R384 ant\u00e9rieures \u00e0 386.07",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Tesla pour Linux versions R384 ant\u00e9rieures \u00e0 384.111",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Quadro, NVS pour Windows versions R390 ant\u00e9rieures \u00e0 390.65",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "GeForce pour Windows versions ant\u00e9rieures \u00e0 390.65",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Tesla pour Windows versions R384 ant\u00e9rieures \u00e0 386.07",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "GeForce pour Linux, FreeBSD et Solaris versions R390 ant\u00e9rieures \u00e0 390.12",
"product": {
"name": "N/A",
"vendor": {
"name": "FreeBSD",
"scada": false
}
}
},
{
"description": "Quadro, NVS pour Linux, FreeBSD et Solaris versions R390 ant\u00e9rieures \u00e0 390.12",
"product": {
"name": "N/A",
"vendor": {
"name": "FreeBSD",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-027",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nNVIDIA. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits NVIDIA",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 NVIDIA 4611 du 4 janvier 2018",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
}
]
}
CERTFR-2019-AVI-489
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC PROFINET Driver versions antérieures à V2.1 | ||
| Siemens | N/A | SINAMICS G120 V4.7 (PN Control Unit) versions antérieures à V4.7 SP10 HF5 | ||
| Siemens | N/A | SIMATIC CFU PA versions antérieures à V1.2.0 | ||
| Siemens | N/A | SINAMICS S120 V4.7 (Control Unit et CBE20) versions antérieures à V4.7 HF34 ou V5.2 HF2 | ||
| Siemens | N/A | SINAMICS GH150 V4.7 (Control Unit) versions antérieures à V4.8 SP2 HF9 | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN/2 HF versions antérieures à V4.2.2 | ||
| Siemens | N/A | SINAMICS G120 V4.7 (Control Unit) versions antérieures à V4.7 SP10 HF5 | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN/3 HF versions antérieures à V4.2.1 | ||
| Siemens | N/A | SCALANCE X-200IRT versions antérieures à V5.4.2 | ||
| Siemens | N/A | SINAMICS G130 V4.7 (Control Unit) versions antérieures à V4.7 HF29 ou V5.2 HF2 | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO:DK Standard Ethernet Controller versions antérieures à V4.1.1 Patch 05 | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO:EK-ERTEC 200P versions antérieures à V4.5.0 | ||
| Siemens | N/A | SINAMICS GL150 V4.7 (Control Unit) versions antérieures à V4.8 SP2 HF9 | ||
| Siemens | N/A | CP1616 versions antérieures à V2.8 | ||
| Siemens | N/A | SINAMICS G110M V4.7 (Control Unit) versions antérieures à V4.7 SP10 HF5 | ||
| Siemens | N/A | SIMATIC ET 200MP IM 155-5 PN BA versions antérieures à V4.2.3 | ||
| Siemens | N/A | SINAMICS G110M V4.7 (PN Control Unit) versions antérieures à V4.7 SP10 HF5 | ||
| Siemens | N/A | SINAMICS DCM versions antérieures à V1.5 HF1 | ||
| Siemens | N/A | SINAMICS GM150 V4.7 (Control Unit) versions antérieures à V4.8 SP2 HF9 | ||
| Siemens | N/A | SIMATIC IT UADM versions antérieures à V1.3 | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO:EK-ERTEC 200 versions antérieures à V4.5.0 Patch 01 | ||
| Siemens | N/A | SIMATIC S7-400H V6 versions antérieures à V6.0.9 | ||
| Siemens | N/A | SIMATIC WinAC RTX (F) 2010 versions antérieures à SIMATIC WinAC RTX 2010 SP3 avec les mises à jour BIOS et Windows | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN HF versions antérieures à V4.2.2 | ||
| Siemens | N/A | CP1604 versions antérieures à V2.8 | ||
| Siemens | N/A | SINUMERIK 828D versions antérieures à V4.8 SP5 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC PROFINET Driver versions ant\u00e9rieures \u00e0 V2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G120 V4.7 (PN Control Unit) versions ant\u00e9rieures \u00e0 V4.7 SP10 HF5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CFU PA versions ant\u00e9rieures \u00e0 V1.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS S120 V4.7 (Control Unit et CBE20) versions ant\u00e9rieures \u00e0 V4.7 HF34 ou V5.2 HF2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS GH150 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.8 SP2 HF9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN/2 HF versions ant\u00e9rieures \u00e0 V4.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G120 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.7 SP10 HF5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN/3 HF versions ant\u00e9rieures \u00e0 V4.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200IRT versions ant\u00e9rieures \u00e0 V5.4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G130 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.7 HF29 ou V5.2 HF2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO:DK Standard Ethernet Controller versions ant\u00e9rieures \u00e0 V4.1.1 Patch 05",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO:EK-ERTEC 200P versions ant\u00e9rieures \u00e0 V4.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS GL150 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.8 SP2 HF9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP1616 versions ant\u00e9rieures \u00e0 V2.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G110M V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.7 SP10 HF5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200MP IM 155-5 PN BA versions ant\u00e9rieures \u00e0 V4.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G110M V4.7 (PN Control Unit) versions ant\u00e9rieures \u00e0 V4.7 SP10 HF5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS DCM versions ant\u00e9rieures \u00e0 V1.5 HF1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS GM150 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.8 SP2 HF9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IT UADM versions ant\u00e9rieures \u00e0 V1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO:EK-ERTEC 200 versions ant\u00e9rieures \u00e0 V4.5.0 Patch 01",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400H V6 versions ant\u00e9rieures \u00e0 V6.0.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinAC RTX (F) 2010 versions ant\u00e9rieures \u00e0 SIMATIC WinAC RTX 2010 SP3 avec les mises \u00e0 jour BIOS et Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN HF versions ant\u00e9rieures \u00e0 V4.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP1604 versions ant\u00e9rieures \u00e0 V2.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINUMERIK 828D versions ant\u00e9rieures \u00e0 V4.8 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2019-10936",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10936"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-10923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10923"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2019-13929",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13929"
},
{
"name": "CVE-2019-13921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13921"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3640"
},
{
"name": "CVE-2018-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3615"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-489",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-10-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-608355 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-349422 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-349422.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-878278 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-878278.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-473245 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-473245.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-984700 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-984700.pdf"
}
]
}
CERTFR-2023-AVI-0048
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 17 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0187"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 10 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0058"
}
],
"reference": "CERTFR-2023-AVI-0048",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de Red Hat\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0187 du 17 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0058 du 10 janvier 2023",
"url": null
}
]
}
CERTFR-2018-AVI-038
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle Sun Systems Products Suite. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Integrated Lights Out Manager (ILOM) versions 3.x et 4.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Sun ZFS Storage Appliance Kit (AK) versions ant\u00e9rieures \u00e0 8.7.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle X86 Servers versions SW 1.x et SW 2.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Solaris versions 10 et 11.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-2560",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2560"
},
{
"name": "CVE-2018-2717",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2717"
},
{
"name": "CVE-2018-2664",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2664"
},
{
"name": "CVE-2018-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2577"
},
{
"name": "CVE-2018-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2623"
},
{
"name": "CVE-2018-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2624"
},
{
"name": "CVE-2018-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2566"
},
{
"name": "CVE-2016-0704",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0704"
},
{
"name": "CVE-2018-2611",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2611"
},
{
"name": "CVE-2018-2578",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2578"
},
{
"name": "CVE-2018-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2568"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-2710",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2710"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-038",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Sun Systems\nProducts Suite. Elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des\ndonn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Sun Systems Products Suite",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2018-3236630 du 16 janvier 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2018verbose-3236630#SUNS du 16 janvier 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018verbose-3236630.html#SUNS"
}
]
}
CERTFR-2018-AVI-028
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans le microgiciel Intel pour SUSE. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP2 et 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS et 12-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Point of Sale 11-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4 | ||
| SUSE | N/A | SUSE OpenStack Cloud 6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2 et 12-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 11-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP2 et 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-LTSS et 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Point of Sale 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2 et 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-028",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le microgiciel Intel pour SUSE.\nElle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le microgiciel Intel pour SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0067-1 du 11 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180067-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0068-1 du 11 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180068-1/"
}
]
}
CERTFR-2018-AVI-077
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware . Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "vSphere Integrated Containers (VIC)",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vRealize Automation (vRA)",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vCenter Server (vCSA)",
"product": {
"name": "vCenter Server",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vSphere Data Protection (VDP)",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vCloud Usage Meter (UM)",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Identity Manager (vIDM)",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-077",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware\n. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2018-0007 du 08 f\u00e9vrier 2018",
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
}
]
}
CERTFR-2018-AVI-104
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-18079",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18079"
},
{
"name": "CVE-2017-13215",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13215"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2015-1142857",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1142857"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2017-17741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17741"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-104",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service \u00e0 distance, un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0555-1 du 27 f\u00e9vrier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180555-1/"
}
]
}
CERTFR-2018-AVI-256
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Public Cloud 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Point of Sale 11-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4 | ||
| SUSE | N/A | OpenStack Cloud Magnum Orchestration 7 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP3 | ||
| SUSE | N/A | SUSE CaaS Platform ALL | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3 | ||
| SUSE | N/A | SUSE OpenStack Cloud 7 | ||
| SUSE | N/A | SUSE Enterprise Storage 4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 11-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Point of Sale 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "OpenStack Cloud Magnum Orchestration 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform ALL",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-10675",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
},
{
"name": "CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"name": "CVE-2018-10124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10124"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2018-10087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10087"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-1065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1065"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-256",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-05-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service,\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1366-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181366-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1376-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181376-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1375-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181375-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1368-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181368-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1377-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181377-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1374-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181374-1/"
}
]
}
CERTFR-2018-AVI-505
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199"
},
{
"name": "CVE-2018-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5391"
},
{
"name": "CVE-2018-1000204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000204"
},
{
"name": "CVE-2018-1087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1087"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-14634",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14634"
},
{
"name": "CVE-2018-9385",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9385"
},
{
"name": "CVE-2018-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1094"
},
{
"name": "CVE-2018-13406",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13406"
},
{
"name": "CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"name": "CVE-2017-18241",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18241"
},
{
"name": "CVE-2018-10124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10124"
},
{
"name": "CVE-2018-13053",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13053"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2018-17182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17182"
},
{
"name": "CVE-2018-8822",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8822"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2017-18249",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18249"
},
{
"name": "CVE-2018-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8043"
},
{
"name": "CVE-2018-10087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10087"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2017-18344",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18344"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-5390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
},
{
"name": "CVE-2017-18257",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18257"
},
{
"name": "CVE-2018-14633",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14633"
},
{
"name": "CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"name": "CVE-2018-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1093"
},
{
"name": "CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"name": "CVE-2018-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1092"
},
{
"name": "CVE-2018-5814",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5814"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-13305",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13305"
},
{
"name": "CVE-2018-14734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14734"
},
{
"name": "CVE-2018-1065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1065"
},
{
"name": "CVE-2018-7740",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7740"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-505",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-10-19T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 SUSE suse-su-20183238-1 du 18 octobre 2018",
"revision_date": "2018-10-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20183238-1 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183238-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181571-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181571-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181855-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181855-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20182344-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182344-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181377-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181377-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181173-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181173-2/"
}
]
}
CERTFR-2018-AVI-051
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-14106",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14106"
},
{
"name": "CVE-2017-16527",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16527"
},
{
"name": "CVE-2017-16531",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16531"
},
{
"name": "CVE-2017-7472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7472"
},
{
"name": "CVE-2017-16525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16525"
},
{
"name": "CVE-2017-16939",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16939"
},
{
"name": "CVE-2017-16536",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16536"
},
{
"name": "CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"name": "CVE-2017-13167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13167"
},
{
"name": "CVE-2017-16649",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16649"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2017-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15115"
},
{
"name": "CVE-2017-16538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16538"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-16537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16537"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-15868",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15868"
},
{
"name": "CVE-2017-16535",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16535"
},
{
"name": "CVE-2017-16534",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16534"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
},
{
"name": "CVE-2017-16529",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16529"
},
{
"name": "CVE-2017-15102",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15102"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0180-1 du 23 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180180-1/"
}
]
}
CERTFR-2018-AVI-175
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour ARM 64 7 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM System z (Structure A) 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power 9 7 ppc64le |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux pour ARM 64 7 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM System z (Structure A) 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power 9 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12190"
},
{
"name": "CVE-2017-1000410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000410"
},
{
"name": "CVE-2018-6927",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6927"
},
{
"name": "CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"name": "CVE-2017-15299",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15299"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"name": "CVE-2017-17448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17448"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-1000255",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000255"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2017-11473",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11473"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-175",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service,\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0654 du 10 avril 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0654"
}
]
}
CERTFR-2018-AVI-216
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Android toutes versions n\u0027int\u00e9grant pas le correctif de s\u00e9curit\u00e9 du 07 mai 2018",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-15832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15832"
},
{
"name": "CVE-2018-5852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5852"
},
{
"name": "CVE-2018-5845",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5845"
},
{
"name": "CVE-2018-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6246"
},
{
"name": "CVE-2018-3578",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3578"
},
{
"name": "CVE-2018-6254",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6254"
},
{
"name": "CVE-2018-3582",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3582"
},
{
"name": "CVE-2017-13312",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13312"
},
{
"name": "CVE-2017-13322",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13322"
},
{
"name": "CVE-2018-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5344"
},
{
"name": "CVE-2017-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15857"
},
{
"name": "CVE-2017-15843",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15843"
},
{
"name": "CVE-2017-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6293"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2017-13319",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13319"
},
{
"name": "CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"name": "CVE-2017-13318",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13318"
},
{
"name": "CVE-2017-18153",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18153"
},
{
"name": "CVE-2017-13313",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13313"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2018-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3576"
},
{
"name": "CVE-2018-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3572"
},
{
"name": "CVE-2018-3579",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3579"
},
{
"name": "CVE-2018-3581",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3581"
},
{
"name": "CVE-2017-6289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6289"
},
{
"name": "CVE-2017-13317",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13317"
},
{
"name": "CVE-2018-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3565"
},
{
"name": "CVE-2017-13316",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13316"
},
{
"name": "CVE-2017-13310",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13310"
},
{
"name": "CVE-2017-13315",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13315"
},
{
"name": "CVE-2018-5843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5843"
},
{
"name": "CVE-2018-3571",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3571"
},
{
"name": "CVE-2017-13321",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13321"
},
{
"name": "CVE-2017-18154",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18154"
},
{
"name": "CVE-2018-5844",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5844"
},
{
"name": "CVE-2018-5842",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5842"
},
{
"name": "CVE-2017-18070",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18070"
},
{
"name": "CVE-2018-5851",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5851"
},
{
"name": "CVE-2017-13314",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13314"
},
{
"name": "CVE-2017-13323",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13323"
},
{
"name": "CVE-2017-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15854"
},
{
"name": "CVE-2017-13320",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13320"
},
{
"name": "CVE-2018-5850",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5850"
},
{
"name": "CVE-2018-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5841"
},
{
"name": "CVE-2018-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5846"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-5847",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5847"
},
{
"name": "CVE-2018-5849",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5849"
},
{
"name": "CVE-2018-5840",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5840"
},
{
"name": "CVE-2017-13311",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13311"
},
{
"name": "CVE-2018-3562",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3562"
},
{
"name": "CVE-2018-5853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5853"
},
{
"name": "CVE-2017-15842",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15842"
},
{
"name": "CVE-2017-16643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16643"
},
{
"name": "CVE-2018-3580",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3580"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13309",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13309"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-216",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-05-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel/Nexus du 7 mai 2018",
"url": "https://source.android.com/security/bulletin/pixel/2018-05-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android du 7 mai 2018",
"url": "https://source.android.com/security/bulletin/2018-05-01"
}
]
}
CERTFR-2018-AVI-006
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware . Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware Workstation versions 12.x antérieures à 12.5.8 | ||
| VMware | ESXi | VMware ESXi versions 5.5 sans le correctif de sécurité ESXi550-201709101-SG | ||
| VMware | ESXi | VMware ESXi versions 6.0 sans le correctif de sécurité ESXi600-201711101-SG | ||
| VMware | ESXi | VMware ESXi versions 6.5 sans le correctif de sécurité ESXi650-201712101-SG | ||
| VMware | Fusion | VMware Fusion sur OS X versions 8.x antérieures à 8.5.9 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Workstation versions 12.x ant\u00e9rieures \u00e0 12.5.8",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi versions 5.5 sans le correctif de s\u00e9curit\u00e9 ESXi550-201709101-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi versions 6.0 sans le correctif de s\u00e9curit\u00e9 ESXi600-201711101-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi versions 6.5 sans le correctif de s\u00e9curit\u00e9 ESXi650-201712101-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Fusion sur OS X versions 8.x ant\u00e9rieures \u00e0 8.5.9",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-006",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-04T00:00:00.000000"
},
{
"description": "ajout du syst\u00e8me d\u0027exploitation affect\u00e9 pour VMware Fusion",
"revision_date": "2018-01-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware\n. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2018-0002 du 03 janvier 2018",
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0002.html"
}
]
}
CERTFR-2018-AVI-208
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Microsoft Windows. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows 10",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-208",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Microsoft Windows. Elle permet \u00e0\nun attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft KB4091666 du 24 avril 2018",
"url": "https://support.microsoft.com/en-sg/help/4091666/kb4091666-intel-microcode-updates"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft KB4091664 du 24 avril 2018",
"url": "https://support.microsoft.com/en-gb/help/4091664/kb4091664-intel-microcode-updates"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft KB4090007 du 24 avril 2018",
"url": "https://support.microsoft.com/en-us/help/4090007/intel-microcode-updates"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft KB4091663 du 24 avril 2018",
"url": "https://support.microsoft.com/fr-fr/help/4091663/kb4091663-intel-microcode-updates"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft KB4078407 du 24 avril 2018",
"url": "https://support.microsoft.com/en-us/help/4078407/update-to-enable-mitigation-against-spectre-variant-2"
}
]
}
CERTFR-2018-AVI-094
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu . Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 12.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12190"
},
{
"name": "CVE-2017-12153",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12153"
},
{
"name": "CVE-2017-15274",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15274"
},
{
"name": "CVE-2017-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0861"
},
{
"name": "CVE-2017-16525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16525"
},
{
"name": "CVE-2018-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5344"
},
{
"name": "CVE-2015-8952",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8952"
},
{
"name": "CVE-2017-14051",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14051"
},
{
"name": "CVE-2017-0750",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0750"
},
{
"name": "CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"name": "CVE-2017-1000407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000407"
},
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15115"
},
{
"name": "CVE-2017-14489",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14489"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-17712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17712"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-15868",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15868"
},
{
"name": "CVE-2017-7542",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7542"
},
{
"name": "CVE-2017-14140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14140"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-7889",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7889"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
},
{
"name": "CVE-2017-14156",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14156"
},
{
"name": "CVE-2017-15102",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15102"
},
{
"name": "CVE-2017-5669",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5669"
},
{
"name": "CVE-2017-12192",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12192"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-094",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-22T00:00:00.000000"
},
{
"description": "Ajout des avis de s\u00e9curit\u00e9 Ubuntu du 23 f\u00e9vrier 2018",
"revision_date": "2018-02-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu . Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3582-2 du 21 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3582-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3580-1 du 21 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3580-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3583-1 du 23 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3583-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3582-1 du 21 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3582-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3583-2 du 23 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3583-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3581-2 du 21 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3581-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3581-3 du 23 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3581-3/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3581-1 du 21 f\u00e9vrier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3581-1/"
}
]
}
CERTFR-2018-AVI-119
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Point of Sale 11-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 11-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Point of Sale 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-18079",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18079"
},
{
"name": "CVE-2017-13215",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13215"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2017-17741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17741"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-119",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-03-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0\ndistance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0660-1 du 12 mars 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180660-1/"
}
]
}
CERTFR-2018-AVI-005
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4 | ||
| SUSE | N/A | OpenStack Cloud Magnum Orchestration 7 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA | ||
| SUSE | N/A | SUSE Container as a Service Platform ALL | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for Raspberry Pi 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "OpenStack Cloud Magnum Orchestration 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Container as a Service Platform ALL",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-14106",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14106"
},
{
"name": "CVE-2017-7472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7472"
},
{
"name": "CVE-2017-16939",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16939"
},
{
"name": "CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"name": "CVE-2017-13167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13167"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2017-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15115"
},
{
"name": "CVE-2017-16538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16538"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-15868",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15868"
},
{
"name": "CVE-2017-16534",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16534"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-005",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180011-1 du 04 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180011-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180012-1 du 04 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180012-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180010-1 du 04 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180010-1/"
}
]
}
CERTFR-2018-AVI-059
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu . Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-059",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-29T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 Ubuntu usn-3549-1 du 29 janvier 2018",
"revision_date": "2018-01-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu . Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un\nd\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3549-1 du 29 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3549-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3548-1 du 26 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3548-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3548-2 du 26 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3548-2/"
}
]
}
CERTFR-2018-AVI-080
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12 | ||
| SUSE | N/A | OpenStack Cloud Magnum Orchestration 7 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for Raspberry Pi 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "OpenStack Cloud Magnum Orchestration 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-17864",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17864"
},
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"name": "CVE-2017-17862",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17862"
},
{
"name": "CVE-2017-17712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17712"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-080",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180416-1 du 09 f\u00e9vrier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180416-1/"
}
]
}
CERTFR-2018-AVI-059
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu . Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-059",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-29T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 Ubuntu usn-3549-1 du 29 janvier 2018",
"revision_date": "2018-01-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu . Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un\nd\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3549-1 du 29 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3549-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3548-1 du 26 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3548-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3548-2 du 26 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3548-2/"
}
]
}
CERTFR-2018-AVI-006
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware . Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware Workstation versions 12.x antérieures à 12.5.8 | ||
| VMware | ESXi | VMware ESXi versions 5.5 sans le correctif de sécurité ESXi550-201709101-SG | ||
| VMware | ESXi | VMware ESXi versions 6.0 sans le correctif de sécurité ESXi600-201711101-SG | ||
| VMware | ESXi | VMware ESXi versions 6.5 sans le correctif de sécurité ESXi650-201712101-SG | ||
| VMware | Fusion | VMware Fusion sur OS X versions 8.x antérieures à 8.5.9 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Workstation versions 12.x ant\u00e9rieures \u00e0 12.5.8",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi versions 5.5 sans le correctif de s\u00e9curit\u00e9 ESXi550-201709101-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi versions 6.0 sans le correctif de s\u00e9curit\u00e9 ESXi600-201711101-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi versions 6.5 sans le correctif de s\u00e9curit\u00e9 ESXi650-201712101-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Fusion sur OS X versions 8.x ant\u00e9rieures \u00e0 8.5.9",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-006",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-04T00:00:00.000000"
},
{
"description": "ajout du syst\u00e8me d\u0027exploitation affect\u00e9 pour VMware Fusion",
"revision_date": "2018-01-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware\n. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2018-0002 du 03 janvier 2018",
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0002.html"
}
]
}
CERTFR-2018-AVI-029
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 le noyau SUSE SUSE-SU-2018:0069-1 du 11 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180069-1/"
}
],
"reference": "CERTFR-2018-AVI-029",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0069-1 du 11 janvier 2018",
"url": null
}
]
}
CERTFR-2018-AVI-038
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle Sun Systems Products Suite. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Integrated Lights Out Manager (ILOM) versions 3.x et 4.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Sun ZFS Storage Appliance Kit (AK) versions ant\u00e9rieures \u00e0 8.7.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle X86 Servers versions SW 1.x et SW 2.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Solaris versions 10 et 11.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-2560",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2560"
},
{
"name": "CVE-2018-2717",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2717"
},
{
"name": "CVE-2018-2664",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2664"
},
{
"name": "CVE-2018-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2577"
},
{
"name": "CVE-2018-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2623"
},
{
"name": "CVE-2018-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2624"
},
{
"name": "CVE-2018-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2566"
},
{
"name": "CVE-2016-0704",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0704"
},
{
"name": "CVE-2018-2611",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2611"
},
{
"name": "CVE-2018-2578",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2578"
},
{
"name": "CVE-2018-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2568"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-2710",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2710"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-038",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Sun Systems\nProducts Suite. Elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des\ndonn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Sun Systems Products Suite",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2018-3236630 du 16 janvier 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2018verbose-3236630#SUNS du 16 janvier 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018verbose-3236630.html#SUNS"
}
]
}
CERTFR-2018-AVI-075
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP3 | ||
| SUSE | N/A | SUSE CaaS Platform ALL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Desktop 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform ALL",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-17864",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17864"
},
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"name": "CVE-2017-17862",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17862"
},
{
"name": "CVE-2017-17712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17712"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-075",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un d\u00e9ni\nde service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0383-1 du 7 f\u00e9vrier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180383-1/"
}
]
}
CERTFR-2018-AVI-206
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12190"
},
{
"name": "CVE-2017-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0861"
},
{
"name": "CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"name": "CVE-2017-18203",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18203"
},
{
"name": "CVE-2015-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5156"
},
{
"name": "CVE-2018-6927",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6927"
},
{
"name": "CVE-2016-7915",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7915"
},
{
"name": "CVE-2018-7757",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7757"
},
{
"name": "CVE-2018-8822",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8822"
},
{
"name": "CVE-2017-16644",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16644"
},
{
"name": "CVE-2017-18208",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18208"
},
{
"name": "CVE-2018-10087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10087"
},
{
"name": "CVE-2017-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13166"
},
{
"name": "CVE-2017-16914",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16914"
},
{
"name": "CVE-2017-16913",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16913"
},
{
"name": "CVE-2017-16912",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16912"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-16911",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16911"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-206",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1080-1 du 25 avril 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181080-1/"
}
]
}
CERTFR-2018-AVI-505
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199"
},
{
"name": "CVE-2018-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5391"
},
{
"name": "CVE-2018-1000204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000204"
},
{
"name": "CVE-2018-1087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1087"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-14634",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14634"
},
{
"name": "CVE-2018-9385",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9385"
},
{
"name": "CVE-2018-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1094"
},
{
"name": "CVE-2018-13406",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13406"
},
{
"name": "CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"name": "CVE-2017-18241",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18241"
},
{
"name": "CVE-2018-10124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10124"
},
{
"name": "CVE-2018-13053",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13053"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2018-17182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17182"
},
{
"name": "CVE-2018-8822",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8822"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2017-18249",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18249"
},
{
"name": "CVE-2018-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8043"
},
{
"name": "CVE-2018-10087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10087"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2017-18344",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18344"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-5390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
},
{
"name": "CVE-2017-18257",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18257"
},
{
"name": "CVE-2018-14633",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14633"
},
{
"name": "CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"name": "CVE-2018-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1093"
},
{
"name": "CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"name": "CVE-2018-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1092"
},
{
"name": "CVE-2018-5814",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5814"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-13305",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13305"
},
{
"name": "CVE-2018-14734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14734"
},
{
"name": "CVE-2018-1065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1065"
},
{
"name": "CVE-2018-7740",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7740"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-505",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-10-19T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 SUSE suse-su-20183238-1 du 18 octobre 2018",
"revision_date": "2018-10-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20183238-1 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183238-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181571-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181571-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181855-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181855-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20182344-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182344-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181377-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181377-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181173-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181173-2/"
}
]
}
CERTFR-2018-AVI-044
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Moxa . Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Moxa | N/A | Moxa DA-680A Series | ||
| Moxa | N/A | Moxa V2403 Series | ||
| Moxa | V2201 Series | Moxa V2201 Series | ||
| Moxa | N/A | Moxa V2416A Series | ||
| Moxa | N/A | Moxa V2616A Series | ||
| Moxa | N/A | Moxa V2426A Series | ||
| Moxa | MC-1100 Series | Moxa MC-1100 Series | ||
| Moxa | N/A | Moxa V2406A Series | ||
| Moxa | N/A | Moxa DA-820 Series | ||
| Moxa | DA-720 Series | Moxa DA-720 Series |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Moxa DA-680A Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa V2403 Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa V2201 Series",
"product": {
"name": "V2201 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa V2416A Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa V2616A Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa V2426A Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa MC-1100 Series",
"product": {
"name": "MC-1100 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa V2406A Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa DA-820 Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "Moxa DA-720 Series",
"product": {
"name": "DA-720 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-044",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Moxa .\nElles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Moxa",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Moxa du 18 janvier 2018",
"url": "https://www.moxa.com/support/faq/faq_detail.aspx?id=2708"
}
]
}
CERTFR-2018-AVI-009
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module pour Public Cloud 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 6 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module pour Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13167"
},
{
"name": "CVE-2017-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15115"
},
{
"name": "CVE-2017-16538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16538"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"name": "CVE-2017-15868",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15868"
},
{
"name": "CVE-2017-17448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17448"
},
{
"name": "CVE-2017-16534",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16534"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-009",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0031-1 du 5 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180031-1/"
}
]
}
CERTFR-2018-AVI-040
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans le micrologiciel processeur pour Red Hat . Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power 9 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.3 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.4 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 6.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 7 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 6 x86_64 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 6.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power 9 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.3 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.4 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 7 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-040",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le micrologiciel processeur pour\nRed Hat . Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le micrologiciel processeur pour Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:0093 du 16 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0093"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:0094 du 16 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0094"
}
]
}
CERTFR-2023-AVI-0067
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 9 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 9 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 9 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3077"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0399"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 23 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0400"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0395"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0440"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0392"
}
],
"reference": "CERTFR-2023-AVI-0067",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de Red Hat\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, un\ncontournement de la politique de s\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0392 du 24 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0440 du 24 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0399 du 24 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0400 du 24 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0334 du 23 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0395 du 24 janvier 2023",
"url": null
}
]
}
CERTFR-2019-AVI-489
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC PROFINET Driver versions antérieures à V2.1 | ||
| Siemens | N/A | SINAMICS G120 V4.7 (PN Control Unit) versions antérieures à V4.7 SP10 HF5 | ||
| Siemens | N/A | SIMATIC CFU PA versions antérieures à V1.2.0 | ||
| Siemens | N/A | SINAMICS S120 V4.7 (Control Unit et CBE20) versions antérieures à V4.7 HF34 ou V5.2 HF2 | ||
| Siemens | N/A | SINAMICS GH150 V4.7 (Control Unit) versions antérieures à V4.8 SP2 HF9 | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN/2 HF versions antérieures à V4.2.2 | ||
| Siemens | N/A | SINAMICS G120 V4.7 (Control Unit) versions antérieures à V4.7 SP10 HF5 | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN/3 HF versions antérieures à V4.2.1 | ||
| Siemens | N/A | SCALANCE X-200IRT versions antérieures à V5.4.2 | ||
| Siemens | N/A | SINAMICS G130 V4.7 (Control Unit) versions antérieures à V4.7 HF29 ou V5.2 HF2 | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO:DK Standard Ethernet Controller versions antérieures à V4.1.1 Patch 05 | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO:EK-ERTEC 200P versions antérieures à V4.5.0 | ||
| Siemens | N/A | SINAMICS GL150 V4.7 (Control Unit) versions antérieures à V4.8 SP2 HF9 | ||
| Siemens | N/A | CP1616 versions antérieures à V2.8 | ||
| Siemens | N/A | SINAMICS G110M V4.7 (Control Unit) versions antérieures à V4.7 SP10 HF5 | ||
| Siemens | N/A | SIMATIC ET 200MP IM 155-5 PN BA versions antérieures à V4.2.3 | ||
| Siemens | N/A | SINAMICS G110M V4.7 (PN Control Unit) versions antérieures à V4.7 SP10 HF5 | ||
| Siemens | N/A | SINAMICS DCM versions antérieures à V1.5 HF1 | ||
| Siemens | N/A | SINAMICS GM150 V4.7 (Control Unit) versions antérieures à V4.8 SP2 HF9 | ||
| Siemens | N/A | SIMATIC IT UADM versions antérieures à V1.3 | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO:EK-ERTEC 200 versions antérieures à V4.5.0 Patch 01 | ||
| Siemens | N/A | SIMATIC S7-400H V6 versions antérieures à V6.0.9 | ||
| Siemens | N/A | SIMATIC WinAC RTX (F) 2010 versions antérieures à SIMATIC WinAC RTX 2010 SP3 avec les mises à jour BIOS et Windows | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN HF versions antérieures à V4.2.2 | ||
| Siemens | N/A | CP1604 versions antérieures à V2.8 | ||
| Siemens | N/A | SINUMERIK 828D versions antérieures à V4.8 SP5 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC PROFINET Driver versions ant\u00e9rieures \u00e0 V2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G120 V4.7 (PN Control Unit) versions ant\u00e9rieures \u00e0 V4.7 SP10 HF5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CFU PA versions ant\u00e9rieures \u00e0 V1.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS S120 V4.7 (Control Unit et CBE20) versions ant\u00e9rieures \u00e0 V4.7 HF34 ou V5.2 HF2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS GH150 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.8 SP2 HF9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN/2 HF versions ant\u00e9rieures \u00e0 V4.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G120 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.7 SP10 HF5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN/3 HF versions ant\u00e9rieures \u00e0 V4.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200IRT versions ant\u00e9rieures \u00e0 V5.4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G130 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.7 HF29 ou V5.2 HF2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO:DK Standard Ethernet Controller versions ant\u00e9rieures \u00e0 V4.1.1 Patch 05",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO:EK-ERTEC 200P versions ant\u00e9rieures \u00e0 V4.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS GL150 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.8 SP2 HF9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP1616 versions ant\u00e9rieures \u00e0 V2.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G110M V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.7 SP10 HF5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200MP IM 155-5 PN BA versions ant\u00e9rieures \u00e0 V4.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G110M V4.7 (PN Control Unit) versions ant\u00e9rieures \u00e0 V4.7 SP10 HF5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS DCM versions ant\u00e9rieures \u00e0 V1.5 HF1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS GM150 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.8 SP2 HF9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IT UADM versions ant\u00e9rieures \u00e0 V1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO:EK-ERTEC 200 versions ant\u00e9rieures \u00e0 V4.5.0 Patch 01",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400H V6 versions ant\u00e9rieures \u00e0 V6.0.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinAC RTX (F) 2010 versions ant\u00e9rieures \u00e0 SIMATIC WinAC RTX 2010 SP3 avec les mises \u00e0 jour BIOS et Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN HF versions ant\u00e9rieures \u00e0 V4.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP1604 versions ant\u00e9rieures \u00e0 V2.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINUMERIK 828D versions ant\u00e9rieures \u00e0 V4.8 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2019-10936",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10936"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-10923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10923"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2019-13929",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13929"
},
{
"name": "CVE-2019-13921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13921"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3640"
},
{
"name": "CVE-2018-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3615"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-489",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-10-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-608355 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-349422 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-349422.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-878278 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-878278.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-473245 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-473245.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-984700 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-984700.pdf"
}
]
}
CERTFR-2018-AVI-004
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat . Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 6.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64 | ||
| Oracle | Virtualization | Red Hat Virtualization Host 4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 6 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.3 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.4 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.7 ppc64 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 x86_64",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 6 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.3 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.4 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-004",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-04T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0020 du 04 janvier 2018",
"revision_date": "2018-01-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat . Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0011 du 03 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0011"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0009 du 03 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0009"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0010 du 03 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0010"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0008 du 03 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0008"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0020 du 04 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0020"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0017 du 04 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0017"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0007 du 03 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0007"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0016 du 04 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0016"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0018 du 04 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0018"
}
]
}
CERTFR-2018-AVI-030
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans le microgiciel Intel pour Ubuntu. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-030",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le microgiciel Intel pour\nUbuntu. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le microgiciel Intel pour Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3531-1 du 11 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3531-1/"
}
]
}
CERTFR-2018-AVI-362
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Basesystem 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Legacy Software 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Development Tools 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Basesystem 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Legacy Software 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Development Tools 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000204"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-9385",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9385"
},
{
"name": "CVE-2018-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1118"
},
{
"name": "CVE-2018-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1094"
},
{
"name": "CVE-2018-13406",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13406"
},
{
"name": "CVE-2018-12233",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12233"
},
{
"name": "CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"name": "CVE-2018-10124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10124"
},
{
"name": "CVE-2018-1000200",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000200"
},
{
"name": "CVE-2018-13053",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13053"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2018-10087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10087"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-1120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1120"
},
{
"name": "CVE-2018-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1093"
},
{
"name": "CVE-2018-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1092"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-362",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182091-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182099-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182112-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182094-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182094-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182088-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182090-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182090-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182103-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182096-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182096-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182093-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182109-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182098-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182098-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182104-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182095-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182095-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182105-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182105-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182107-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182107-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182108-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182108-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182106-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182092-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182092-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182086-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182087-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182087-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182115-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182115-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182114-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182114-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182101-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182101-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182111-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182111-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182102-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182102-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182113-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182097-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182110-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182110-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182100-1 du 27 juillet 2018",
"url": null
}
]
}
CERTFR-2018-AVI-371
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-3688",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3688"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-371",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-08-03T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:2189-1 du 3 ao\u00fbt 2018",
"revision_date": "2018-08-06T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance\u00a0et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:2189-1 du 3 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182189-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:2177-1 du 2 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182177-1/"
}
]
}
CERTFR-2018-AVI-009
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module pour Public Cloud 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 6 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module pour Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13167"
},
{
"name": "CVE-2017-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15115"
},
{
"name": "CVE-2017-16538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16538"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"name": "CVE-2017-15868",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15868"
},
{
"name": "CVE-2017-17448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17448"
},
{
"name": "CVE-2017-16534",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16534"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-009",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0031-1 du 5 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180031-1/"
}
]
}
CERTFR-2021-AVI-456
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2021-24489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24489"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-456",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer un contournement\nde la politique de s\u00e9curit\u00e9, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4985-1 du 09 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-4985-1"
}
]
}
CERTFR-2018-AVI-040
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans le micrologiciel processeur pour Red Hat . Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power 9 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.3 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.4 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 6.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 7 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 6 x86_64 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 6.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power 9 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.3 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.4 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 7 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - 4 Year Extended Update Support 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-040",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le micrologiciel processeur pour\nRed Hat . Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le micrologiciel processeur pour Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:0093 du 16 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0093"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:0094 du 16 janvier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0094"
}
]
}
CERTFR-2018-AVI-077
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware . Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "vSphere Integrated Containers (VIC)",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vRealize Automation (vRA)",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vCenter Server (vCSA)",
"product": {
"name": "vCenter Server",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vSphere Data Protection (VDP)",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vCloud Usage Meter (UM)",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Identity Manager (vIDM)",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-077",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware\n. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2018-0007 du 08 f\u00e9vrier 2018",
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
}
]
}
CERTFR-2018-AVI-119
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Point of Sale 11-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 11-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Point of Sale 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-18079",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18079"
},
{
"name": "CVE-2017-13215",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13215"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2017-17741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17741"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-119",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-03-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0\ndistance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0660-1 du 12 mars 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180660-1/"
}
]
}
CERTFR-2018-AVI-079
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat . Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 5 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 5 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 5 x86_64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 5 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 5 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-079",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat . Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:0292 du 09 f\u00e9vrier 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
}
]
}
CERTFR-2018-AVI-256
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Public Cloud 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Point of Sale 11-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4 | ||
| SUSE | N/A | OpenStack Cloud Magnum Orchestration 7 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP3 | ||
| SUSE | N/A | SUSE CaaS Platform ALL | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3 | ||
| SUSE | N/A | SUSE OpenStack Cloud 7 | ||
| SUSE | N/A | SUSE Enterprise Storage 4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 11-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Point of Sale 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "OpenStack Cloud Magnum Orchestration 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform ALL",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-10675",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
},
{
"name": "CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"name": "CVE-2018-10124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10124"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2018-10087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10087"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-1065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1065"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-256",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-05-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service,\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1366-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181366-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1376-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181376-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1375-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181375-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1368-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181368-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1377-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181377-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1374-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181374-1/"
}
]
}
CERTFR-2018-AVI-080
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12 | ||
| SUSE | N/A | OpenStack Cloud Magnum Orchestration 7 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for Raspberry Pi 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "OpenStack Cloud Magnum Orchestration 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-17864",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17864"
},
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"name": "CVE-2017-17862",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17862"
},
{
"name": "CVE-2017-17712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17712"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-080",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180416-1 du 09 f\u00e9vrier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180416-1/"
}
]
}
CERTFR-2018-AVI-049
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 12.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-049",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3542-2 du 22 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3542-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3540-2 du 22 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3540-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3542-1 du 22 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3542-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3531-2 du 22 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3531-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3541-1 du 22 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3541-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3541-2 du 22 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3541-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3540-1 du 22 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3540-1/"
}
]
}
CERTFR-2018-AVI-039
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle Virtualization. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Virtualization | Oracle Secure Global Desktop (SGD) version 5.3 | ||
| Oracle | Virtualization | Oracle VM VirtualBox versions antérieures à 5.1.32 | ||
| Oracle | Virtualization | Oracle VM VirtualBox versions antérieures à 5.2.6 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Secure Global Desktop (SGD) version 5.3",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle VM VirtualBox versions ant\u00e9rieures \u00e0 5.1.32",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle VM VirtualBox versions ant\u00e9rieures \u00e0 5.2.6",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2698"
},
{
"name": "CVE-2018-2690",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2690"
},
{
"name": "CVE-2018-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2687"
},
{
"name": "CVE-2018-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2685"
},
{
"name": "CVE-2018-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2694"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-5645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5645"
},
{
"name": "CVE-2018-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2693"
},
{
"name": "CVE-2018-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2689"
},
{
"name": "CVE-2018-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2686"
},
{
"name": "CVE-2018-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2688"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2676"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-039",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle\nVirtualization. Elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des\ndonn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Virtualization",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2018-3236628 du 16 janvier 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2018verbose-3236630#OVIR du 16 janvier 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018verbose-3236630.html#OVIR"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2023-AVI-0733
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMIT Simulation Platform toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1515R-2 PN (6AG1515-2RM00-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00) versions antérieures à 2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518HF-4 PN (6ES7518-4JP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK (6ES7518-4AP00-3AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1517H-3 PN (6AG1517-3HP00-4AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL (6AG2516-3AN01-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AM03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | JT2Go versions antérieures à 14.3.0.1 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK02-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN (6ES7516-2PN00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-S5 CC (6GK6015-0AL20-1AF1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN (6ES7513-2PL00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK (6ES7518-4FP00-3AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-1AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL (6AG2516-3AN02-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517H-3 PN (6ES7517-3HP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | RUGGEDCOM APE1808W10 CC (6GK6015-0AL20-0GJ1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | QMS Automotive versions antérieures à 12.39 | ||
| Siemens | N/A | Parasolid versions 36.0.x antérieures à 36.0.142 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.3.x antérieures à 14.3.0.1 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-1AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | PSS(R)ODMS versions 13.1.x antérieures à 13.1.12.1 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-S1 CC (6GK6015-0AL20-1AB1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TM01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.2.x antérieures à 14.2.0.6 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FP03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-1AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RL00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | PSS(R)E V35 toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UM01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FM03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK02-1AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | RUGGEDCOM APE1808 SAM-L CC (6GK6015-0AL20-0GN1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-S5 (6GK6015-0AL20-1AF0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00) versions antérieures à 2.2 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | PSS(R)CAPE versions 15.x antérieures à 15.0.22 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK01-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | RUGGEDCOM APE1808 ADM CC (6GK6015-0AL20-0GL1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808 ADM (6GK6015-0AL20-0GL0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-S3 (6GK6015-0AL20-1AD0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SJ01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | PSS(R)CAPE versions 14.x antérieures à 14.2023-08-23 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1510SP F-1 PN (6AG1510-1SJ01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AP03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | RUGGEDCOM APE1808 CKP CC (6GK6015-0AL20-0GK1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FL03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RM03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | PSS(R)ODMS V13.0 toutes versions | ||
| Siemens | N/A | SIMATIC WinCC OA versions 3.19.x antérieures à 3.19 P006 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | Parasolid versions 35.1.x antérieures à 35.1.184 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL (6AG2510-1SJ01-1AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL (6AG2515-2FM01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-S3 CC (6GK6015-0AL20-1AD1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK01-1AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808 ELAN (6GK6015-0AL20-0GP0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-P CC (6GK6015-0AL20-1AA1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RM00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | Parasolid versions 35.0.x antérieures à 35.0.253 | ||
| Siemens | N/A | SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN (6ES7516-2GN00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1515F-2 PN RAIL (6AG2515-2FM02-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TL03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SK01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808 CLOUDCONNECT (6GK6015-0AL20-0GM0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DJ01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.1.x antérieures à 14.1.0.11 | ||
| Siemens | N/A | RUGGEDCOM APE1808 SAM-L (6GK6015-0AL20-0GN0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) versions antérieures à 21.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK02-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL02-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller V2 versions antérieures à 21.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808LNX (6GK6015-0AL20-0GH0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808 CLOUDCONNECT CC (6GK6015-0AL20-0GM1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-2AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808LNX CC (6GK6015-0AL20-0GH1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-P (6GK6015-0AL20-1AA0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | PSS(R)E versions 34.x antérieures à 34.9.6 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | Parasolid versions 34.1.x antérieures à 34.1.258 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RN03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL (6AG2515-2RM00-4AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-7AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UL03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM01-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AL03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | RUGGEDCOM APE1808CLA-S1 (6GK6015-0AL20-1AB0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | RUGGEDCOM APE1808W10 (6GK6015-0AL20-0GJ0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN (6ES7513-2GL00-0AB0) versions antérieures à 2.9.7 | ||
| Siemens | N/A | RUGGEDCOM APE1808 ELAN CC (6GK6015-0AL20-0GP1) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) versions antérieures à 3.0.3 | ||
| Siemens | N/A | Teamcenter Visualization versions 13.3.x antérieures à 13.3.0.12 | ||
| Siemens | N/A | RUGGEDCOM APE1808 CKP (6GK6015-0AL20-0GK0) versions antérieures à 1.0.212N | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1518HF-4 PN (6AG1518-4JP00-4AB0) versions antérieures à 3.0.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMIT Simulation Platform toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1515R-2 PN (6AG1515-2RM00-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00) versions ant\u00e9rieures \u00e0 2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518HF-4 PN (6ES7518-4JP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK (6ES7518-4AP00-3AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1517H-3 PN (6AG1517-3HP00-4AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL (6AG2516-3AN01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT2Go versions ant\u00e9rieures \u00e0 14.3.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK02-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN (6ES7516-2PN00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-S5 CC (6GK6015-0AL20-1AF1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN (6ES7513-2PL00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK (6ES7518-4FP00-3AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL (6AG2516-3AN02-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517H-3 PN (6ES7517-3HP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808W10 CC (6GK6015-0AL20-0GJ1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "QMS Automotive versions ant\u00e9rieures \u00e0 12.39",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid versions 36.0.x ant\u00e9rieures \u00e0 36.0.142",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.3.x ant\u00e9rieures \u00e0 14.3.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PSS(R)ODMS versions 13.1.x ant\u00e9rieures \u00e0 13.1.12.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-S1 CC (6GK6015-0AL20-1AB1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TM01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.2.x ant\u00e9rieures \u00e0 14.2.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FP03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RL00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PSS(R)E V35 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UM01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK02-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 SAM-L CC (6GK6015-0AL20-0GN1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-S5 (6GK6015-0AL20-1AF0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00) versions ant\u00e9rieures \u00e0 2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PSS(R)CAPE versions 15.x ant\u00e9rieures \u00e0 15.0.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 ADM CC (6GK6015-0AL20-0GL1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 ADM (6GK6015-0AL20-0GL0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-S3 (6GK6015-0AL20-1AD0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SJ01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PSS(R)CAPE versions 14.x ant\u00e9rieures \u00e0 14.2023-08-23",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1510SP F-1 PN (6AG1510-1SJ01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AP03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 CKP CC (6GK6015-0AL20-0GK1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FL03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PSS(R)ODMS V13.0 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA versions 3.19.x ant\u00e9rieures \u00e0 3.19 P006",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid versions 35.1.x ant\u00e9rieures \u00e0 35.1.184",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL (6AG2510-1SJ01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL (6AG2515-2FM01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-S3 CC (6GK6015-0AL20-1AD1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 ELAN (6GK6015-0AL20-0GP0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-P CC (6GK6015-0AL20-1AA1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RM00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid versions 35.0.x ant\u00e9rieures \u00e0 35.0.253",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN (6ES7516-2GN00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1515F-2 PN RAIL (6AG2515-2FM02-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TL03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 CLOUDCONNECT (6GK6015-0AL20-0GM0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DJ01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.1.x ant\u00e9rieures \u00e0 14.1.0.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 SAM-L (6GK6015-0AL20-0GN0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 21.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 Software Controller V2 versions ant\u00e9rieures \u00e0 21.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808LNX (6GK6015-0AL20-0GH0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 CLOUDCONNECT CC (6GK6015-0AL20-0GM1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808LNX CC (6GK6015-0AL20-0GH1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-P (6GK6015-0AL20-1AA0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PSS(R)E versions 34.x ant\u00e9rieures \u00e0 34.9.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid versions 34.1.x ant\u00e9rieures \u00e0 34.1.258",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL (6AG2515-2RM00-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UL03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AL03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808CLA-S1 (6GK6015-0AL20-1AB0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808W10 (6GK6015-0AL20-0GJ0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN (6ES7513-2GL00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 ELAN CC (6GK6015-0AL20-0GP1) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 13.3.x ant\u00e9rieures \u00e0 13.3.0.12",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 CKP (6GK6015-0AL20-0GK0) versions ant\u00e9rieures \u00e0 1.0.212N",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1518HF-4 PN (6AG1518-4JP00-4AB0) versions ant\u00e9rieures \u00e0 3.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-40728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40728"
},
{
"name": "CVE-2022-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35894"
},
{
"name": "CVE-2022-32953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32953"
},
{
"name": "CVE-2023-40724",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40724"
},
{
"name": "CVE-2023-27373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27373"
},
{
"name": "CVE-2023-3935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3935"
},
{
"name": "CVE-2023-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38072"
},
{
"name": "CVE-2023-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38075"
},
{
"name": "CVE-2022-30283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30283"
},
{
"name": "CVE-2023-38073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38073"
},
{
"name": "CVE-2023-40730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40730"
},
{
"name": "CVE-2023-24932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24932"
},
{
"name": "CVE-2023-40732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40732"
},
{
"name": "CVE-2022-32475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32475"
},
{
"name": "CVE-2022-29275",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29275"
},
{
"name": "CVE-2022-35893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35893"
},
{
"name": "CVE-2022-32954",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32954"
},
{
"name": "CVE-2023-40725",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40725"
},
{
"name": "CVE-2021-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38578"
},
{
"name": "CVE-2022-32469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32469"
},
{
"name": "CVE-2022-43958",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43958"
},
{
"name": "CVE-2023-41033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41033"
},
{
"name": "CVE-2022-27405",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27405"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2023-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38071"
},
{
"name": "CVE-2022-35895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35895"
},
{
"name": "CVE-2023-40726",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40726"
},
{
"name": "CVE-2022-24350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24350"
},
{
"name": "CVE-2023-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38070"
},
{
"name": "CVE-2022-32470",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32470"
},
{
"name": "CVE-2023-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38074"
},
{
"name": "CVE-2022-35896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35896"
},
{
"name": "CVE-2022-36338",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36338"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2023-28831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28831"
},
{
"name": "CVE-2022-32477",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32477"
},
{
"name": "CVE-2023-40727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40727"
},
{
"name": "CVE-2022-32471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32471"
},
{
"name": "CVE-2023-40731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40731"
},
{
"name": "CVE-2023-31041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31041"
},
{
"name": "CVE-2023-40729",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40729"
},
{
"name": "CVE-2022-30772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30772"
},
{
"name": "CVE-2023-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38076"
},
{
"name": "CVE-2023-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41032"
},
{
"name": "CVE-2022-24351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24351"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0733",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-278349 du 12 septembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-981975.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-147266 du 12 septembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-147266.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-240541 du 12 septembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-957369.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-957369 du 12 septembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-240541.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-190839 du 12 septembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-190839.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-981975 du 12 septembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-711309.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-711309 du 12 septembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-278349.html"
}
]
}
CERTFR-2018-AVI-029
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 le noyau SUSE SUSE-SU-2018:0069-1 du 11 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180069-1/"
}
],
"reference": "CERTFR-2018-AVI-029",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0069-1 du 11 janvier 2018",
"url": null
}
]
}
CERTFR-2018-AVI-196
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP3 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-17975",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17975"
},
{
"name": "CVE-2017-17864",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17864"
},
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"name": "CVE-2017-16644",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16644"
},
{
"name": "CVE-2017-17862",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17862"
},
{
"name": "CVE-2017-18208",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18208"
},
{
"name": "CVE-2017-17712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17712"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2017-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13166"
},
{
"name": "CVE-2018-8087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8087"
},
{
"name": "CVE-2018-1000026",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000026"
},
{
"name": "CVE-2017-16913",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16913"
},
{
"name": "CVE-2017-18174",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18174"
},
{
"name": "CVE-2017-16912",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16912"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2017-15951",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15951"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-196",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180986-1 du 19 avril 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180986-1/"
}
]
}
CERTFR-2018-AVI-075
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP3 | ||
| SUSE | N/A | SUSE CaaS Platform ALL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Desktop 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform ALL",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-17864",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17864"
},
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"name": "CVE-2017-17862",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17862"
},
{
"name": "CVE-2017-17712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17712"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-075",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un d\u00e9ni\nde service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0383-1 du 7 f\u00e9vrier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180383-1/"
}
]
}
CERTFR-2018-AVI-134
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-134",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-03-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3597-2 du 15 mars 2018",
"url": "https://usn.ubuntu.com/3597-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3597-1 du 15 mars 2018",
"url": "https://usn.ubuntu.com/3597-1/"
}
]
}
CERTFR-2018-AVI-056
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-1000410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000410"
},
{
"name": "CVE-2017-16646",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16646"
},
{
"name": "CVE-2017-7482",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7482"
},
{
"name": "CVE-2017-16939",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16939"
},
{
"name": "CVE-2017-1000405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000405"
},
{
"name": "CVE-2017-16536",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16536"
},
{
"name": "CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2017-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15115"
},
{
"name": "CVE-2017-16528",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16528"
},
{
"name": "CVE-2017-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16994"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-16537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16537"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"name": "CVE-2017-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16645"
},
{
"name": "CVE-2017-17448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17448"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-12193",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12193"
},
{
"name": "CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-056",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0213-1 du 25 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180213-1/"
}
]
}
CERTFR-2018-AVI-030
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans le microgiciel Intel pour Ubuntu. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-030",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le microgiciel Intel pour\nUbuntu. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le microgiciel Intel pour Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3531-1 du 11 janvier 2018",
"url": "https://usn.ubuntu.com/usn/usn-3531-1/"
}
]
}
CERTFR-2018-AVI-051
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-14106",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14106"
},
{
"name": "CVE-2017-16527",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16527"
},
{
"name": "CVE-2017-16531",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16531"
},
{
"name": "CVE-2017-7472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7472"
},
{
"name": "CVE-2017-16525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16525"
},
{
"name": "CVE-2017-16939",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16939"
},
{
"name": "CVE-2017-16536",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16536"
},
{
"name": "CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"name": "CVE-2017-13167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13167"
},
{
"name": "CVE-2017-16649",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16649"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2017-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15115"
},
{
"name": "CVE-2017-16538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16538"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-16537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16537"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-15868",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15868"
},
{
"name": "CVE-2017-16535",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16535"
},
{
"name": "CVE-2017-16534",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16534"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
},
{
"name": "CVE-2017-16529",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16529"
},
{
"name": "CVE-2017-15102",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15102"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0180-1 du 23 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180180-1/"
}
]
}
CERTFR-2018-AVI-056
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-1000410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000410"
},
{
"name": "CVE-2017-16646",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16646"
},
{
"name": "CVE-2017-7482",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7482"
},
{
"name": "CVE-2017-16939",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16939"
},
{
"name": "CVE-2017-1000405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000405"
},
{
"name": "CVE-2017-16536",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16536"
},
{
"name": "CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2017-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15115"
},
{
"name": "CVE-2017-16528",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16528"
},
{
"name": "CVE-2017-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16994"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-16537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16537"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"name": "CVE-2017-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16645"
},
{
"name": "CVE-2017-17448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17448"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-12193",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12193"
},
{
"name": "CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-056",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:0213-1 du 25 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180213-1/"
}
]
}
CERTFR-2022-AVI-637
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits AMD. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à la confidentialité des données et une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | Processeurs AMD Ryzen Threadripper troisième génération | ||
| N/A | N/A | Processeurs AMD Athlon X4 | ||
| N/A | N/A | Processeurs AMD Athlon Mobile avec circuit graphique Radeon | ||
| N/A | N/A | Processeurs AMD Ryzen 4000 Séries Mobile avec circuit graphique Radeon | ||
| N/A | N/A | Processeurs AMD Ryzen 3000 Séries Desktop | ||
| N/A | N/A | Processeurs AMD EPYC seconde génération | ||
| N/A | N/A | Processeurs AMD Ryzen 4000 Séries Desktop avec circuit graphique Radeon | ||
| N/A | N/A | Processeurs AMD Ryzen Threadripper PRO | ||
| N/A | N/A | Processeurs AMD Ryzen Threadripper deuxième génération | ||
| N/A | N/A | Processeurs AMD Séries A APUs septième génération | ||
| N/A | N/A | Processeurs AMD Ryzen 2000 Séries Desktop | ||
| N/A | N/A | Processeurs AMD Athlon 3000 Séries Mobile avec Radeon | ||
| N/A | N/A | Processeurs AMD Ryzen 5000 Séries Mobile avec circuit graphique Radeon | ||
| N/A | N/A | Processeurs AMD EPYC première génération | ||
| N/A | N/A | Processeurs AMD Ryzen 2000 Séries Mobile | ||
| N/A | N/A | Processeurs AMD Ryzen 3000 Séries Mobile ou AMD Ryzen Mobile seconde génération avec circuit graphique Radeon |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Processeurs AMD Ryzen Threadripper troisi\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Athlon X4",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Athlon Mobile avec circuit graphique Radeon",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen 4000 S\u00e9ries Mobile avec circuit graphique Radeon",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen 3000 S\u00e9ries Desktop",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD EPYC seconde g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen 4000 S\u00e9ries Desktop avec circuit graphique Radeon",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen Threadripper PRO",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen Threadripper deuxi\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD S\u00e9ries A APUs septi\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen 2000 S\u00e9ries Desktop",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Athlon 3000 S\u00e9ries Mobile avec Radeon",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen 5000 S\u00e9ries Mobile avec circuit graphique Radeon",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD EPYC premi\u00e8re g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen 2000 S\u00e9ries Mobile",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Processeurs AMD Ryzen 3000 S\u00e9ries Mobile ou AMD Ryzen Mobile seconde g\u00e9n\u00e9ration avec circuit graphique Radeon",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-637",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits AMD.\nElles permettent \u00e0 un attaquant de provoquer un contournement de la\npolitique de s\u00e9curit\u00e9, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et\nune ex\u00e9cution de code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits AMD",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 AMD amd-sb-1037 du 12 juillet 2022",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
]
}
CERTFR-2018-AVI-032
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13167"
},
{
"name": "CVE-2017-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15115"
},
{
"name": "CVE-2017-16538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16538"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"name": "CVE-2017-15868",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15868"
},
{
"name": "CVE-2017-17448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17448"
},
{
"name": "CVE-2017-16534",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16534"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-032",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180115-1 du 16 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180115-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180113-1 du 16 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180113-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180114-1 du 16 janvier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180114-1/"
}
]
}
CERTFR-2018-AVI-362
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Basesystem 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Legacy Software 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Development Tools 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Basesystem 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Legacy Software 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Development Tools 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000204"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-9385",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9385"
},
{
"name": "CVE-2018-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1118"
},
{
"name": "CVE-2018-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1094"
},
{
"name": "CVE-2018-13406",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13406"
},
{
"name": "CVE-2018-12233",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12233"
},
{
"name": "CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"name": "CVE-2018-10124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10124"
},
{
"name": "CVE-2018-1000200",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000200"
},
{
"name": "CVE-2018-13053",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13053"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2018-10087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10087"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-1120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1120"
},
{
"name": "CVE-2018-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1093"
},
{
"name": "CVE-2018-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1092"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-362",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182091-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182099-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182112-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182094-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182094-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182088-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182090-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182090-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182103-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182096-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182096-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182093-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182109-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182098-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182098-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182104-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182095-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182095-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182105-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182105-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182107-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182107-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182108-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182108-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182106-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182092-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182092-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182086-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182087-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182087-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182115-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182115-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182114-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182114-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182101-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182101-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182111-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182111-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182102-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182102-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182113-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182097-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182110-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182110-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182100-1 du 27 juillet 2018",
"url": null
}
]
}
CERTFR-2023-AVI-0220
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SINEC NMS | ||
| Siemens | N/A | De nombreuses références SCALANCE et SIPROTEC (se référer aux bulletins de sécurité de l'éditeur pour les versions affectées) | ||
| Siemens | N/A | RUGGEDCOM CROSSBOW versions antérieures à V5.3 | ||
| Siemens | N/A | Mendix SAML (Mendix 9 compatible, New Track) versions 3.1.9 à 3.2.x antérieures à V3.3.0 | ||
| Siemens | N/A | Mendix SAML (Mendix 7 compatible) versions antérieures à V1.17.3 | ||
| Siemens | N/A | Mendix SAML (Mendix 8 compatible) versions antérieures à V2.3.0 | ||
| Siemens | N/A | SINEMA Server V14 | ||
| Siemens | N/A | Mendix SAML (Mendix 9 compatible, Upgrade Track) versions 3.1.9 à 3.2.x antérieures à V3.3.0 | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) et NAM (6GK6108-4AM00-2DA2) versions antérieures à V7.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SINEC NMS",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "De nombreuses r\u00e9f\u00e9rences SCALANCE et SIPROTEC (se r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour les versions affect\u00e9es)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM CROSSBOW versions ant\u00e9rieures \u00e0 V5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 9 compatible, New Track) versions 3.1.9 \u00e0 3.2.x ant\u00e9rieures \u00e0 V3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 7 compatible) versions ant\u00e9rieures \u00e0 V1.17.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 8 compatible) versions ant\u00e9rieures \u00e0 V2.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA Server V14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 9 compatible, Upgrade Track) versions 3.1.9 \u00e0 3.2.x ant\u00e9rieures \u00e0 V3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) et NAM (6GK6108-4AM00-2DA2) versions ant\u00e9rieures \u00e0 V7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2019-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1125"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2022-24282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24282"
},
{
"name": "CVE-2019-1071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1071"
},
{
"name": "CVE-2022-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28356"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2018-12886",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12886"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2380"
},
{
"name": "CVE-2021-42373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42373"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-42377",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42377"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-24281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24281"
},
{
"name": "CVE-2022-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23037"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-23395",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23395"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2022-23042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23042"
},
{
"name": "CVE-2023-25957",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25957"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2021-42380",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
},
{
"name": "CVE-2022-38767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38767"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2022-23036",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23036"
},
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2023-27462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27462"
},
{
"name": "CVE-2022-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23038"
},
{
"name": "CVE-2023-27309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27309"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0494"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2022-23039",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23039"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2022-23040",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23040"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"name": "CVE-2022-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0547"
},
{
"name": "CVE-2021-42383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
},
{
"name": "CVE-2022-23041",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23041"
},
{
"name": "CVE-2022-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32981"
},
{
"name": "CVE-2022-26490",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26490"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2019-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1073"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-4149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4149"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2022-1199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1199"
},
{
"name": "CVE-2021-42375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42375"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2022-28390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28390"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2023-27310",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27310"
},
{
"name": "CVE-2022-30065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30065"
},
{
"name": "CVE-2022-25311",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25311"
},
{
"name": "CVE-2022-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
},
{
"name": "CVE-2023-27463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27463"
},
{
"name": "CVE-2022-1198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1198"
},
{
"name": "CVE-2022-20158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20158"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0220",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-419740 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-419740.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-320629 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-320629.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-250085 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-250085.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-203374 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-203374.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-851884 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-851884.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-565386 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-565386.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-260625 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-260625.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-726834 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-726834.html"
}
]
}
CERTFR-2018-AVI-027
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits NVIDIA. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| FreeBSD | N/A | GeForce pour Linux, FreeBSD et Solaris versions R384 antérieures à 384.111 | ||
| FreeBSD | N/A | Quadro, NVS pour Linux, FreeBSD et Solaris versions R384 antérieures à 384.111 | ||
| Microsoft | Windows | Quadro, NVS pour Windows versions R384 antérieures à 386.07 | ||
| N/A | N/A | Tesla pour Linux versions R384 antérieures à 384.111 | ||
| Microsoft | Windows | Quadro, NVS pour Windows versions R390 antérieures à 390.65 | ||
| Microsoft | Windows | GeForce pour Windows versions antérieures à 390.65 | ||
| Microsoft | Windows | Tesla pour Windows versions R384 antérieures à 386.07 | ||
| FreeBSD | N/A | GeForce pour Linux, FreeBSD et Solaris versions R390 antérieures à 390.12 | ||
| FreeBSD | N/A | Quadro, NVS pour Linux, FreeBSD et Solaris versions R390 antérieures à 390.12 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GeForce pour Linux, FreeBSD et Solaris versions R384 ant\u00e9rieures \u00e0 384.111",
"product": {
"name": "N/A",
"vendor": {
"name": "FreeBSD",
"scada": false
}
}
},
{
"description": "Quadro, NVS pour Linux, FreeBSD et Solaris versions R384 ant\u00e9rieures \u00e0 384.111",
"product": {
"name": "N/A",
"vendor": {
"name": "FreeBSD",
"scada": false
}
}
},
{
"description": "Quadro, NVS pour Windows versions R384 ant\u00e9rieures \u00e0 386.07",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Tesla pour Linux versions R384 ant\u00e9rieures \u00e0 384.111",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Quadro, NVS pour Windows versions R390 ant\u00e9rieures \u00e0 390.65",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "GeForce pour Windows versions ant\u00e9rieures \u00e0 390.65",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Tesla pour Windows versions R384 ant\u00e9rieures \u00e0 386.07",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "GeForce pour Linux, FreeBSD et Solaris versions R390 ant\u00e9rieures \u00e0 390.12",
"product": {
"name": "N/A",
"vendor": {
"name": "FreeBSD",
"scada": false
}
}
},
{
"description": "Quadro, NVS pour Linux, FreeBSD et Solaris versions R390 ant\u00e9rieures \u00e0 390.12",
"product": {
"name": "N/A",
"vendor": {
"name": "FreeBSD",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-027",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nNVIDIA. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits NVIDIA",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 NVIDIA 4611 du 4 janvier 2018",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
}
]
}
CERTFR-2018-AVI-170
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.10 sur Raspberry Pi 2",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 12.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0861"
},
{
"name": "CVE-2017-16646",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16646"
},
{
"name": "CVE-2017-18203",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18203"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2017-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12762"
},
{
"name": "CVE-2018-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5344"
},
{
"name": "CVE-2017-16536",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16536"
},
{
"name": "CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"name": "CVE-2017-1000407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000407"
},
{
"name": "CVE-2018-6927",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6927"
},
{
"name": "CVE-2017-11472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11472"
},
{
"name": "CVE-2018-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5333"
},
{
"name": "CVE-2017-16649",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16649"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"name": "CVE-2017-16528",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16528"
},
{
"name": "CVE-2017-11089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11089"
},
{
"name": "CVE-2017-17862",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17862"
},
{
"name": "CVE-2018-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8043"
},
{
"name": "CVE-2017-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16994"
},
{
"name": "CVE-2017-18208",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18208"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2018-5332",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5332"
},
{
"name": "CVE-2017-16914",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16914"
},
{
"name": "CVE-2017-18075",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18075"
},
{
"name": "CVE-2017-16537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16537"
},
{
"name": "CVE-2017-17450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17450"
},
{
"name": "CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"name": "CVE-2018-1000026",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000026"
},
{
"name": "CVE-2017-16913",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16913"
},
{
"name": "CVE-2017-18204",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18204"
},
{
"name": "CVE-2017-16532",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16532"
},
{
"name": "CVE-2017-16650",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16650"
},
{
"name": "CVE-2017-16647",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16647"
},
{
"name": "CVE-2017-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16645"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2017-17448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17448"
},
{
"name": "CVE-2017-16912",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16912"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-16911",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16911"
},
{
"name": "CVE-2017-7518",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7518"
},
{
"name": "CVE-2017-16995",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16995"
},
{
"name": "CVE-2017-17741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17741"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-170",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-05T00:00:00.000000"
},
{
"description": "Ajout des bulletins de s\u00e9curit\u00e9 Ubuntu du 05 avril 2018",
"revision_date": "2018-04-06T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu . Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3620-2 du 05 avril 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3617-3 du 04 avril 2018",
"url": "https://usn.ubuntu.com/3617-3/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3619-1 du 04 avril 2018",
"url": "https://usn.ubuntu.com/3619-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3620-2 du 04 avril 2018",
"url": "https://usn.ubuntu.com/3620-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3620-1 du 04 avril 2018",
"url": "https://usn.ubuntu.com/3620-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3619-2 du 05 avril 2018",
"url": null
}
]
}
CERTFR-2018-AVI-339
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Contrail Service Orchestration (CSO) versions antérieures à 4.0.0 et 3.3.0 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 18.1R1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X46-D45, 12.1X46-D67, 12.1X46-D76, 12.1X46-D77, 12.3R11, 12.3R12-S10, 12.3X48-D20, 12.3X48-D25, 12.3X48-D55, 12.3X48-D66, 12.3X48-D70, 12.3X54-D34, 14.1X53-D30, 14.1X53-D47, 15.1F5-S5, 15.1F6-S1, 15.1F6-S10, 15.1F7, 15.1R4-S5, 15.1R4-S9, 15.1R5, 15.1R6-S6, 15.1R7, 15.1R7-S1, 15.1R8, 15.1X49-D110, 15.1X49-D131, 15.1X49-D140, 15.1X49-D20, 15.1X49-D35, 15.1X53-D233, 15.1X53-D234, 15.1X53-D47, 15.1X53-D470, 15.1X53-D471, 15.1X53-D490, 15.1X53-D59, 15.1X53-D60, 15.1X53-D67, 15.1X54-D70, 15.1X8.3, 16.1R2, 16.1R3, 16.1R3-S8, 16.1R3-S9, 16.1R4-S10, 16.1R4-S8, 16.1R4-S9, 16.1R5-S4, 16.1R6-S1, 16.1R6-S3, 16.1R6-S4, 16.1R7, 16.1X65-D46, 16.1X65-D47, 16.2R1, 16.2R1-S6, 16.2R1-S7, 16.2R2-S5, 16.2R2-S6, 16.2R3, 17.1R1-S7, 17.1R2-S7, 17.1R3, 17.2R1-S4, 17.2R1-S6, 17.2R2-S4, 17.2R2-S5, 17.2R3, 17.2X75-D100, 17.2X75-D110, 17.2X75-D70, 17.2X75-D90, 17.2X75-D91, 17.3R1, 17.3R1-S4, 17.3R2, 17.3R2-S2, 17.3R3, 17.4R1-S2, 17.4R1-S3, 17.4R1-S4, 17.4R2, 18.1R1, 18.1R2, 18.1X75-D10, 18.2R1, 18.2X75-D10 et 18.2X75-D5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 4.0.0 et 3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 18.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D45, 12.1X46-D67, 12.1X46-D76, 12.1X46-D77, 12.3R11, 12.3R12-S10, 12.3X48-D20, 12.3X48-D25, 12.3X48-D55, 12.3X48-D66, 12.3X48-D70, 12.3X54-D34, 14.1X53-D30, 14.1X53-D47, 15.1F5-S5, 15.1F6-S1, 15.1F6-S10, 15.1F7, 15.1R4-S5, 15.1R4-S9, 15.1R5, 15.1R6-S6, 15.1R7, 15.1R7-S1, 15.1R8, 15.1X49-D110, 15.1X49-D131, 15.1X49-D140, 15.1X49-D20, 15.1X49-D35, 15.1X53-D233, 15.1X53-D234, 15.1X53-D47, 15.1X53-D470, 15.1X53-D471, 15.1X53-D490, 15.1X53-D59, 15.1X53-D60, 15.1X53-D67, 15.1X54-D70, 15.1X8.3, 16.1R2, 16.1R3, 16.1R3-S8, 16.1R3-S9, 16.1R4-S10, 16.1R4-S8, 16.1R4-S9, 16.1R5-S4, 16.1R6-S1, 16.1R6-S3, 16.1R6-S4, 16.1R7, 16.1X65-D46, 16.1X65-D47, 16.2R1, 16.2R1-S6, 16.2R1-S7, 16.2R2-S5, 16.2R2-S6, 16.2R3, 17.1R1-S7, 17.1R2-S7, 17.1R3, 17.2R1-S4, 17.2R1-S6, 17.2R2-S4, 17.2R2-S5, 17.2R3, 17.2X75-D100, 17.2X75-D110, 17.2X75-D70, 17.2X75-D90, 17.2X75-D91, 17.3R1, 17.3R1-S4, 17.3R2, 17.3R2-S2, 17.3R3, 17.4R1-S2, 17.4R1-S3, 17.4R1-S4, 17.4R2, 18.1R1, 18.1R2, 18.1X75-D10, 18.2R1, 18.2X75-D10 et 18.2X75-D5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-7407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7407"
},
{
"name": "CVE-2018-0027",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0027"
},
{
"name": "CVE-2016-8615",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8615"
},
{
"name": "CVE-2015-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3153"
},
{
"name": "CVE-2018-0024",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0024"
},
{
"name": "CVE-2017-1000257",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000257"
},
{
"name": "CVE-2016-8619",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8619"
},
{
"name": "CVE-2013-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1944"
},
{
"name": "CVE-2018-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2603"
},
{
"name": "CVE-2017-8818",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8818"
},
{
"name": "CVE-2018-0031",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0031"
},
{
"name": "CVE-2018-0035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0035"
},
{
"name": "CVE-2018-1000115",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000115"
},
{
"name": "CVE-2016-9952",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9952"
},
{
"name": "CVE-2017-10295",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10295"
},
{
"name": "CVE-2013-4545",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4545"
},
{
"name": "CVE-2015-7236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7236"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2016-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4802"
},
{
"name": "CVE-2017-10388",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10388"
},
{
"name": "CVE-2016-9953",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9953"
},
{
"name": "CVE-2016-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8624"
},
{
"name": "CVE-2018-0039",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0039"
},
{
"name": "CVE-2016-8616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8616"
},
{
"name": "CVE-2015-3148",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3148"
},
{
"name": "CVE-2016-8620",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8620"
},
{
"name": "CVE-2014-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3613"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2013-6422",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6422"
},
{
"name": "CVE-2018-0042",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0042"
},
{
"name": "CVE-2018-2618",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2618"
},
{
"name": "CVE-2018-1000005",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000005"
},
{
"name": "CVE-2016-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8617"
},
{
"name": "CVE-2016-0754",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0754"
},
{
"name": "CVE-2017-1000101",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000101"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2014-8150",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8150"
},
{
"name": "CVE-2014-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3707"
},
{
"name": "CVE-2016-8618",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8618"
},
{
"name": "CVE-2018-0037",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0037"
},
{
"name": "CVE-2015-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3143"
},
{
"name": "CVE-2018-0040",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0040"
},
{
"name": "CVE-2016-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5419"
},
{
"name": "CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"name": "CVE-2018-2637",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2637"
},
{
"name": "CVE-2017-10198",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10198"
},
{
"name": "CVE-2017-10355",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10355"
},
{
"name": "CVE-2016-8623",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8623"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2016-3739",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3739"
},
{
"name": "CVE-2018-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2663"
},
{
"name": "CVE-2017-15896",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15896"
},
{
"name": "CVE-2018-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2579"
},
{
"name": "CVE-2017-8816",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8816"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2016-7167",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7167"
},
{
"name": "CVE-2017-9502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9502"
},
{
"name": "CVE-2018-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0030"
},
{
"name": "CVE-2018-0034",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0034"
},
{
"name": "CVE-2018-2633",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2633"
},
{
"name": "CVE-2000-0973",
"url": "https://www.cve.org/CVERecord?id=CVE-2000-0973"
},
{
"name": "CVE-2014-0139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0139"
},
{
"name": "CVE-2016-5420",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5420"
},
{
"name": "CVE-2016-7141",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7141"
},
{
"name": "CVE-2014-0138",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0138"
},
{
"name": "CVE-2016-8621",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8621"
},
{
"name": "CVE-2018-0029",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0029"
},
{
"name": "CVE-2018-0025",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0025"
},
{
"name": "CVE-2017-1000254",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000254"
},
{
"name": "CVE-2018-2599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2599"
},
{
"name": "CVE-2017-8817",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8817"
},
{
"name": "CVE-2017-10356",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10356"
},
{
"name": "CVE-2018-0038",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0038"
},
{
"name": "CVE-2016-9586",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9586"
},
{
"name": "CVE-2017-1000100",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000100"
},
{
"name": "CVE-2017-10345",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10345"
},
{
"name": "CVE-2018-0041",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0041"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-2629",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2629"
},
{
"name": "CVE-2016-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8622"
},
{
"name": "CVE-2013-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2174"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-0032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0032"
},
{
"name": "CVE-2016-5421",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5421"
},
{
"name": "CVE-2018-2678",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2678"
},
{
"name": "CVE-2014-0015",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0015"
},
{
"name": "CVE-2017-1000099",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000099"
},
{
"name": "CVE-2018-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2588"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2017-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3145"
},
{
"name": "CVE-2016-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
},
{
"name": "CVE-2018-0026",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0026"
},
{
"name": "CVE-2016-0755",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0755"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-339",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10869 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10869\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10866 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10866\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10874 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10874\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10863 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10863\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10871 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10871\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10857 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10857\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10868 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10868\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10859 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10859\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10872 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10872\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10858 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10858\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10861 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10861\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10860 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10860\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10864 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10864\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10873 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10873\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10865 du 11 juillet 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10865\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2018-AVI-083
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 12 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2017-18079",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18079"
},
{
"name": "CVE-2017-13215",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13215"
},
{
"name": "CVE-2017-17712",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17712"
},
{
"name": "CVE-2015-1142857",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1142857"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2017-17741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17741"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-083",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-02-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180433-1 du 13 f\u00e9vrier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180433-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180437-1 du 13 f\u00e9vrier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180437-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20180436-1 du 13 f\u00e9vrier 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180436-1/"
}
]
}
RHSA-2018:0022
Vulnerability from csaf_redhat - Published: 2018-01-04 17:04 - Updated: 2025-11-21 18:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0022",
"url": "https://access.redhat.com/errata/RHSA-2018:0022"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5753",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0022.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:03:18+00:00",
"generator": {
"date": "2025-11-21T18:03:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:0022",
"initial_release_date": "2018-01-04T17:04:18+00:00",
"revision_history": [
{
"date": "2018-01-04T17:04:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T17:04:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:03:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "perf-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.85.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.85.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-431.85.2.el6.src",
"product_id": "kernel-0:2.6.32-431.85.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.85.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.85.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.85.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.85.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.85.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.85.2.el6.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.85.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.85.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T17:04:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0022"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5753",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519778"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution bounds-check bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "RHBZ#1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T17:04:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0022"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution bounds-check bypass"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T17:04:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0022"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
}
]
}
RHSA-2018_0018
Vulnerability from csaf_redhat - Published: 2018-01-04 13:06 - Updated: 2024-11-14 23:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0018",
"url": "https://access.redhat.com/errata/RHSA-2018:0018"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5753",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0018.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-14T23:40:07+00:00",
"generator": {
"date": "2024-11-14T23:40:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:0018",
"initial_release_date": "2018-01-04T13:06:10+00:00",
"revision_history": [
{
"date": "2018-01-04T13:06:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T13:06:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:40:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "perf-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-358.84.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.84.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-358.84.2.el6.src",
"product_id": "kernel-0:2.6.32-358.84.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.84.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-358.84.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-358.84.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.84.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.84.2.el6.src",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.84.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.84.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.84.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.84.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T13:06:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0018"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5753",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519778"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution bounds-check bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "RHBZ#1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T13:06:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0018"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution bounds-check bypass"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T13:06:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0018"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
}
]
}
RHBA-2018_0042
Vulnerability from csaf_redhat - Published: 2018-01-04 23:46 - Updated: 2024-11-14 23:32Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated dracut packages that fix one bug are now available for Red Hat Enterprise Linux 7.",
"title": "Topic"
},
{
"category": "general",
"text": "The dracut packages contain an event-driven initial RAM file system (initramfs) generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition.\n\nThis update fixes the following bug:\n\n* Microcode on AMD family 16h processors was not updated early in the boot process. With this bug fix, the issue is addressed. (BZ#1526943)\n\nUsers of dracut are advised to upgrade to these updated packages, which fix this bug.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2018:0042",
"url": "https://access.redhat.com/errata/RHBA-2018:0042"
},
{
"category": "external",
"summary": "1526943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526943"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhba-2018_0042.json"
}
],
"title": "Red Hat Bug Fix Advisory: dracut bug fix update",
"tracking": {
"current_release_date": "2024-11-14T23:32:45+00:00",
"generator": {
"date": "2024-11-14T23:32:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHBA-2018:0042",
"initial_release_date": "2018-01-04T23:46:33+00:00",
"revision_history": [
{
"date": "2018-01-04T23:46:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-08-13T08:18:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:32:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-fips-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips-aesni@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-network-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-tools-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-caps-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@033-502.el7_4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-0:033-502.el7_4.1.src",
"product": {
"name": "dracut-0:033-502.el7_4.1.src",
"product_id": "dracut-0:033-502.el7_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@033-502.el7_4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-0:033-502.el7_4.1.s390x",
"product_id": "dracut-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x",
"product_id": "dracut-fips-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"product_id": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips-aesni@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"product_id": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-network-0:033-502.el7_4.1.s390x",
"product_id": "dracut-network-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"product_id": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"product_id": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x",
"product_id": "dracut-tools-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x",
"product_id": "dracut-caps-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@033-502.el7_4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-fips-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips-aesni@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-network-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-tools-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-caps-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@033-502.el7_4.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips-aesni@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-network-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@033-502.el7_4.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-tools-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-tools-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-caps-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-fips-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips-aesni@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-network-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@033-502.el7_4.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.src",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T23:46:33+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.src",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2018:0042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.src",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
}
]
}
RHSA-2018_1129
Vulnerability from csaf_redhat - Published: 2018-04-17 15:40 - Updated: 2024-11-14 23:41Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important, KVM for Power)\n\nRed Hat would like to thank Google Project Zero for reporting this issue.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article:\nhttps://access.redhat.com/articles/3413511",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1129",
"url": "https://access.redhat.com/errata/RHSA-2018:1129"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3413511",
"url": "https://access.redhat.com/articles/3413511"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1129.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-14T23:41:40+00:00",
"generator": {
"date": "2024-11-14T23:41:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1129",
"initial_release_date": "2018-04-17T15:40:42+00:00",
"revision_history": [
{
"date": "2018-04-17T15:40:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-17T15:40:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:41:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "perf-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.48.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.48.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.48.1.el7.src",
"product_id": "kernel-0:3.10.0-514.48.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "perf-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.48.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-514.48.1.el7.s390x",
"product_id": "perf-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-514.48.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.src",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.src",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T15:40:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1129"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T15:40:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1129"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
}
]
}
RHSA-2018_1130
Vulnerability from csaf_redhat - Published: 2018-04-17 16:24 - Updated: 2024-11-14 23:41Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important)\n\n* kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important)\n\n* kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate)\n\n* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate)\n\n* kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate)\n\n* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate)\n\n* kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate)\n\n* kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Mohamed Ghannam for reporting CVE-2017-8824; Jan H. Sch\u00f6nherr (Amazon) for reporting CVE-2017-1000252; and Armis Labs for reporting CVE-2017-1000410.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article:\nhttps://access.redhat.com/articles/3411331",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1130",
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3411331",
"url": "https://access.redhat.com/articles/3411331"
},
{
"category": "external",
"summary": "1489088",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489088"
},
{
"category": "external",
"summary": "1490781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490781"
},
{
"category": "external",
"summary": "1501878",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501878"
},
{
"category": "external",
"summary": "1519160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160"
},
{
"category": "external",
"summary": "1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "external",
"summary": "1525762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525762"
},
{
"category": "external",
"summary": "1531135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135"
},
{
"category": "external",
"summary": "1548412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1130.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-14T23:41:22+00:00",
"generator": {
"date": "2024-11-14T23:41:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1130",
"initial_release_date": "2018-04-17T16:24:45+00:00",
"revision_history": [
{
"date": "2018-04-17T16:24:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-17T16:24:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:41:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "perf-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-693.25.2.el7.s390x",
"product_id": "perf-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-693.25.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "perf-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.25.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.25.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.25.2.el7.src",
"product_id": "kernel-0:3.10.0-693.25.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.src",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Mohamed Ghannam"
]
}
],
"cve": "CVE-2017-8824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519591"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in DCCP socket code affecting the Linux kernel since 2.6.16. This vulnerability could allow an attacker to their escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free vulnerability in DCCP socket",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, Red Hat Enterprise MRG 2 and real-time kernels. Future updates for the respective releases may address this issue.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "RHBZ#1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824"
}
],
"release_date": "2017-12-05T05:43:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use-after-free vulnerability in DCCP socket"
},
{
"cve": "CVE-2017-9725",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2017-09-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1489088"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found where the kernel truncated the value used to indicate the size of a buffer which it would later become zero using an untruncated value. This can corrupt memory outside of the original allocation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Incorrect type conversion for size during dma allocation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2.\n\nFuture Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-9725"
},
{
"category": "external",
"summary": "RHBZ#1489088",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489088"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-9725",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9725"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9725",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9725"
},
{
"category": "external",
"summary": "https://source.android.com/security/bulletin/2017-09-01",
"url": "https://source.android.com/security/bulletin/2017-09-01"
}
],
"release_date": "2015-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Incorrect type conversion for size during dma allocation"
},
{
"cve": "CVE-2017-13166",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2018-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1548412"
}
],
"notes": [
{
"category": "description",
"text": "A bug in the 32-bit compatibility layer of the ioctl handling code of the v4l2 video driver in the Linux kernel has been found. A memory protection mechanism ensuring that user-provided buffers always point to a userspace memory were disabled, allowing destination address to be in a kernel space. This flaw could be exploited by an attacker to overwrite a kernel memory from an unprivileged userspace process, leading to privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-13166"
},
{
"category": "external",
"summary": "RHBZ#1548412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166"
}
],
"release_date": "2017-07-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
},
{
"category": "workaround",
"details": "A systemtap script intercepting v4l2_compat_ioctl32() function of the [videodev] module and making it to return -ENOIOCTLCMD error value would work just fine, except breaking all 32bit video capturing software, but not 64bit ones.\n\nAlternatively, blacklisting [videodev] module will work too, but it will break all video capturing software.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation"
},
{
"cve": "CVE-2017-15265",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1501878"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found when issuing an ioctl to a sound device. This could allow a user to exploit a race condition and create memory corruption or possibly privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in snd_seq_ioctl_create_port()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5,6, 7, realtime and MRG-2.\n\nRed Hat Enterprise Linux 5 has transitioned to Production phase 3. \nDuring the Production 3 Phase, Critical impact Security Advisories (RHSAs) \nand selected Urgent Priority Bug Fix Advisories (RHBAs) may be released \nas they become available.\n\nThe official life cycle policy can be reviewed here:\n\nhttp://redhat.com/rhel/lifecycle\n\nFuture Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15265"
},
{
"category": "external",
"summary": "RHBZ#1501878",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501878"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15265",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15265"
}
],
"release_date": "2017-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
},
{
"category": "workaround",
"details": "It is possible to prevent the affected code from being loaded by blacklisting the kernel module snd_seq. Instructions relating to how to blacklist a kernel module are shown here: https://access.redhat.com/solutions/41278 \n\nAlternatively a custom permission set can be created by udev, the correct permissions will depend on your use case. Please contact Red Hat customer support for creating a rule set that can minimize flaw exposure.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in snd_seq_ioctl_create_port()"
},
{
"cve": "CVE-2017-17449",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2017-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1525762"
}
],
"notes": [
{
"category": "description",
"text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel, through 4.14.4, does not restrict observations of Netlink messages to a single net namespace, when CONFIG_NLMON is enabled. This allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6, as a code with the flaw is not present or is not built in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-17449"
},
{
"category": "external",
"summary": "RHBZ#1525762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17449"
}
],
"release_date": "2017-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity"
},
{
"cve": "CVE-2017-18017",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1531135"
}
],
"notes": [
{
"category": "description",
"text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18017"
},
{
"category": "external",
"summary": "RHBZ#1531135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017"
}
],
"release_date": "2018-01-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c"
},
{
"acknowledgments": [
{
"names": [
"Jan H. Sch\u00f6nherr"
],
"organization": "Amazon"
}
],
"cve": "CVE-2017-1000252",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2017-09-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1490781"
}
],
"notes": [
{
"category": "description",
"text": "A reachable assertion failure flaw was found in the Linux kernel built with KVM virtualisation(CONFIG_KVM) support with Virtual Function I/O feature (CONFIG_VFIO) enabled. This failure could occur if a malicious guest device sent a virtual interrupt (guest IRQ) with a larger (\u003e1024) index value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000252"
},
{
"category": "external",
"summary": "RHBZ#1490781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490781"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000252",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000252"
}
],
"release_date": "2017-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ"
},
{
"acknowledgments": [
{
"names": [
"Armis Labs"
]
}
],
"cve": "CVE-2017-1000410",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519160"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the processing of incoming L2CAP bluetooth commands. Uninitialized stack variables can be sent to an attacker leaking data in kernel address space.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Stack information leak in the EFS element",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000410"
},
{
"category": "external",
"summary": "RHBZ#1519160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000410"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410"
}
],
"release_date": "2017-12-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Stack information leak in the EFS element"
}
]
}
RHSA-2018:0021
Vulnerability from csaf_redhat - Published: 2018-01-04 16:50 - Updated: 2025-11-21 18:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0021",
"url": "https://access.redhat.com/errata/RHSA-2018:0021"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5753",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0021.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-11-21T18:03:18+00:00",
"generator": {
"date": "2025-11-21T18:03:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:0021",
"initial_release_date": "2018-01-04T16:50:09+00:00",
"revision_history": [
{
"date": "2018-01-04T16:50:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T16:50:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:03:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"product": {
"name": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"product_id": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.11.1.rt56.606.el6rt?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"product": {
"name": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"product_id": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.11.1.rt56.606.el6rt?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"product": {
"name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"product_id": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.11.1.rt56.606.el6rt?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src"
},
"product_reference": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch"
},
"product_reference": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch"
},
"product_reference": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T16:50:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0021"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5753",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519778"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution bounds-check bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "RHBZ#1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T16:50:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0021"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution bounds-check bypass"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T16:50:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0021"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
}
]
}
RHSA-2018_0022
Vulnerability from csaf_redhat - Published: 2018-01-04 17:04 - Updated: 2024-11-14 23:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0022",
"url": "https://access.redhat.com/errata/RHSA-2018:0022"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5753",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0022.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-14T23:39:54+00:00",
"generator": {
"date": "2024-11-14T23:39:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:0022",
"initial_release_date": "2018-01-04T17:04:18+00:00",
"revision_history": [
{
"date": "2018-01-04T17:04:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T17:04:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:39:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "perf-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.85.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.85.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.85.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-431.85.2.el6.src",
"product_id": "kernel-0:2.6.32-431.85.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.85.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.85.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.85.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.85.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.85.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.85.2.el6.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.85.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.85.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T17:04:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0022"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5753",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519778"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution bounds-check bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "RHBZ#1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T17:04:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0022"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution bounds-check bypass"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T17:04:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0022"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
}
]
}
RHBA-2018:0042
Vulnerability from csaf_redhat - Published: 2018-01-04 23:46 - Updated: 2025-11-21 17:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated dracut packages that fix one bug are now available for Red Hat Enterprise Linux 7.",
"title": "Topic"
},
{
"category": "general",
"text": "The dracut packages contain an event-driven initial RAM file system (initramfs) generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition.\n\nThis update fixes the following bug:\n\n* Microcode on AMD family 16h processors was not updated early in the boot process. With this bug fix, the issue is addressed. (BZ#1526943)\n\nUsers of dracut are advised to upgrade to these updated packages, which fix this bug.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2018:0042",
"url": "https://access.redhat.com/errata/RHBA-2018:0042"
},
{
"category": "external",
"summary": "1526943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526943"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhba-2018_0042.json"
}
],
"title": "Red Hat Bug Fix Advisory: dracut bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:21:41+00:00",
"generator": {
"date": "2025-11-21T17:21:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHBA-2018:0042",
"initial_release_date": "2018-01-04T23:46:33+00:00",
"revision_history": [
{
"date": "2018-01-04T23:46:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-08-13T08:18:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:21:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-fips-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips-aesni@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-network-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-tools-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@033-502.el7_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:033-502.el7_4.1.x86_64",
"product": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64",
"product_id": "dracut-caps-0:033-502.el7_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@033-502.el7_4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-0:033-502.el7_4.1.src",
"product": {
"name": "dracut-0:033-502.el7_4.1.src",
"product_id": "dracut-0:033-502.el7_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@033-502.el7_4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-0:033-502.el7_4.1.s390x",
"product_id": "dracut-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x",
"product_id": "dracut-fips-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"product_id": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips-aesni@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"product_id": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-network-0:033-502.el7_4.1.s390x",
"product_id": "dracut-network-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"product_id": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"product_id": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x",
"product_id": "dracut-tools-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@033-502.el7_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:033-502.el7_4.1.s390x",
"product": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x",
"product_id": "dracut-caps-0:033-502.el7_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@033-502.el7_4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-fips-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips-aesni@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-network-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-tools-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@033-502.el7_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:033-502.el7_4.1.ppc64",
"product": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64",
"product_id": "dracut-caps-0:033-502.el7_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@033-502.el7_4.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips-aesni@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-network-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@033-502.el7_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"product": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"product_id": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@033-502.el7_4.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-tools-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-tools-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-caps-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-fips-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-fips-aesni@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-network-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@033-502.el7_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"product": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"product_id": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@033-502.el7_4.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-Alt-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.src"
},
"product_reference": "dracut-0:033-502.el7_4.1.src",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-caps-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-generic-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-network-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.s390x",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:033-502.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
},
"product_reference": "dracut-tools-0:033-502.el7_4.1.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.4.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.src",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T23:46:33+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.src",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2018:0042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Client-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Client-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Client-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Client-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7ComputeNode-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7ComputeNode-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7ComputeNode-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7ComputeNode-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-Alt-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-Alt-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Server-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.src",
"7Server-optional-Alt-7.4.z:dracut-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Server-optional-Alt-7.4.z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Workstation-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Workstation-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.src",
"7Workstation-optional-7.4.Z:dracut-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-caps-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-config-generic-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-config-rescue-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-debuginfo-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-fips-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-fips-aesni-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-network-0:033-502.el7_4.1.x86_64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.aarch64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.ppc64le",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.s390x",
"7Workstation-optional-7.4.Z:dracut-tools-0:033-502.el7_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
}
]
}
RHSA-2018:1319
Vulnerability from csaf_redhat - Published: 2018-05-08 19:04 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: cpu: speculative execution permission faults handling (CVE-2017-5754, x86 32-bit)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* kernel: nfsd: Incorrect handling of long RPC replies (CVE-2017-7645)\n\n* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824)\n\n* kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166)\n\n* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017)\n\n* kernel: Stack information leak in the EFS element (CVE-2017-1000410)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Google Project Zero for reporting CVE-2017-5754; Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897; Mohamed Ghannam for reporting CVE-2017-8824; and Armis Labs for reporting CVE-2017-1000410.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article: https://access.redhat.com/articles/3431591",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1319",
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/pop_ss",
"url": "https://access.redhat.com/security/vulnerabilities/pop_ss"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3431591",
"url": "https://access.redhat.com/articles/3431591"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "1443615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615"
},
{
"category": "external",
"summary": "1519160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160"
},
{
"category": "external",
"summary": "1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "1531135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135"
},
{
"category": "external",
"summary": "1548412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412"
},
{
"category": "external",
"summary": "1567074",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1319.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:04:35+00:00",
"generator": {
"date": "2025-11-21T18:04:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1319",
"initial_release_date": "2018-05-08T19:04:35+00:00",
"revision_history": [
{
"date": "2018-05-08T19:04:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-10T18:43:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-696.28.1.el6.i686",
"product_id": "perf-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686",
"product_id": "python-perf-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "perf-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.28.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-696.28.1.el6.src",
"product_id": "kernel-0:2.6.32-696.28.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-696.28.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-696.28.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-696.28.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x",
"product_id": "perf-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "perf-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
},
{
"cve": "CVE-2017-7645",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2017-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1443615"
}
],
"notes": [
{
"category": "description",
"text": "The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd: Incorrect handling of long RPC replies",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with\nRed Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel\nupdates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may\naddress this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-7645"
},
{
"category": "external",
"summary": "RHBZ#1443615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-7645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7645"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645"
}
],
"release_date": "2017-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd: Incorrect handling of long RPC replies"
},
{
"acknowledgments": [
{
"names": [
"Mohamed Ghannam"
]
}
],
"cve": "CVE-2017-8824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519591"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in DCCP socket code affecting the Linux kernel since 2.6.16. This vulnerability could allow an attacker to their escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free vulnerability in DCCP socket",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, Red Hat Enterprise MRG 2 and real-time kernels. Future updates for the respective releases may address this issue.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "RHBZ#1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824"
}
],
"release_date": "2017-12-05T05:43:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use-after-free vulnerability in DCCP socket"
},
{
"cve": "CVE-2017-13166",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2018-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1548412"
}
],
"notes": [
{
"category": "description",
"text": "A bug in the 32-bit compatibility layer of the ioctl handling code of the v4l2 video driver in the Linux kernel has been found. A memory protection mechanism ensuring that user-provided buffers always point to a userspace memory were disabled, allowing destination address to be in a kernel space. This flaw could be exploited by an attacker to overwrite a kernel memory from an unprivileged userspace process, leading to privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-13166"
},
{
"category": "external",
"summary": "RHBZ#1548412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166"
}
],
"release_date": "2017-07-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
},
{
"category": "workaround",
"details": "A systemtap script intercepting v4l2_compat_ioctl32() function of the [videodev] module and making it to return -ENOIOCTLCMD error value would work just fine, except breaking all 32bit video capturing software, but not 64bit ones.\n\nAlternatively, blacklisting [videodev] module will work too, but it will break all video capturing software.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation"
},
{
"cve": "CVE-2017-18017",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1531135"
}
],
"notes": [
{
"category": "description",
"text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18017"
},
{
"category": "external",
"summary": "RHBZ#1531135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017"
}
],
"release_date": "2018-01-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c"
},
{
"acknowledgments": [
{
"names": [
"Armis Labs"
]
}
],
"cve": "CVE-2017-1000410",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519160"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the processing of incoming L2CAP bluetooth commands. Uninitialized stack variables can be sent to an attacker leaking data in kernel address space.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Stack information leak in the EFS element",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000410"
},
{
"category": "external",
"summary": "RHBZ#1519160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000410"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410"
}
],
"release_date": "2017-12-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Stack information leak in the EFS element"
},
{
"acknowledgments": [
{
"names": [
"Andy Lutomirski"
]
},
{
"names": [
"Nick Peterson"
],
"organization": "Everdox Tech LLC"
}
],
"cve": "CVE-2018-8897",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2018-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1567074"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: error in exception handling leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8897"
},
{
"category": "external",
"summary": "RHBZ#1567074",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/pop_ss",
"url": "https://access.redhat.com/security/vulnerabilities/pop_ss"
}
],
"release_date": "2018-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: error in exception handling leads to DoS"
}
]
}
RHSA-2018_1216
Vulnerability from csaf_redhat - Published: 2018-04-24 15:16 - Updated: 2024-11-14 23:41Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Mohamed Ghannam for reporting this issue.\n\nBug Fix(es):\n\n* Previously, the XFS code included a circular dependency between the xfs-log and the xfs-cil workqueues. Consequently, an XFS deadlock occurred in some cases. This update adds a new workqueue dedicated to the log covering background task to avoid the deadlock. (BZ#1543303)\n\n* The kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Retpolines. The Retpolines mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. (BZ#1553181)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1216",
"url": "https://access.redhat.com/errata/RHSA-2018:1216"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1216.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-14T23:41:16+00:00",
"generator": {
"date": "2024-11-14T23:41:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1216",
"initial_release_date": "2018-04-24T15:16:47+00:00",
"revision_history": [
{
"date": "2018-04-24T15:16:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-24T15:16:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:41:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "perf-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.66.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.66.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.66.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.66.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.66.1.el7.src",
"product_id": "kernel-0:3.10.0-327.66.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.66.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.src",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.src",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-24T15:16:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1216"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Mohamed Ghannam"
]
}
],
"cve": "CVE-2017-8824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519591"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in DCCP socket code affecting the Linux kernel since 2.6.16. This vulnerability could allow an attacker to their escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free vulnerability in DCCP socket",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, Red Hat Enterprise MRG 2 and real-time kernels. Future updates for the respective releases may address this issue.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "RHBZ#1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824"
}
],
"release_date": "2017-12-05T05:43:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-24T15:16:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1216"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use-after-free vulnerability in DCCP socket"
}
]
}
RHSA-2018_0023
Vulnerability from csaf_redhat - Published: 2018-01-04 17:00 - Updated: 2024-11-14 23:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm package provides the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715)\n\nNote: This is the qemu-kvm side of the CVE-2017-5715 mitigation.\n\nRed Hat would like to thank Google Project Zero for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0023",
"url": "https://access.redhat.com/errata/RHSA-2018:0023"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0023.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2024-11-14T23:40:20+00:00",
"generator": {
"date": "2024-11-14T23:40:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:0023",
"initial_release_date": "2018-01-04T17:00:59+00:00",
"revision_history": [
{
"date": "2018-01-04T17:00:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T17:00:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:40:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"product": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"product_id": "qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-141.el7_4.6?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"product": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"product_id": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-141.el7_4.6?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"product": {
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"product_id": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common@1.5.3-141.el7_4.6?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"product": {
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"product_id": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@1.5.3-141.el7_4.6?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-141.el7_4.6?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.src",
"product": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.src",
"product_id": "qemu-kvm-10:1.5.3-141.el7_4.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-141.el7_4.6?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"product": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"product_id": "qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-141.el7_4.6?arch=ppc64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-141.el7_4.6?arch=ppc64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"product": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"product_id": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-141.el7_4.6?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-141.el7_4.6?arch=ppc64le\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.src",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.src",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.src",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T17:00:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0023"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
}
]
}
RHSA-2018:1130
Vulnerability from csaf_redhat - Published: 2018-04-17 16:24 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important)\n\n* kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important)\n\n* kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate)\n\n* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate)\n\n* kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate)\n\n* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate)\n\n* kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate)\n\n* kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Mohamed Ghannam for reporting CVE-2017-8824; Jan H. Sch\u00f6nherr (Amazon) for reporting CVE-2017-1000252; and Armis Labs for reporting CVE-2017-1000410.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article:\nhttps://access.redhat.com/articles/3411331",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1130",
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3411331",
"url": "https://access.redhat.com/articles/3411331"
},
{
"category": "external",
"summary": "1489088",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489088"
},
{
"category": "external",
"summary": "1490781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490781"
},
{
"category": "external",
"summary": "1501878",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501878"
},
{
"category": "external",
"summary": "1519160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160"
},
{
"category": "external",
"summary": "1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "external",
"summary": "1525762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525762"
},
{
"category": "external",
"summary": "1531135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135"
},
{
"category": "external",
"summary": "1548412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1130.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:04:22+00:00",
"generator": {
"date": "2025-11-21T18:04:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1130",
"initial_release_date": "2018-04-17T16:24:45+00:00",
"revision_history": [
{
"date": "2018-04-17T16:24:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-17T16:24:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "perf-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-693.25.2.el7.s390x",
"product_id": "perf-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-693.25.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "perf-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.25.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.25.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.25.2.el7.src",
"product_id": "kernel-0:3.10.0-693.25.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.src",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.25.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Mohamed Ghannam"
]
}
],
"cve": "CVE-2017-8824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519591"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in DCCP socket code affecting the Linux kernel since 2.6.16. This vulnerability could allow an attacker to their escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free vulnerability in DCCP socket",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, Red Hat Enterprise MRG 2 and real-time kernels. Future updates for the respective releases may address this issue.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "RHBZ#1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824"
}
],
"release_date": "2017-12-05T05:43:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use-after-free vulnerability in DCCP socket"
},
{
"cve": "CVE-2017-9725",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2017-09-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1489088"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found where the kernel truncated the value used to indicate the size of a buffer which it would later become zero using an untruncated value. This can corrupt memory outside of the original allocation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Incorrect type conversion for size during dma allocation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2.\n\nFuture Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-9725"
},
{
"category": "external",
"summary": "RHBZ#1489088",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489088"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-9725",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9725"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9725",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9725"
},
{
"category": "external",
"summary": "https://source.android.com/security/bulletin/2017-09-01",
"url": "https://source.android.com/security/bulletin/2017-09-01"
}
],
"release_date": "2015-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Incorrect type conversion for size during dma allocation"
},
{
"cve": "CVE-2017-13166",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2018-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1548412"
}
],
"notes": [
{
"category": "description",
"text": "A bug in the 32-bit compatibility layer of the ioctl handling code of the v4l2 video driver in the Linux kernel has been found. A memory protection mechanism ensuring that user-provided buffers always point to a userspace memory were disabled, allowing destination address to be in a kernel space. This flaw could be exploited by an attacker to overwrite a kernel memory from an unprivileged userspace process, leading to privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-13166"
},
{
"category": "external",
"summary": "RHBZ#1548412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166"
}
],
"release_date": "2017-07-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
},
{
"category": "workaround",
"details": "A systemtap script intercepting v4l2_compat_ioctl32() function of the [videodev] module and making it to return -ENOIOCTLCMD error value would work just fine, except breaking all 32bit video capturing software, but not 64bit ones.\n\nAlternatively, blacklisting [videodev] module will work too, but it will break all video capturing software.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation"
},
{
"cve": "CVE-2017-15265",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1501878"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found when issuing an ioctl to a sound device. This could allow a user to exploit a race condition and create memory corruption or possibly privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in snd_seq_ioctl_create_port()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5,6, 7, realtime and MRG-2.\n\nRed Hat Enterprise Linux 5 has transitioned to Production phase 3. \nDuring the Production 3 Phase, Critical impact Security Advisories (RHSAs) \nand selected Urgent Priority Bug Fix Advisories (RHBAs) may be released \nas they become available.\n\nThe official life cycle policy can be reviewed here:\n\nhttp://redhat.com/rhel/lifecycle\n\nFuture Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15265"
},
{
"category": "external",
"summary": "RHBZ#1501878",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501878"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15265",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15265"
}
],
"release_date": "2017-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
},
{
"category": "workaround",
"details": "It is possible to prevent the affected code from being loaded by blacklisting the kernel module snd_seq. Instructions relating to how to blacklist a kernel module are shown here: https://access.redhat.com/solutions/41278 \n\nAlternatively a custom permission set can be created by udev, the correct permissions will depend on your use case. Please contact Red Hat customer support for creating a rule set that can minimize flaw exposure.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in snd_seq_ioctl_create_port()"
},
{
"cve": "CVE-2017-17449",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2017-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1525762"
}
],
"notes": [
{
"category": "description",
"text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel, through 4.14.4, does not restrict observations of Netlink messages to a single net namespace, when CONFIG_NLMON is enabled. This allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6, as a code with the flaw is not present or is not built in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-17449"
},
{
"category": "external",
"summary": "RHBZ#1525762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17449"
}
],
"release_date": "2017-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity"
},
{
"cve": "CVE-2017-18017",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1531135"
}
],
"notes": [
{
"category": "description",
"text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18017"
},
{
"category": "external",
"summary": "RHBZ#1531135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017"
}
],
"release_date": "2018-01-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c"
},
{
"acknowledgments": [
{
"names": [
"Jan H. Sch\u00f6nherr"
],
"organization": "Amazon"
}
],
"cve": "CVE-2017-1000252",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2017-09-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1490781"
}
],
"notes": [
{
"category": "description",
"text": "A reachable assertion failure flaw was found in the Linux kernel built with KVM virtualisation(CONFIG_KVM) support with Virtual Function I/O feature (CONFIG_VFIO) enabled. This failure could occur if a malicious guest device sent a virtual interrupt (guest IRQ) with a larger (\u003e1024) index value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000252"
},
{
"category": "external",
"summary": "RHBZ#1490781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490781"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000252",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000252"
}
],
"release_date": "2017-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ"
},
{
"acknowledgments": [
{
"names": [
"Armis Labs"
]
}
],
"cve": "CVE-2017-1000410",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519160"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the processing of incoming L2CAP bluetooth commands. Uninitialized stack variables can be sent to an attacker leaking data in kernel address space.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Stack information leak in the EFS element",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000410"
},
{
"category": "external",
"summary": "RHBZ#1519160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000410"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410"
}
],
"release_date": "2017-12-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T16:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.2.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.2.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Stack information leak in the EFS element"
}
]
}
RHSA-2018:1967
Vulnerability from csaf_redhat - Published: 2018-06-26 15:42 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, PowerPC)\n\n* This release also includes next iteration of the CVE-2017-5715 mitigation that includes the SMCCC (Secure Monitor Call Calling Convention) 1.1 support. (CVE-2017-5715, ARM)\n\nRed Hat would like to thank Google Project Zero for reporting CVE-2017-5715 and Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.\n\nBug Fix(es):\n\nThese updated kernel-alt packages include numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/3485851",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1967",
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2018-3639",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3485851",
"url": "https://access.redhat.com/articles/3485851"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1967.json"
}
],
"title": "Red Hat Security Advisory: kernel-alt security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:15+00:00",
"generator": {
"date": "2025-11-21T18:05:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1967",
"initial_release_date": "2018-06-26T15:42:16+00:00",
"revision_history": [
{
"date": "2018-06-26T15:42:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-26T15:42:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"product": {
"name": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"product_id": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.14.0-49.8.1.el7a?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"product_id": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-49.8.1.el7a?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "perf-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "perf-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"product": {
"name": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"product_id": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-alt@4.14.0-49.8.1.el7a?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-alt-0:4.14.0-49.8.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src"
},
"product_reference": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch"
},
"product_reference": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-alt-0:4.14.0-49.8.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src"
},
"product_reference": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch"
},
"product_reference": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-26T15:42:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-26T15:42:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018_0017
Vulnerability from csaf_redhat - Published: 2018-01-04 05:49 - Updated: 2024-11-14 23:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0017",
"url": "https://access.redhat.com/errata/RHSA-2018:0017"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5753",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0017.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-14T23:39:49+00:00",
"generator": {
"date": "2024-11-14T23:39:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:0017",
"initial_release_date": "2018-01-04T05:49:35+00:00",
"revision_history": [
{
"date": "2018-01-04T05:49:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T05:49:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:39:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "python-perf-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "perf-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.64.4.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.64.4.el6.src",
"product": {
"name": "kernel-0:2.6.32-504.64.4.el6.src",
"product_id": "kernel-0:2.6.32-504.64.4.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.64.4.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.64.4.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.64.4.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.64.4.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.src",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T05:49:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0017"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5753",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519778"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution bounds-check bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "RHBZ#1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T05:49:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0017"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution bounds-check bypass"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T05:49:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0017"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
}
]
}
RHSA-2018:0023
Vulnerability from csaf_redhat - Published: 2018-01-04 17:00 - Updated: 2025-11-21 18:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm package provides the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715)\n\nNote: This is the qemu-kvm side of the CVE-2017-5715 mitigation.\n\nRed Hat would like to thank Google Project Zero for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0023",
"url": "https://access.redhat.com/errata/RHSA-2018:0023"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0023.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:03:19+00:00",
"generator": {
"date": "2025-11-21T18:03:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:0023",
"initial_release_date": "2018-01-04T17:00:59+00:00",
"revision_history": [
{
"date": "2018-01-04T17:00:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T17:00:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:03:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"product": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"product_id": "qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-141.el7_4.6?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"product": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"product_id": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-141.el7_4.6?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"product": {
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"product_id": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common@1.5.3-141.el7_4.6?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"product": {
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"product_id": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@1.5.3-141.el7_4.6?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-141.el7_4.6?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.src",
"product": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.src",
"product_id": "qemu-kvm-10:1.5.3-141.el7_4.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-141.el7_4.6?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"product": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"product_id": "qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-141.el7_4.6?arch=ppc64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-141.el7_4.6?arch=ppc64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"product": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"product_id": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-141.el7_4.6?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-141.el7_4.6?arch=ppc64le\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.src",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Client-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.src",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Server-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.src",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"relates_to_product_reference": "7Workstation-7.4.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T17:00:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0023"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Client-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Client-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Client-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Client-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7ComputeNode-optional-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7ComputeNode-optional-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7ComputeNode-optional-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7ComputeNode-optional-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Server-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Server-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Server-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Server-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.ppc64le",
"7Workstation-7.4.Z:qemu-img-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.src",
"7Workstation-7.4.Z:qemu-kvm-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-common-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.ppc64le",
"7Workstation-7.4.Z:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.6.x86_64",
"7Workstation-7.4.Z:qemu-kvm-tools-10:1.5.3-141.el7_4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
}
]
}
RHSA-2018:1062
Vulnerability from csaf_redhat - Published: 2018-04-10 15:23 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important, KVM for Power)\n\n* kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important)\n\n* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important)\n\n* Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important)\n\n* kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important)\n\n* kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate)\n\n* kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate)\n\n* kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate)\n\n* kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate)\n\n* kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate)\n\n* kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate)\n\n* kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate)\n\n* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate)\n\n* kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate)\n\n* kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate)\n\n* kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate)\n\n* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate)\n\n* kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate)\n\n* kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate)\n\n* Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate)\n\n* kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate)\n\n* kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate)\n\n* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate)\n\n * kernel: multiple Low security impact security issues (CVE-2016-3672, CVE-2017-14140, CVE-2017-15116, CVE-2017-15127, CVE-2018-6927, Low)\n\nRed Hat would like to thank Eyal Itkin for reporting CVE-2016-8633; Google Project Zero for reporting CVE-2017-5754; Mohamed Ghannam for reporting CVE-2017-8824; Jim Mattson (Google.com) for reporting CVE-2017-12154; Vitaly Mayatskih for reporting CVE-2017-12190; Andrea Arcangeli (Engineering) for reporting CVE-2017-15126; Kirill Tkhai for reporting CVE-2017-15129; Jan H. Sch\u00f6nherr (Amazon) for reporting CVE-2017-1000252; and Armis Labs for reporting CVE-2017-1000410. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat) and the CVE-2017-15116 issue was discovered by ChunYu Wang (Red Hat).\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1062",
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.5_Release_Notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.5_Release_Notes/index.html"
},
{
"category": "external",
"summary": "1132610",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132610"
},
{
"category": "external",
"summary": "1324749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324749"
},
{
"category": "external",
"summary": "1334439",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334439"
},
{
"category": "external",
"summary": "1372079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372079"
},
{
"category": "external",
"summary": "1391490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391490"
},
{
"category": "external",
"summary": "1402885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402885"
},
{
"category": "external",
"summary": "1436798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436798"
},
{
"category": "external",
"summary": "1450205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450205"
},
{
"category": "external",
"summary": "1458032",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458032"
},
{
"category": "external",
"summary": "1460213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460213"
},
{
"category": "external",
"summary": "1461282",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461282"
},
{
"category": "external",
"summary": "1471875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471875"
},
{
"category": "external",
"summary": "1487352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487352"
},
{
"category": "external",
"summary": "1488329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488329"
},
{
"category": "external",
"summary": "1489088",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489088"
},
{
"category": "external",
"summary": "1489542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489542"
},
{
"category": "external",
"summary": "1490673",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490673"
},
{
"category": "external",
"summary": "1490781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490781"
},
{
"category": "external",
"summary": "1491224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491224"
},
{
"category": "external",
"summary": "1493125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493125"
},
{
"category": "external",
"summary": "1495089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495089"
},
{
"category": "external",
"summary": "1496836",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496836"
},
{
"category": "external",
"summary": "1501878",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501878"
},
{
"category": "external",
"summary": "1502601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502601"
},
{
"category": "external",
"summary": "1506382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506382"
},
{
"category": "external",
"summary": "1507025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1507025"
},
{
"category": "external",
"summary": "1507026",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1507026"
},
{
"category": "external",
"summary": "1514609",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1514609"
},
{
"category": "external",
"summary": "1519160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160"
},
{
"category": "external",
"summary": "1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "1520328",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520328"
},
{
"category": "external",
"summary": "1520893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520893"
},
{
"category": "external",
"summary": "1523481",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523481"
},
{
"category": "external",
"summary": "1525218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525218"
},
{
"category": "external",
"summary": "1525474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525474"
},
{
"category": "external",
"summary": "1525762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525762"
},
{
"category": "external",
"summary": "1525768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525768"
},
{
"category": "external",
"summary": "1531135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135"
},
{
"category": "external",
"summary": "1531174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531174"
},
{
"category": "external",
"summary": "1531680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531680"
},
{
"category": "external",
"summary": "1534272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534272"
},
{
"category": "external",
"summary": "1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "1539706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539706"
},
{
"category": "external",
"summary": "1542013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542013"
},
{
"category": "external",
"summary": "1544612",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544612"
},
{
"category": "external",
"summary": "1548412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412"
},
{
"category": "external",
"summary": "1550811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550811"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1062.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:04:18+00:00",
"generator": {
"date": "2025-11-21T18:04:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1062",
"initial_release_date": "2018-04-10T15:23:31+00:00",
"revision_history": [
{
"date": "2018-04-10T15:23:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-10T15:23:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-862.el7.x86_64",
"product_id": "perf-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-862.el7.x86_64",
"product_id": "python-perf-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-862.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-862.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.el7.src",
"product": {
"name": "kernel-0:3.10.0-862.el7.src",
"product_id": "kernel-0:3.10.0-862.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-862.el7.s390x",
"product_id": "kernel-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.el7.s390x",
"product": {
"name": "perf-0:3.10.0-862.el7.s390x",
"product_id": "perf-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-862.el7.s390x",
"product_id": "python-perf-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-862.el7.ppc64",
"product_id": "perf-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-862.el7.ppc64",
"product_id": "python-perf-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-862.el7.ppc64le",
"product_id": "perf-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3672",
"cwe": {
"id": "CWE-341",
"name": "Predictable from Observable State"
},
"discovery_date": "2016-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1324749"
}
],
"notes": [
{
"category": "description",
"text": "A weakness was found in the Linux ASLR implementation. Any user able to running 32-bit applications in a x86 machine can disable ASLR by setting the RLIMIT_STACK resource to unlimited.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: unlimiting the stack disables ASLR",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-3672"
},
{
"category": "external",
"summary": "RHBZ#1324749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324749"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3672"
},
{
"category": "external",
"summary": "http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html",
"url": "http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html"
},
{
"category": "external",
"summary": "http://seclists.org/bugtraq/2016/Apr/34",
"url": "http://seclists.org/bugtraq/2016/Apr/34"
}
],
"release_date": "2016-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: unlimiting the stack disables ASLR"
},
{
"cve": "CVE-2016-7913",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2016-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1402885"
}
],
"notes": [
{
"category": "description",
"text": "The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: media: use-after-free in [tuner-xc2028] media driver",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 as the code with the flaw is not present in the products listed.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG-2. Future Linux kernel updates for the respective releases might address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-7913"
},
{
"category": "external",
"summary": "RHBZ#1402885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402885"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-7913",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7913"
}
],
"release_date": "2016-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: media: use-after-free in [tuner-xc2028] media driver"
},
{
"acknowledgments": [
{
"names": [
"Eyal Itkin"
]
}
],
"cve": "CVE-2016-8633",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2016-11-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1391490"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability due to a lack of input filtering of incoming fragmented datagrams was found in the IP-over-1394 driver [firewire-net] in a fragment handling code in the Linux kernel. The vulnerability exists since firewire supported IPv4, i.e. since version 2.6.31 (year 2009) till version v4.9-rc4. A maliciously formed fragment with a respectively large datagram offset would cause a memcpy() past the datagram buffer, which would cause a system panic or possible arbitrary code execution.\r\n\r\nThe flaw requires [firewire-net] module to be loaded and is remotely exploitable from connected firewire devices, but not over a local network.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Buffer overflow in firewire driver via crafted incoming packets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG 2.x. This issue has been rated as having Moderate security impact. Future Linux kernel updates for the respective releases might address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8633"
},
{
"category": "external",
"summary": "RHBZ#1391490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8633",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8633"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8633",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8633"
}
],
"release_date": "2016-11-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Buffer overflow in firewire driver via crafted incoming packets"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
},
{
"cve": "CVE-2017-7294",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2017-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1436798"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write vulnerability was found in the Linux kernel\u0027s vmw_surface_define_ioctl() function, in the \u0027drivers/gpu/drm/vmwgfx/vmwgfx_surface.c\u0027 file. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code where the flaw was found is not present in this product.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-7294"
},
{
"category": "external",
"summary": "RHBZ#1436798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436798"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-7294",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7294"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7294",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7294"
}
],
"release_date": "2017-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()"
},
{
"acknowledgments": [
{
"names": [
"Mohamed Ghannam"
]
}
],
"cve": "CVE-2017-8824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519591"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in DCCP socket code affecting the Linux kernel since 2.6.16. This vulnerability could allow an attacker to their escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free vulnerability in DCCP socket",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, Red Hat Enterprise MRG 2 and real-time kernels. Future updates for the respective releases may address this issue.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "RHBZ#1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824"
}
],
"release_date": "2017-12-05T05:43:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use-after-free vulnerability in DCCP socket"
},
{
"cve": "CVE-2017-9725",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2017-09-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1489088"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found where the kernel truncated the value used to indicate the size of a buffer which it would later become zero using an untruncated value. This can corrupt memory outside of the original allocation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Incorrect type conversion for size during dma allocation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2.\n\nFuture Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-9725"
},
{
"category": "external",
"summary": "RHBZ#1489088",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489088"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-9725",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9725"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9725",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9725"
},
{
"category": "external",
"summary": "https://source.android.com/security/bulletin/2017-09-01",
"url": "https://source.android.com/security/bulletin/2017-09-01"
}
],
"release_date": "2015-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Incorrect type conversion for size during dma allocation"
},
{
"acknowledgments": [
{
"names": [
"Jim Mattson"
],
"organization": "Google.com"
}
],
"cve": "CVE-2017-12154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2017-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1491224"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel built with the KVM visualization support (CONFIG_KVM), with nested visualization (nVMX) feature enabled (nested=1), is vulnerable to a crash due to disabled external interrupts. As L2 guest could access (r/w) hardware CR8 register of the host(L0). In a nested visualization setup, L2 guest user could use this flaw to potentially crash the host(L0) resulting in DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with\nRed Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-12154"
},
{
"category": "external",
"summary": "RHBZ#1491224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491224"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-12154",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12154"
}
],
"release_date": "2017-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register"
},
{
"acknowledgments": [
{
"names": [
"Vitaly Mayatskih"
]
}
],
"cve": "CVE-2017-12190",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1495089"
}
],
"notes": [
{
"category": "description",
"text": "It was found that in the Linux kernel through v4.14-rc5, bio_map_user_iov() and bio_unmap_user() in \u0027block/bio.c\u0027 do unbalanced pages refcounting if IO vector has small consecutive buffers belonging to the same page. bio_add_pc_page() merges them into one, but the page reference is never dropped, causing a memory leak and possible system lockup due to out-of-memory condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak when merging buffers in SCSI IO vectors",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-12190"
},
{
"category": "external",
"summary": "RHBZ#1495089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12190"
}
],
"release_date": "2017-09-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: memory leak when merging buffers in SCSI IO vectors"
},
{
"cve": "CVE-2017-13166",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2018-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1548412"
}
],
"notes": [
{
"category": "description",
"text": "A bug in the 32-bit compatibility layer of the ioctl handling code of the v4l2 video driver in the Linux kernel has been found. A memory protection mechanism ensuring that user-provided buffers always point to a userspace memory were disabled, allowing destination address to be in a kernel space. This flaw could be exploited by an attacker to overwrite a kernel memory from an unprivileged userspace process, leading to privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-13166"
},
{
"category": "external",
"summary": "RHBZ#1548412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166"
}
],
"release_date": "2017-07-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
},
{
"category": "workaround",
"details": "A systemtap script intercepting v4l2_compat_ioctl32() function of the [videodev] module and making it to return -ENOIOCTLCMD error value would work just fine, except breaking all 32bit video capturing software, but not 64bit ones.\n\nAlternatively, blacklisting [videodev] module will work too, but it will break all video capturing software.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation"
},
{
"cve": "CVE-2017-13305",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-04-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1581637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw has been identified in the Linux kernel\u0027s implementation of valid_master_desc() in which a memory buffer would be compared to a userspace value with an incorrect size of comparison. By bruteforcing the comparison, an attacker could determine what was in memory after the description and possibly obtain sensitive information from kernel memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Buffer over-read in keyring subsystem allows exposing potentially sensitive information to local attacker",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-13305"
},
{
"category": "external",
"summary": "RHBZ#1581637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-13305",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13305"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13305",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13305"
}
],
"release_date": "2017-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Buffer over-read in keyring subsystem allows exposing potentially sensitive information to local attacker"
},
{
"cve": "CVE-2017-14140",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2017-09-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1488329"
}
],
"notes": [
{
"category": "description",
"text": "The move_pages system call in mm/migrate.c in the Linux kernel doesn\u0027t check the effective uid of the target process. This enables a local attacker to learn the memory layout of a setuid executable allowing mitigation of ASLR.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Missing permission check in move_pages system call",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-14140"
},
{
"category": "external",
"summary": "RHBZ#1488329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488329"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-14140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14140"
}
],
"release_date": "2017-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Missing permission check in move_pages system call"
},
{
"acknowledgments": [
{
"names": [
"ChunYu Wang"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2017-15116",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2017-08-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1514609"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s random number generator API. A null pointer dereference in the rngapi_reset function may result in denial of service, crashing the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Null pointer dereference in rngapi_reset function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5 and 6 and kernel-alt.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 7 and MRG-2.\n\nFuture Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15116"
},
{
"category": "external",
"summary": "RHBZ#1514609",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1514609"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15116",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15116"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15116",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15116"
}
],
"release_date": "2017-08-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Null pointer dereference in rngapi_reset function"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2017-15121",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2017-10-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1520893"
}
],
"notes": [
{
"category": "description",
"text": "A non-privileged user is able to mount a fuse filesystem on RHEL 6 or 7 and crash a system if an application punches a hole in a file that does not end aligned to a page boundary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vfs: BUG in truncate_inode_pages_range() and fuse client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE.\n\nThis issue affects the versions of the Linux kernel as shipped with 6, 7 and Red Hat Enterprise MRG 2. Future updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15121"
},
{
"category": "external",
"summary": "RHBZ#1520893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15121",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15121"
}
],
"release_date": "2017-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: vfs: BUG in truncate_inode_pages_range() and fuse client"
},
{
"acknowledgments": [
{
"names": [
"Andrea Arcangeli"
],
"organization": "Red Hat Engineering",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2017-15126",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2017-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1523481"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s handling of fork failure when dealing with event messages in the userfaultfd code. Failure to fork correctly can create a fork event that will be removed from an already freed list of events.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 7, realtime, MRG-2 prior to version kernel-3.10.0-781.\n\nThe kernel-alt package already as shipped contains this fix.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15126"
},
{
"category": "external",
"summary": "RHBZ#1523481",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523481"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15126",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15126"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15126",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15126"
}
],
"release_date": "2017-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c"
},
{
"cve": "CVE-2017-15127",
"cwe": {
"id": "CWE-460",
"name": "Improper Cleanup on Thrown Exception"
},
"discovery_date": "2017-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1525218"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel when freeing pages in hugetlbfs. This could trigger a local denial of service by crashing the kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15127"
},
{
"category": "external",
"summary": "RHBZ#1525218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525218"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15127",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15127"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15127",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15127"
}
],
"release_date": "2017-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
]
}
],
"cve": "CVE-2017-15129",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2017-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1531174"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in a network namespaces code affecting the Linux kernel since v4.0-rc1 through v4.15-rc5. The function get_net_ns_by_id() does not check for the net::count value after it has found a peer network in netns_ids idr which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: double-free and memory corruption in get_net_ns_by_id()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5 and 6 as the code with the flaw is not present in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15129"
},
{
"category": "external",
"summary": "RHBZ#1531174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531174"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15129"
}
],
"release_date": "2017-12-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: double-free and memory corruption in get_net_ns_by_id()"
},
{
"cve": "CVE-2017-15265",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1501878"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found when issuing an ioctl to a sound device. This could allow a user to exploit a race condition and create memory corruption or possibly privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in snd_seq_ioctl_create_port()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5,6, 7, realtime and MRG-2.\n\nRed Hat Enterprise Linux 5 has transitioned to Production phase 3. \nDuring the Production 3 Phase, Critical impact Security Advisories (RHSAs) \nand selected Urgent Priority Bug Fix Advisories (RHBAs) may be released \nas they become available.\n\nThe official life cycle policy can be reviewed here:\n\nhttp://redhat.com/rhel/lifecycle\n\nFuture Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15265"
},
{
"category": "external",
"summary": "RHBZ#1501878",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501878"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15265",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15265"
}
],
"release_date": "2017-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
},
{
"category": "workaround",
"details": "It is possible to prevent the affected code from being loaded by blacklisting the kernel module snd_seq. Instructions relating to how to blacklist a kernel module are shown here: https://access.redhat.com/solutions/41278 \n\nAlternatively a custom permission set can be created by udev, the correct permissions will depend on your use case. Please contact Red Hat customer support for creating a rule set that can minimize flaw exposure.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in snd_seq_ioctl_create_port()"
},
{
"cve": "CVE-2017-15274",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2017-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1500391"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the implementation of associative arrays where the add_key systemcall and KEYCTL_UPDATE operations allowed for a NULL payload with a nonzero length. When accessing the payload within this length parameters value, an unprivileged user could trivially cause a NULL pointer dereference (kernel oops).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dereferencing NULL payload with nonzero length",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise\nLinux 5,6,7, MRG-2 and realtime kernels.\n\nRed Hat Enterprise Linux 5 has transitioned to Production phase 3. \nDuring the Production 3 Phase, Critical impact Security Advisories (RHSAs) \nand selected Urgent Priority Bug Fix Advisories (RHBAs) may be released \nas they become available.\n\nAt this time this bug is not meet this critera and is unlikley to be fixed\nfor these releases.\n\nThe official life cycle policy can be reviewed here:\n\nhttp://redhat.com/rhel/lifecycle\n\nFuture Linux kernel updates for the products in production phase 1 and 2, namely Red Hat Enterprise\nLinux 6, 7 and MRG-2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15274"
},
{
"category": "external",
"summary": "RHBZ#1500391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15274",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15274"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15274",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15274"
}
],
"release_date": "2017-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dereferencing NULL payload with nonzero length"
},
{
"cve": "CVE-2017-17448",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2017-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1525768"
}
],
"notes": [
{
"category": "description",
"text": "The net/netfilter/nfnetlink_cthelper.c function in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations. This allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2, as a code with the flaw is not present or is not built in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-17448"
},
{
"category": "external",
"summary": "RHBZ#1525768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525768"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-17448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17448"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17448",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17448"
}
],
"release_date": "2017-12-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure"
},
{
"cve": "CVE-2017-17449",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2017-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1525762"
}
],
"notes": [
{
"category": "description",
"text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel, through 4.14.4, does not restrict observations of Netlink messages to a single net namespace, when CONFIG_NLMON is enabled. This allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6, as a code with the flaw is not present or is not built in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-17449"
},
{
"category": "external",
"summary": "RHBZ#1525762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17449"
}
],
"release_date": "2017-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity"
},
{
"cve": "CVE-2017-17558",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2017-12-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1525474"
}
],
"notes": [
{
"category": "description",
"text": "The usb_destroy_configuration() function, in \u0027drivers/usb/core/config.c\u0027 in the USB core subsystem, in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources. This allows local users to cause a denial of service, due to out-of-bounds write access, or possibly have unspecified other impact via a crafted USB device. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-17558"
},
{
"category": "external",
"summary": "RHBZ#1525474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525474"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17558"
}
],
"release_date": "2017-12-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow"
},
{
"cve": "CVE-2017-18017",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1531135"
}
],
"notes": [
{
"category": "description",
"text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18017"
},
{
"category": "external",
"summary": "RHBZ#1531135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017"
}
],
"release_date": "2018-01-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c"
},
{
"cve": "CVE-2017-18203",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1550811"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel, before version 4.14.3, is vulnerable to a denial of service in drivers/md/dm.c:dm_get_from_kobject() which can be caused by local users leveraging a race condition with __dm_destroy() during creation and removal of DM devices. Only privileged local users (with CAP_SYS_ADMIN capability) can directly perform the ioctl operations for dm device creation and removal and this would typically be outside the direct control of the unprivileged attacker.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, as the code with the flaw is not present in this product.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18203"
},
{
"category": "external",
"summary": "RHBZ#1550811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550811"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18203",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18203"
}
],
"release_date": "2017-11-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service"
},
{
"acknowledgments": [
{
"names": [
"Eric Biggers"
],
"organization": "Google"
}
],
"cve": "CVE-2017-18270",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2018-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1580979"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel in the way a local user could create keyrings for other users via keyctl commands. This may allow an attacker to set unwanted defaults, a denial of service, or possibly leak keyring information between users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper keyrings creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is Moderate, because the impact is only for userspace programs if using keyctl incorrectly. For root-level processes (usually during boot) keyctl being used securely without possibility of leaking keys between users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18270"
},
{
"category": "external",
"summary": "RHBZ#1580979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580979"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18270",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18270"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18270",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18270"
},
{
"category": "external",
"summary": "http://kernsec.org/pipermail/linux-security-module-archive/2017-September/003318.html",
"url": "http://kernsec.org/pipermail/linux-security-module-archive/2017-September/003318.html"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=237bbd29f7a049d310d907f4b2716a7feef9abf3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=237bbd29f7a049d310d907f4b2716a7feef9abf3"
}
],
"release_date": "2017-09-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: improper keyrings creation"
},
{
"acknowledgments": [
{
"names": [
"Jan H. Sch\u00f6nherr"
],
"organization": "Amazon"
}
],
"cve": "CVE-2017-1000252",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2017-09-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1490781"
}
],
"notes": [
{
"category": "description",
"text": "A reachable assertion failure flaw was found in the Linux kernel built with KVM virtualisation(CONFIG_KVM) support with Virtual Function I/O feature (CONFIG_VFIO) enabled. This failure could occur if a malicious guest device sent a virtual interrupt (guest IRQ) with a larger (\u003e1024) index value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000252"
},
{
"category": "external",
"summary": "RHBZ#1490781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490781"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000252",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000252"
}
],
"release_date": "2017-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ"
},
{
"cve": "CVE-2017-1000407",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2017-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1520328"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel Virtualization Module (CONFIG_KVM) for the Intel processor family (CONFIG_KVM_INTEL) is vulnerable to a DoS issue. It could occur if a guest was to flood the I/O port 0x80 with write requests. A guest user could use this flaw to crash the host kernel resulting in DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: KVM: DoS via write flood to I/O port 0x80",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000407"
},
{
"category": "external",
"summary": "RHBZ#1520328",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520328"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000407"
}
],
"release_date": "2017-12-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: KVM: DoS via write flood to I/O port 0x80"
},
{
"acknowledgments": [
{
"names": [
"Armis Labs"
]
}
],
"cve": "CVE-2017-1000410",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519160"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the processing of incoming L2CAP bluetooth commands. Uninitialized stack variables can be sent to an attacker leaking data in kernel address space.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Stack information leak in the EFS element",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000410"
},
{
"category": "external",
"summary": "RHBZ#1519160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000410"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410"
}
],
"release_date": "2017-12-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Stack information leak in the EFS element"
},
{
"cve": "CVE-2018-1066",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1539599"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s client-side implementation of the cifs protocol. This flaw allows an attacker controlling the server to kernel panic a client which has the CIFS server mounted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Null pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() when empty TargetInfo is returned in NTLMSSP setup negotiation response allowing to crash client\u0027s kernel",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1066"
},
{
"category": "external",
"summary": "RHBZ#1539599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539599"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1066"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1066",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1066"
}
],
"release_date": "2014-10-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Null pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() when empty TargetInfo is returned in NTLMSSP setup negotiation response allowing to crash client\u0027s kernel"
},
{
"cve": "CVE-2018-5750",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1539706"
}
],
"notes": [
{
"category": "description",
"text": "The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel, through 4.14.15, allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2, as KASLR feature is not present or enabled in these products.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5750"
},
{
"category": "external",
"summary": "RHBZ#1539706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539706"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5750",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5750"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5750",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5750"
}
],
"release_date": "2017-12-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass"
},
{
"cve": "CVE-2018-6927",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2018-02-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1544612"
}
],
"notes": [
{
"category": "description",
"text": "The futex_requeue function in kernel/futex.c in the Linux kernel, before 4.14.15, might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impacts by triggering a negative wake or requeue value. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-6927"
},
{
"category": "external",
"summary": "RHBZ#1544612",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544612"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-6927",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6927"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-6927",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-6927"
}
],
"release_date": "2018-02-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact"
},
{
"cve": "CVE-2018-1000004",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1535315"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel versions 4.12, 3.10, 2.6, and possibly earlier, a race condition vulnerability exists in the sound system allowing for a potential deadlock and memory corruption due to use-after-free condition and thus denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sound system can lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of Linux kernel package as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "RHBZ#1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004"
}
],
"release_date": "2018-01-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sound system can lead to denial of service"
}
]
}
RHSA-2018_1346
Vulnerability from csaf_redhat - Published: 2018-05-08 20:58 - Updated: 2024-11-15 03:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: cpu: speculative execution permission faults handling (CVE-2017-5754, x86 32-bit)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Google Project Zero for reporting CVE-2017-5754 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.\n\nBug Fix(es):\n\n* The kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Retpolines. The Retpolines mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. (BZ#1554253)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1346",
"url": "https://access.redhat.com/errata/RHSA-2018:1346"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/pop_ss",
"url": "https://access.redhat.com/security/vulnerabilities/pop_ss"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "1567074",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1346.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T03:03:44+00:00",
"generator": {
"date": "2024-11-15T03:03:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1346",
"initial_release_date": "2018-05-08T20:58:30+00:00",
"revision_history": [
{
"date": "2018-05-08T20:58:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-10T18:26:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:03:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "perf-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-573.55.2.el6.i686",
"product_id": "python-perf-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-debug-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-devel-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-headers-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "perf-0:2.6.32-573.55.2.el6.i686",
"product_id": "perf-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-573.55.2.el6.src",
"product_id": "kernel-0:2.6.32-573.55.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.55.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.55.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.55.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-573.55.2.el6.s390x",
"product_id": "python-perf-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "perf-0:2.6.32-573.55.2.el6.s390x",
"product_id": "perf-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.55.2.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "python-perf-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "perf-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.55.2.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.src",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.src",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T20:58:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1346"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T20:58:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1346"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
},
{
"acknowledgments": [
{
"names": [
"Andy Lutomirski"
]
},
{
"names": [
"Nick Peterson"
],
"organization": "Everdox Tech LLC"
}
],
"cve": "CVE-2018-8897",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2018-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1567074"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: error in exception handling leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8897"
},
{
"category": "external",
"summary": "RHBZ#1567074",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/pop_ss",
"url": "https://access.redhat.com/security/vulnerabilities/pop_ss"
}
],
"release_date": "2018-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T20:58:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1346"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: error in exception handling leads to DoS"
}
]
}
RHSA-2018_1196
Vulnerability from csaf_redhat - Published: 2018-04-23 12:59 - Updated: 2024-11-14 23:41Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 4th September 2019]\nThe Problem Description text has been updated to fix a list of architectures addressed by the CVE-2017-5715 mitigation. No changes have been made to the packages.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important, x86 and x86-64)\n\nRed Hat would like to thank Google Project Zero for reporting this issue.\n\nBug Fix(es):\n\n* The Return Trampolines (Retpolines) mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. With this update, the support for Retpolines has been implemented into the Red Hat Enterprise Linux kernel. (BZ#1535650)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1196",
"url": "https://access.redhat.com/errata/RHSA-2018:1196"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1196.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-14T23:41:34+00:00",
"generator": {
"date": "2024-11-14T23:41:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1196",
"initial_release_date": "2018-04-23T12:59:43+00:00",
"revision_history": [
{
"date": "2018-04-23T12:59:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-09-05T07:46:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:41:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 5 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-430.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-430.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-430.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-430.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-430.el5.i686",
"product_id": "kernel-xen-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-430.el5.i686",
"product_id": "kernel-devel-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-430.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-430.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-430.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-0:2.6.18-430.el5.i686",
"product_id": "kernel-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-430.el5.i686",
"product_id": "kernel-debug-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-430.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-430.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-430.el5.i386",
"product_id": "kernel-headers-0:2.6.18-430.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-430.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-430.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-430.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-430.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-430.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-430.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-430.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-430.el5.s390x",
"product_id": "kernel-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-430.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-430.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-430.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-430.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-430.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-430.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-430.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-430.el5.src",
"product": {
"name": "kernel-0:2.6.18-430.el5.src",
"product_id": "kernel-0:2.6.18-430.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-430.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-430.el5.src as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-0:2.6.18-430.el5.src"
},
"product_reference": "kernel-0:2.6.18-430.el5.src",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-PAE-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-PAE-devel-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-devel-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-devel-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-devel-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-430.el5.noarch as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-doc-0:2.6.18-430.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-430.el5.noarch",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-430.el5.i386 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-headers-0:2.6.18-430.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-430.el5.i386",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-headers-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-headers-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-kdump-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-kdump-devel-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-ELS:kernel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-0:2.6.18-430.el5.src",
"5Server-ELS:kernel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-PAE-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-PAE-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-doc-0:2.6.18-430.el5.noarch",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.i386",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-kdump-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-kdump-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-xen-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-23T12:59:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Server-ELS:kernel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-0:2.6.18-430.el5.src",
"5Server-ELS:kernel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-PAE-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-PAE-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-doc-0:2.6.18-430.el5.noarch",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.i386",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-kdump-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-kdump-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-xen-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1196"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"5Server-ELS:kernel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-0:2.6.18-430.el5.src",
"5Server-ELS:kernel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-PAE-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-PAE-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-doc-0:2.6.18-430.el5.noarch",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.i386",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-kdump-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-kdump-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-xen-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
}
]
}
RHSA-2018_1319
Vulnerability from csaf_redhat - Published: 2018-05-08 19:04 - Updated: 2024-11-15 03:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: cpu: speculative execution permission faults handling (CVE-2017-5754, x86 32-bit)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* kernel: nfsd: Incorrect handling of long RPC replies (CVE-2017-7645)\n\n* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824)\n\n* kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166)\n\n* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017)\n\n* kernel: Stack information leak in the EFS element (CVE-2017-1000410)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Google Project Zero for reporting CVE-2017-5754; Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897; Mohamed Ghannam for reporting CVE-2017-8824; and Armis Labs for reporting CVE-2017-1000410.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article: https://access.redhat.com/articles/3431591",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1319",
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/pop_ss",
"url": "https://access.redhat.com/security/vulnerabilities/pop_ss"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3431591",
"url": "https://access.redhat.com/articles/3431591"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "1443615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615"
},
{
"category": "external",
"summary": "1519160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160"
},
{
"category": "external",
"summary": "1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "1531135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135"
},
{
"category": "external",
"summary": "1548412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412"
},
{
"category": "external",
"summary": "1567074",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1319.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T03:04:01+00:00",
"generator": {
"date": "2024-11-15T03:04:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1319",
"initial_release_date": "2018-05-08T19:04:35+00:00",
"revision_history": [
{
"date": "2018-05-08T19:04:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-10T18:43:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:04:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-696.28.1.el6.i686",
"product_id": "perf-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-696.28.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686",
"product_id": "python-perf-0:2.6.32-696.28.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "perf-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.28.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-696.28.1.el6.src",
"product_id": "kernel-0:2.6.32-696.28.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-696.28.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-696.28.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-696.28.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x",
"product_id": "perf-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-696.28.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "perf-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.src",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
},
{
"cve": "CVE-2017-7645",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2017-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1443615"
}
],
"notes": [
{
"category": "description",
"text": "The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd: Incorrect handling of long RPC replies",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with\nRed Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel\nupdates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may\naddress this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-7645"
},
{
"category": "external",
"summary": "RHBZ#1443615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-7645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7645"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645"
}
],
"release_date": "2017-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd: Incorrect handling of long RPC replies"
},
{
"acknowledgments": [
{
"names": [
"Mohamed Ghannam"
]
}
],
"cve": "CVE-2017-8824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519591"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in DCCP socket code affecting the Linux kernel since 2.6.16. This vulnerability could allow an attacker to their escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free vulnerability in DCCP socket",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, Red Hat Enterprise MRG 2 and real-time kernels. Future updates for the respective releases may address this issue.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "RHBZ#1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824"
}
],
"release_date": "2017-12-05T05:43:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use-after-free vulnerability in DCCP socket"
},
{
"cve": "CVE-2017-13166",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2018-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1548412"
}
],
"notes": [
{
"category": "description",
"text": "A bug in the 32-bit compatibility layer of the ioctl handling code of the v4l2 video driver in the Linux kernel has been found. A memory protection mechanism ensuring that user-provided buffers always point to a userspace memory were disabled, allowing destination address to be in a kernel space. This flaw could be exploited by an attacker to overwrite a kernel memory from an unprivileged userspace process, leading to privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-13166"
},
{
"category": "external",
"summary": "RHBZ#1548412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166"
}
],
"release_date": "2017-07-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
},
{
"category": "workaround",
"details": "A systemtap script intercepting v4l2_compat_ioctl32() function of the [videodev] module and making it to return -ENOIOCTLCMD error value would work just fine, except breaking all 32bit video capturing software, but not 64bit ones.\n\nAlternatively, blacklisting [videodev] module will work too, but it will break all video capturing software.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation"
},
{
"cve": "CVE-2017-18017",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1531135"
}
],
"notes": [
{
"category": "description",
"text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18017"
},
{
"category": "external",
"summary": "RHBZ#1531135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017"
}
],
"release_date": "2018-01-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c"
},
{
"acknowledgments": [
{
"names": [
"Armis Labs"
]
}
],
"cve": "CVE-2017-1000410",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519160"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the processing of incoming L2CAP bluetooth commands. Uninitialized stack variables can be sent to an attacker leaking data in kernel address space.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Stack information leak in the EFS element",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000410"
},
{
"category": "external",
"summary": "RHBZ#1519160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000410"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410"
}
],
"release_date": "2017-12-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Stack information leak in the EFS element"
},
{
"acknowledgments": [
{
"names": [
"Andy Lutomirski"
]
},
{
"names": [
"Nick Peterson"
],
"organization": "Everdox Tech LLC"
}
],
"cve": "CVE-2018-8897",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2018-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1567074"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: error in exception handling leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8897"
},
{
"category": "external",
"summary": "RHBZ#1567074",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/pop_ss",
"url": "https://access.redhat.com/security/vulnerabilities/pop_ss"
}
],
"release_date": "2018-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T19:04:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1319"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: error in exception handling leads to DoS"
}
]
}
RHSA-2018:1216
Vulnerability from csaf_redhat - Published: 2018-04-24 15:16 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Mohamed Ghannam for reporting this issue.\n\nBug Fix(es):\n\n* Previously, the XFS code included a circular dependency between the xfs-log and the xfs-cil workqueues. Consequently, an XFS deadlock occurred in some cases. This update adds a new workqueue dedicated to the log covering background task to avoid the deadlock. (BZ#1543303)\n\n* The kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Retpolines. The Retpolines mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. (BZ#1553181)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1216",
"url": "https://access.redhat.com/errata/RHSA-2018:1216"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1216.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:04:27+00:00",
"generator": {
"date": "2025-11-21T18:04:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1216",
"initial_release_date": "2018-04-24T15:16:47+00:00",
"revision_history": [
{
"date": "2018-04-24T15:16:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-24T15:16:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "perf-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.66.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.66.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.66.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.66.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.66.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.66.1.el7.src",
"product_id": "kernel-0:3.10.0-327.66.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.66.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.src",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.src",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-24T15:16:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1216"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Mohamed Ghannam"
]
}
],
"cve": "CVE-2017-8824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519591"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in DCCP socket code affecting the Linux kernel since 2.6.16. This vulnerability could allow an attacker to their escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free vulnerability in DCCP socket",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, Red Hat Enterprise MRG 2 and real-time kernels. Future updates for the respective releases may address this issue.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "RHBZ#1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824"
}
],
"release_date": "2017-12-05T05:43:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-24T15:16:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1216"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use-after-free vulnerability in DCCP socket"
}
]
}
RHSA-2018_1062
Vulnerability from csaf_redhat - Published: 2018-04-10 15:23 - Updated: 2024-11-22 11:22Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important, KVM for Power)\n\n* kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important)\n\n* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important)\n\n* Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important)\n\n* kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important)\n\n* kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate)\n\n* kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate)\n\n* kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate)\n\n* kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate)\n\n* kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate)\n\n* kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate)\n\n* kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate)\n\n* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate)\n\n* kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate)\n\n* kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate)\n\n* kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate)\n\n* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate)\n\n* kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate)\n\n* kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate)\n\n* Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate)\n\n* kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate)\n\n* kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate)\n\n* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate)\n\n * kernel: multiple Low security impact security issues (CVE-2016-3672, CVE-2017-14140, CVE-2017-15116, CVE-2017-15127, CVE-2018-6927, Low)\n\nRed Hat would like to thank Eyal Itkin for reporting CVE-2016-8633; Google Project Zero for reporting CVE-2017-5754; Mohamed Ghannam for reporting CVE-2017-8824; Jim Mattson (Google.com) for reporting CVE-2017-12154; Vitaly Mayatskih for reporting CVE-2017-12190; Andrea Arcangeli (Engineering) for reporting CVE-2017-15126; Kirill Tkhai for reporting CVE-2017-15129; Jan H. Sch\u00f6nherr (Amazon) for reporting CVE-2017-1000252; and Armis Labs for reporting CVE-2017-1000410. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat) and the CVE-2017-15116 issue was discovered by ChunYu Wang (Red Hat).\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1062",
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.5_Release_Notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.5_Release_Notes/index.html"
},
{
"category": "external",
"summary": "1132610",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132610"
},
{
"category": "external",
"summary": "1324749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324749"
},
{
"category": "external",
"summary": "1334439",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334439"
},
{
"category": "external",
"summary": "1372079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372079"
},
{
"category": "external",
"summary": "1391490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391490"
},
{
"category": "external",
"summary": "1402885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402885"
},
{
"category": "external",
"summary": "1436798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436798"
},
{
"category": "external",
"summary": "1450205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450205"
},
{
"category": "external",
"summary": "1458032",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458032"
},
{
"category": "external",
"summary": "1460213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460213"
},
{
"category": "external",
"summary": "1461282",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461282"
},
{
"category": "external",
"summary": "1471875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471875"
},
{
"category": "external",
"summary": "1487352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487352"
},
{
"category": "external",
"summary": "1488329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488329"
},
{
"category": "external",
"summary": "1489088",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489088"
},
{
"category": "external",
"summary": "1489542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489542"
},
{
"category": "external",
"summary": "1490673",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490673"
},
{
"category": "external",
"summary": "1490781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490781"
},
{
"category": "external",
"summary": "1491224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491224"
},
{
"category": "external",
"summary": "1493125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493125"
},
{
"category": "external",
"summary": "1495089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495089"
},
{
"category": "external",
"summary": "1496836",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496836"
},
{
"category": "external",
"summary": "1501878",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501878"
},
{
"category": "external",
"summary": "1502601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502601"
},
{
"category": "external",
"summary": "1506382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506382"
},
{
"category": "external",
"summary": "1507025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1507025"
},
{
"category": "external",
"summary": "1507026",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1507026"
},
{
"category": "external",
"summary": "1514609",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1514609"
},
{
"category": "external",
"summary": "1519160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160"
},
{
"category": "external",
"summary": "1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "1520328",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520328"
},
{
"category": "external",
"summary": "1520893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520893"
},
{
"category": "external",
"summary": "1523481",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523481"
},
{
"category": "external",
"summary": "1525218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525218"
},
{
"category": "external",
"summary": "1525474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525474"
},
{
"category": "external",
"summary": "1525762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525762"
},
{
"category": "external",
"summary": "1525768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525768"
},
{
"category": "external",
"summary": "1531135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135"
},
{
"category": "external",
"summary": "1531174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531174"
},
{
"category": "external",
"summary": "1531680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531680"
},
{
"category": "external",
"summary": "1534272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534272"
},
{
"category": "external",
"summary": "1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "1539706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539706"
},
{
"category": "external",
"summary": "1542013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542013"
},
{
"category": "external",
"summary": "1544612",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544612"
},
{
"category": "external",
"summary": "1548412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412"
},
{
"category": "external",
"summary": "1550811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550811"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1062.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-11-22T11:22:00+00:00",
"generator": {
"date": "2024-11-22T11:22:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1062",
"initial_release_date": "2018-04-10T15:23:31+00:00",
"revision_history": [
{
"date": "2018-04-10T15:23:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-10T15:23:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T11:22:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-862.el7.x86_64",
"product_id": "perf-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-862.el7.x86_64",
"product_id": "python-perf-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-862.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-862.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.el7.src",
"product": {
"name": "kernel-0:3.10.0-862.el7.src",
"product_id": "kernel-0:3.10.0-862.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-862.el7.s390x",
"product_id": "kernel-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.el7.s390x",
"product": {
"name": "perf-0:3.10.0-862.el7.s390x",
"product_id": "perf-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-862.el7.s390x",
"product_id": "python-perf-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-862.el7.ppc64",
"product_id": "perf-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-862.el7.ppc64",
"product_id": "python-perf-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-862.el7.ppc64le",
"product_id": "perf-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3672",
"cwe": {
"id": "CWE-341",
"name": "Predictable from Observable State"
},
"discovery_date": "2016-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1324749"
}
],
"notes": [
{
"category": "description",
"text": "A weakness was found in the Linux ASLR implementation. Any user able to running 32-bit applications in a x86 machine can disable ASLR by setting the RLIMIT_STACK resource to unlimited.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: unlimiting the stack disables ASLR",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-3672"
},
{
"category": "external",
"summary": "RHBZ#1324749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324749"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3672"
},
{
"category": "external",
"summary": "http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html",
"url": "http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html"
},
{
"category": "external",
"summary": "http://seclists.org/bugtraq/2016/Apr/34",
"url": "http://seclists.org/bugtraq/2016/Apr/34"
}
],
"release_date": "2016-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: unlimiting the stack disables ASLR"
},
{
"cve": "CVE-2016-7913",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2016-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1402885"
}
],
"notes": [
{
"category": "description",
"text": "The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: media: use-after-free in [tuner-xc2028] media driver",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 as the code with the flaw is not present in the products listed.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG-2. Future Linux kernel updates for the respective releases might address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-7913"
},
{
"category": "external",
"summary": "RHBZ#1402885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402885"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-7913",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7913"
}
],
"release_date": "2016-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: media: use-after-free in [tuner-xc2028] media driver"
},
{
"acknowledgments": [
{
"names": [
"Eyal Itkin"
]
}
],
"cve": "CVE-2016-8633",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2016-11-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1391490"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability due to a lack of input filtering of incoming fragmented datagrams was found in the IP-over-1394 driver [firewire-net] in a fragment handling code in the Linux kernel. The vulnerability exists since firewire supported IPv4, i.e. since version 2.6.31 (year 2009) till version v4.9-rc4. A maliciously formed fragment with a respectively large datagram offset would cause a memcpy() past the datagram buffer, which would cause a system panic or possible arbitrary code execution.\r\n\r\nThe flaw requires [firewire-net] module to be loaded and is remotely exploitable from connected firewire devices, but not over a local network.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Buffer overflow in firewire driver via crafted incoming packets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG 2.x. This issue has been rated as having Moderate security impact. Future Linux kernel updates for the respective releases might address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8633"
},
{
"category": "external",
"summary": "RHBZ#1391490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8633",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8633"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8633",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8633"
}
],
"release_date": "2016-11-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Buffer overflow in firewire driver via crafted incoming packets"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
},
{
"cve": "CVE-2017-7294",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2017-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1436798"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write vulnerability was found in the Linux kernel\u0027s vmw_surface_define_ioctl() function, in the \u0027drivers/gpu/drm/vmwgfx/vmwgfx_surface.c\u0027 file. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code where the flaw was found is not present in this product.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-7294"
},
{
"category": "external",
"summary": "RHBZ#1436798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436798"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-7294",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7294"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7294",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7294"
}
],
"release_date": "2017-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()"
},
{
"acknowledgments": [
{
"names": [
"Mohamed Ghannam"
]
}
],
"cve": "CVE-2017-8824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519591"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in DCCP socket code affecting the Linux kernel since 2.6.16. This vulnerability could allow an attacker to their escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free vulnerability in DCCP socket",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, Red Hat Enterprise MRG 2 and real-time kernels. Future updates for the respective releases may address this issue.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "RHBZ#1519591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-8824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824"
}
],
"release_date": "2017-12-05T05:43:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use-after-free vulnerability in DCCP socket"
},
{
"cve": "CVE-2017-9725",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2017-09-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1489088"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found where the kernel truncated the value used to indicate the size of a buffer which it would later become zero using an untruncated value. This can corrupt memory outside of the original allocation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Incorrect type conversion for size during dma allocation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2.\n\nFuture Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-9725"
},
{
"category": "external",
"summary": "RHBZ#1489088",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489088"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-9725",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9725"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9725",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9725"
},
{
"category": "external",
"summary": "https://source.android.com/security/bulletin/2017-09-01",
"url": "https://source.android.com/security/bulletin/2017-09-01"
}
],
"release_date": "2015-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Incorrect type conversion for size during dma allocation"
},
{
"acknowledgments": [
{
"names": [
"Jim Mattson"
],
"organization": "Google.com"
}
],
"cve": "CVE-2017-12154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2017-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1491224"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel built with the KVM visualization support (CONFIG_KVM), with nested visualization (nVMX) feature enabled (nested=1), is vulnerable to a crash due to disabled external interrupts. As L2 guest could access (r/w) hardware CR8 register of the host(L0). In a nested visualization setup, L2 guest user could use this flaw to potentially crash the host(L0) resulting in DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with\nRed Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-12154"
},
{
"category": "external",
"summary": "RHBZ#1491224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491224"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-12154",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12154"
}
],
"release_date": "2017-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register"
},
{
"acknowledgments": [
{
"names": [
"Vitaly Mayatskih"
]
}
],
"cve": "CVE-2017-12190",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1495089"
}
],
"notes": [
{
"category": "description",
"text": "It was found that in the Linux kernel through v4.14-rc5, bio_map_user_iov() and bio_unmap_user() in \u0027block/bio.c\u0027 do unbalanced pages refcounting if IO vector has small consecutive buffers belonging to the same page. bio_add_pc_page() merges them into one, but the page reference is never dropped, causing a memory leak and possible system lockup due to out-of-memory condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak when merging buffers in SCSI IO vectors",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-12190"
},
{
"category": "external",
"summary": "RHBZ#1495089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12190"
}
],
"release_date": "2017-09-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: memory leak when merging buffers in SCSI IO vectors"
},
{
"cve": "CVE-2017-13166",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2018-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1548412"
}
],
"notes": [
{
"category": "description",
"text": "A bug in the 32-bit compatibility layer of the ioctl handling code of the v4l2 video driver in the Linux kernel has been found. A memory protection mechanism ensuring that user-provided buffers always point to a userspace memory were disabled, allowing destination address to be in a kernel space. This flaw could be exploited by an attacker to overwrite a kernel memory from an unprivileged userspace process, leading to privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-13166"
},
{
"category": "external",
"summary": "RHBZ#1548412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166"
}
],
"release_date": "2017-07-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
},
{
"category": "workaround",
"details": "A systemtap script intercepting v4l2_compat_ioctl32() function of the [videodev] module and making it to return -ENOIOCTLCMD error value would work just fine, except breaking all 32bit video capturing software, but not 64bit ones.\n\nAlternatively, blacklisting [videodev] module will work too, but it will break all video capturing software.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation"
},
{
"cve": "CVE-2017-13305",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-04-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1581637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s implementation of valid_master_desc() in which a memory buffer would be compared to a userspace value with an incorrect size of comparison. By bruteforcing the comparison, an attacker could determine what was in memory after the description and possibly obtain sensitive information from kernel memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Buffer over-read in keyring subsystem allows exposing potentially sensitive information to local attacker",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-13305"
},
{
"category": "external",
"summary": "RHBZ#1581637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-13305",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13305"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13305",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13305"
}
],
"release_date": "2017-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Buffer over-read in keyring subsystem allows exposing potentially sensitive information to local attacker"
},
{
"cve": "CVE-2017-14140",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2017-09-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1488329"
}
],
"notes": [
{
"category": "description",
"text": "The move_pages system call in mm/migrate.c in the Linux kernel doesn\u0027t check the effective uid of the target process. This enables a local attacker to learn the memory layout of a setuid executable allowing mitigation of ASLR.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Missing permission check in move_pages system call",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-14140"
},
{
"category": "external",
"summary": "RHBZ#1488329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488329"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-14140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14140"
}
],
"release_date": "2017-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Missing permission check in move_pages system call"
},
{
"acknowledgments": [
{
"names": [
"ChunYu Wang"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2017-15116",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2017-08-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1514609"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s random number generator API. A null pointer dereference in the rngapi_reset function may result in denial of service, crashing the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Null pointer dereference in rngapi_reset function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5 and 6 and kernel-alt.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 7 and MRG-2.\n\nFuture Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15116"
},
{
"category": "external",
"summary": "RHBZ#1514609",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1514609"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15116",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15116"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15116",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15116"
}
],
"release_date": "2017-08-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Null pointer dereference in rngapi_reset function"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2017-15121",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2017-10-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1520893"
}
],
"notes": [
{
"category": "description",
"text": "A non-privileged user is able to mount a fuse filesystem on RHEL 6 or 7 and crash a system if an application punches a hole in a file that does not end aligned to a page boundary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vfs: BUG in truncate_inode_pages_range() and fuse client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE.\n\nThis issue affects the versions of the Linux kernel as shipped with 6, 7 and Red Hat Enterprise MRG 2. Future updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15121"
},
{
"category": "external",
"summary": "RHBZ#1520893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15121",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15121"
}
],
"release_date": "2017-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: vfs: BUG in truncate_inode_pages_range() and fuse client"
},
{
"acknowledgments": [
{
"names": [
"Andrea Arcangeli"
],
"organization": "Red Hat Engineering",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2017-15126",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2017-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1523481"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s handling of fork failure when dealing with event messages in the userfaultfd code. Failure to fork correctly can create a fork event that will be removed from an already freed list of events.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 7, realtime, MRG-2 prior to version kernel-3.10.0-781.\n\nThe kernel-alt package already as shipped contains this fix.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15126"
},
{
"category": "external",
"summary": "RHBZ#1523481",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523481"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15126",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15126"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15126",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15126"
}
],
"release_date": "2017-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c"
},
{
"cve": "CVE-2017-15127",
"cwe": {
"id": "CWE-460",
"name": "Improper Cleanup on Thrown Exception"
},
"discovery_date": "2017-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1525218"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel when freeing pages in hugetlbfs. This could trigger a local denial of service by crashing the kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15127"
},
{
"category": "external",
"summary": "RHBZ#1525218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525218"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15127",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15127"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15127",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15127"
}
],
"release_date": "2017-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c"
},
{
"acknowledgments": [
{
"names": [
"Kirill Tkhai"
]
}
],
"cve": "CVE-2017-15129",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2017-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1531174"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in a network namespaces code affecting the Linux kernel since v4.0-rc1 through v4.15-rc5. The function get_net_ns_by_id() does not check for the net::count value after it has found a peer network in netns_ids idr which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: double-free and memory corruption in get_net_ns_by_id()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5 and 6 as the code with the flaw is not present in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15129"
},
{
"category": "external",
"summary": "RHBZ#1531174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531174"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15129",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15129"
}
],
"release_date": "2017-12-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: double-free and memory corruption in get_net_ns_by_id()"
},
{
"cve": "CVE-2017-15265",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1501878"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found when issuing an ioctl to a sound device. This could allow a user to exploit a race condition and create memory corruption or possibly privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in snd_seq_ioctl_create_port()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5,6, 7, realtime and MRG-2.\n\nRed Hat Enterprise Linux 5 has transitioned to Production phase 3. \nDuring the Production 3 Phase, Critical impact Security Advisories (RHSAs) \nand selected Urgent Priority Bug Fix Advisories (RHBAs) may be released \nas they become available.\n\nThe official life cycle policy can be reviewed here:\n\nhttp://redhat.com/rhel/lifecycle\n\nFuture Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15265"
},
{
"category": "external",
"summary": "RHBZ#1501878",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501878"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15265",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15265"
}
],
"release_date": "2017-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
},
{
"category": "workaround",
"details": "It is possible to prevent the affected code from being loaded by blacklisting the kernel module snd_seq. Instructions relating to how to blacklist a kernel module are shown here: https://access.redhat.com/solutions/41278 \n\nAlternatively a custom permission set can be created by udev, the correct permissions will depend on your use case. Please contact Red Hat customer support for creating a rule set that can minimize flaw exposure.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in snd_seq_ioctl_create_port()"
},
{
"cve": "CVE-2017-15274",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2017-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1500391"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the implementation of associative arrays where the add_key systemcall and KEYCTL_UPDATE operations allowed for a NULL payload with a nonzero length. When accessing the payload within this length parameters value, an unprivileged user could trivially cause a NULL pointer dereference (kernel oops).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dereferencing NULL payload with nonzero length",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise\nLinux 5,6,7, MRG-2 and realtime kernels.\n\nRed Hat Enterprise Linux 5 has transitioned to Production phase 3. \nDuring the Production 3 Phase, Critical impact Security Advisories (RHSAs) \nand selected Urgent Priority Bug Fix Advisories (RHBAs) may be released \nas they become available.\n\nAt this time this bug is not meet this critera and is unlikley to be fixed\nfor these releases.\n\nThe official life cycle policy can be reviewed here:\n\nhttp://redhat.com/rhel/lifecycle\n\nFuture Linux kernel updates for the products in production phase 1 and 2, namely Red Hat Enterprise\nLinux 6, 7 and MRG-2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15274"
},
{
"category": "external",
"summary": "RHBZ#1500391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15274",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15274"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15274",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15274"
}
],
"release_date": "2017-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dereferencing NULL payload with nonzero length"
},
{
"cve": "CVE-2017-17448",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2017-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1525768"
}
],
"notes": [
{
"category": "description",
"text": "The net/netfilter/nfnetlink_cthelper.c function in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations. This allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2, as a code with the flaw is not present or is not built in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-17448"
},
{
"category": "external",
"summary": "RHBZ#1525768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525768"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-17448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17448"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17448",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17448"
}
],
"release_date": "2017-12-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure"
},
{
"cve": "CVE-2017-17449",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2017-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1525762"
}
],
"notes": [
{
"category": "description",
"text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel, through 4.14.4, does not restrict observations of Netlink messages to a single net namespace, when CONFIG_NLMON is enabled. This allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6, as a code with the flaw is not present or is not built in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-17449"
},
{
"category": "external",
"summary": "RHBZ#1525762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17449"
}
],
"release_date": "2017-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity"
},
{
"cve": "CVE-2017-17558",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2017-12-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1525474"
}
],
"notes": [
{
"category": "description",
"text": "The usb_destroy_configuration() function, in \u0027drivers/usb/core/config.c\u0027 in the USB core subsystem, in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources. This allows local users to cause a denial of service, due to out-of-bounds write access, or possibly have unspecified other impact via a crafted USB device. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-17558"
},
{
"category": "external",
"summary": "RHBZ#1525474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525474"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17558"
}
],
"release_date": "2017-12-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow"
},
{
"cve": "CVE-2017-18017",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1531135"
}
],
"notes": [
{
"category": "description",
"text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18017"
},
{
"category": "external",
"summary": "RHBZ#1531135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017"
}
],
"release_date": "2018-01-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c"
},
{
"cve": "CVE-2017-18203",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1550811"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel, before version 4.14.3, is vulnerable to a denial of service in drivers/md/dm.c:dm_get_from_kobject() which can be caused by local users leveraging a race condition with __dm_destroy() during creation and removal of DM devices. Only privileged local users (with CAP_SYS_ADMIN capability) can directly perform the ioctl operations for dm device creation and removal and this would typically be outside the direct control of the unprivileged attacker.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, as the code with the flaw is not present in this product.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18203"
},
{
"category": "external",
"summary": "RHBZ#1550811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550811"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18203",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18203"
}
],
"release_date": "2017-11-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service"
},
{
"acknowledgments": [
{
"names": [
"Eric Biggers"
],
"organization": "Google"
}
],
"cve": "CVE-2017-18270",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2018-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1580979"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel in the way a local user could create keyrings for other users via keyctl commands. This may allow an attacker to set unwanted defaults, a denial of service, or possibly leak keyring information between users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper keyrings creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is Moderate, because the impact is only for userspace programs if using keyctl incorrectly. For root-level processes (usually during boot) keyctl being used securely without possibility of leaking keys between users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18270"
},
{
"category": "external",
"summary": "RHBZ#1580979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580979"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18270",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18270"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18270",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18270"
},
{
"category": "external",
"summary": "http://kernsec.org/pipermail/linux-security-module-archive/2017-September/003318.html",
"url": "http://kernsec.org/pipermail/linux-security-module-archive/2017-September/003318.html"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=237bbd29f7a049d310d907f4b2716a7feef9abf3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=237bbd29f7a049d310d907f4b2716a7feef9abf3"
}
],
"release_date": "2017-09-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: improper keyrings creation"
},
{
"acknowledgments": [
{
"names": [
"Jan H. Sch\u00f6nherr"
],
"organization": "Amazon"
}
],
"cve": "CVE-2017-1000252",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2017-09-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1490781"
}
],
"notes": [
{
"category": "description",
"text": "A reachable assertion failure flaw was found in the Linux kernel built with KVM virtualisation(CONFIG_KVM) support with Virtual Function I/O feature (CONFIG_VFIO) enabled. This failure could occur if a malicious guest device sent a virtual interrupt (guest IRQ) with a larger (\u003e1024) index value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000252"
},
{
"category": "external",
"summary": "RHBZ#1490781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490781"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000252",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000252"
}
],
"release_date": "2017-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ"
},
{
"cve": "CVE-2017-1000407",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2017-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1520328"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel Virtualization Module (CONFIG_KVM) for the Intel processor family (CONFIG_KVM_INTEL) is vulnerable to a DoS issue. It could occur if a guest was to flood the I/O port 0x80 with write requests. A guest user could use this flaw to crash the host kernel resulting in DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: KVM: DoS via write flood to I/O port 0x80",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000407"
},
{
"category": "external",
"summary": "RHBZ#1520328",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520328"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000407"
}
],
"release_date": "2017-12-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: KVM: DoS via write flood to I/O port 0x80"
},
{
"acknowledgments": [
{
"names": [
"Armis Labs"
]
}
],
"cve": "CVE-2017-1000410",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519160"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the processing of incoming L2CAP bluetooth commands. Uninitialized stack variables can be sent to an attacker leaking data in kernel address space.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Stack information leak in the EFS element",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000410"
},
{
"category": "external",
"summary": "RHBZ#1519160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000410"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410"
}
],
"release_date": "2017-12-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Stack information leak in the EFS element"
},
{
"cve": "CVE-2018-1066",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1539599"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s client-side implementation of the cifs protocol. This flaw allows an attacker controlling the server to kernel panic a client which has the CIFS server mounted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Null pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() when empty TargetInfo is returned in NTLMSSP setup negotiation response allowing to crash client\u0027s kernel",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1066"
},
{
"category": "external",
"summary": "RHBZ#1539599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539599"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1066"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1066",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1066"
}
],
"release_date": "2014-10-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Null pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() when empty TargetInfo is returned in NTLMSSP setup negotiation response allowing to crash client\u0027s kernel"
},
{
"cve": "CVE-2018-5750",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1539706"
}
],
"notes": [
{
"category": "description",
"text": "The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel, through 4.14.15, allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2, as KASLR feature is not present or enabled in these products.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5750"
},
{
"category": "external",
"summary": "RHBZ#1539706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539706"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5750",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5750"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5750",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5750"
}
],
"release_date": "2017-12-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass"
},
{
"cve": "CVE-2018-6927",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2018-02-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1544612"
}
],
"notes": [
{
"category": "description",
"text": "The futex_requeue function in kernel/futex.c in the Linux kernel, before 4.14.15, might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impacts by triggering a negative wake or requeue value. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-6927"
},
{
"category": "external",
"summary": "RHBZ#1544612",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544612"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-6927",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6927"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-6927",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-6927"
}
],
"release_date": "2018-02-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact"
},
{
"cve": "CVE-2018-1000004",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1535315"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel versions 4.12, 3.10, 2.6, and possibly earlier, a race condition vulnerability exists in the sound system allowing for a potential deadlock and memory corruption due to use-after-free condition and thus denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sound system can lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of Linux kernel package as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "RHBZ#1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004"
}
],
"release_date": "2018-01-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T15:23:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Client-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Client-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7ComputeNode-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7ComputeNode-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Server-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Server-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.src",
"7Workstation-optional-7.5:kernel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-abi-whitelists-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-bootwrapper-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debug-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-debuginfo-common-ppc64le-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-debuginfo-common-s390x-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-debuginfo-common-x86_64-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-doc-0:3.10.0-862.el7.noarch",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-headers-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-kdump-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-kdump-devel-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:kernel-tools-libs-devel-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:perf-debuginfo-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-0:3.10.0-862.el7.x86_64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.ppc64le",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.s390x",
"7Workstation-optional-7.5:python-perf-debuginfo-0:3.10.0-862.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sound system can lead to denial of service"
}
]
}
RHSA-2018:1129
Vulnerability from csaf_redhat - Published: 2018-04-17 15:40 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important, KVM for Power)\n\nRed Hat would like to thank Google Project Zero for reporting this issue.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article:\nhttps://access.redhat.com/articles/3413511",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1129",
"url": "https://access.redhat.com/errata/RHSA-2018:1129"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3413511",
"url": "https://access.redhat.com/articles/3413511"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1129.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:04:22+00:00",
"generator": {
"date": "2025-11-21T18:04:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1129",
"initial_release_date": "2018-04-17T15:40:42+00:00",
"revision_history": [
{
"date": "2018-04-17T15:40:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-17T15:40:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "perf-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.48.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.48.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.48.1.el7.src",
"product_id": "kernel-0:3.10.0-514.48.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.48.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "perf-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.48.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-514.48.1.el7.s390x",
"product_id": "perf-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-514.48.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.src",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.src",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.48.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T15:40:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1129"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-17T15:40:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1129"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
}
]
}
RHSA-2018:0016
Vulnerability from csaf_redhat - Published: 2018-01-04 05:49 - Updated: 2025-11-21 18:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0016",
"url": "https://access.redhat.com/errata/RHSA-2018:0016"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5753",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0016.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-11-21T18:03:17+00:00",
"generator": {
"date": "2025-11-21T18:03:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:0016",
"initial_release_date": "2018-01-04T05:49:20+00:00",
"revision_history": [
{
"date": "2018-01-04T05:49:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T05:49:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:03:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"product_id": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.11.1.rt56.639.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.11.1.rt56.639.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T05:49:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0016"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5753",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519778"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution bounds-check bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "RHBZ#1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T05:49:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0016"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution bounds-check bypass"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T05:49:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0016"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
}
]
}
RHSA-2018_1252
Vulnerability from csaf_redhat - Published: 2018-04-25 20:37 - Updated: 2024-11-22 07:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important, x86-64)\n\n* kernel: exec/ptrace: get_dumpable() incorrect tests (CVE-2013-2929, Low)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Google Project Zero for reporting CVE-2017-5715.\n\nBug Fix(es):\n\n* The Return Trampolines (Retpolines) mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. With this update, the support for Retpolines has been implemented into the Red Hat Enterprise Linux kernel. (BZ#1539655)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1252",
"url": "https://access.redhat.com/errata/RHSA-2018:1252"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "1028148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1028148"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1252.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T07:34:24+00:00",
"generator": {
"date": "2024-11-22T07:34:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1252",
"initial_release_date": "2018-04-25T20:37:38+00:00",
"revision_history": [
{
"date": "2018-04-25T20:37:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-25T20:37:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T07:34:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product": {
"name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:5.9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-348.39.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.39.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-xen-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-debug-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-devel-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.39.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-348.39.1.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-348.39.1.el5.i386",
"product_id": "kernel-headers-0:2.6.18-348.39.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.39.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.39.1.el5.src",
"product": {
"name": "kernel-0:2.6.18-348.39.1.el5.src",
"product_id": "kernel-0:2.6.18-348.39.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.39.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.39.1.el5.src as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-348.39.1.el5.src",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-348.39.1.el5.noarch as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-348.39.1.el5.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-348.39.1.el5.i386",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-2929",
"discovery_date": "2013-10-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1028148"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the get_dumpable() function return value was interpreted in the ptrace subsystem of the Linux kernel. When \u0027fs.suid_dumpable\u0027 was set to 2, a local, unprivileged local user could use this flaw to bypass intended ptrace restrictions and obtain potentially sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: exec/ptrace: get_dumpable() incorrect tests",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2929"
},
{
"category": "external",
"summary": "RHBZ#1028148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1028148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2929"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2929",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2929"
}
],
"release_date": "2013-11-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-25T20:37:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1252"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: exec/ptrace: get_dumpable() incorrect tests"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-25T20:37:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1252"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
}
]
}
RHSA-2018_1967
Vulnerability from csaf_redhat - Published: 2018-06-26 15:42 - Updated: 2024-11-15 02:10Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, PowerPC)\n\n* This release also includes next iteration of the CVE-2017-5715 mitigation that includes the SMCCC (Secure Monitor Call Calling Convention) 1.1 support. (CVE-2017-5715, ARM)\n\nRed Hat would like to thank Google Project Zero for reporting CVE-2017-5715 and Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.\n\nBug Fix(es):\n\nThese updated kernel-alt packages include numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/3485851",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1967",
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2018-3639",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3485851",
"url": "https://access.redhat.com/articles/3485851"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1967.json"
}
],
"title": "Red Hat Security Advisory: kernel-alt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T02:10:28+00:00",
"generator": {
"date": "2024-11-15T02:10:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1967",
"initial_release_date": "2018-06-26T15:42:16+00:00",
"revision_history": [
{
"date": "2018-06-26T15:42:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-26T15:42:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T02:10:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"product": {
"name": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"product_id": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.14.0-49.8.1.el7a?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"product_id": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-49.8.1.el7a?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "perf-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "perf-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"product": {
"name": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"product_id": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-alt@4.14.0-49.8.1.el7a?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-alt-0:4.14.0-49.8.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src"
},
"product_reference": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch"
},
"product_reference": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-alt-0:4.14.0-49.8.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src"
},
"product_reference": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch"
},
"product_reference": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-26T15:42:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-26T15:42:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHEA-2018:0874
Vulnerability from csaf_redhat - Published: 2018-04-10 09:36 - Updated: 2025-11-21 17:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for linux-firmware is now available for Red Hat Enterprise Linux 7.",
"title": "Topic"
},
{
"category": "general",
"text": "The linux-firmware packages contain all of the firmware files that are required by various devices to operate.\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.\n\nUsers of linux-firmware are advised to upgrade to these updated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2018:0874",
"url": "https://access.redhat.com/errata/RHEA-2018:0874"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/7/html/7.5_release_notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/7/html/7.5_release_notes/index.html"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhea-2018_0874.json"
}
],
"title": "Red Hat Enhancement Advisory: linux-firmware bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T17:24:08+00:00",
"generator": {
"date": "2025-11-21T17:24:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHEA-2018:0874",
"initial_release_date": "2018-04-10T09:36:46+00:00",
"revision_history": [
{
"date": "2018-04-10T09:36:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-10T09:36:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:24:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"product": {
"name": "iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"product_id": "iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl135-firmware@18.168.6.1-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"product": {
"name": "iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"product_id": "iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl100-firmware@39.31.5.1-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"product": {
"name": "iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"product_id": "iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6000-firmware@9.221.4.1-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"product": {
"name": "linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"product_id": "linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/linux-firmware@20180220-62.git6d51311.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"product": {
"name": "iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"product_id": "iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl2000-firmware@18.168.6.1-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"product": {
"name": "iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"product_id": "iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl7260-firmware@22.0.7.0-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"product": {
"name": "iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"product_id": "iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl3160-firmware@22.0.7.0-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"product": {
"name": "iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"product_id": "iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6000g2a-firmware@17.168.5.3-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"product": {
"name": "iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"product_id": "iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl5150-firmware@8.24.2.2-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"product": {
"name": "iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"product_id": "iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl5000-firmware@8.83.5.1_1-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"product": {
"name": "iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"product_id": "iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl4965-firmware@228.61.2.24-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"product": {
"name": "iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"product_id": "iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl7265-firmware@22.0.7.0-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"product": {
"name": "iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"product_id": "iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl2030-firmware@18.168.6.1-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"product": {
"name": "iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"product_id": "iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6000g2b-firmware@17.168.5.2-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"product": {
"name": "iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"product_id": "iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl105-firmware@18.168.6.1-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"product": {
"name": "iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"product_id": "iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl3945-firmware@15.32.2.9-62.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"product": {
"name": "iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"product_id": "iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl1000-firmware@39.31.5.1-62.el7?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"product": {
"name": "iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"product_id": "iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6050-firmware@41.28.5.1-62.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "linux-firmware-0:20180220-62.git6d51311.el7.src",
"product": {
"name": "linux-firmware-0:20180220-62.git6d51311.el7.src",
"product_id": "linux-firmware-0:20180220-62.git6d51311.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/linux-firmware@20180220-62.git6d51311.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl100-firmware-0:39.31.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch"
},
"product_reference": "iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl1000-firmware-1:39.31.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch"
},
"product_reference": "iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl105-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl135-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2000-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2030-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3160-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3945-firmware-0:15.32.2.9-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch"
},
"product_reference": "iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl4965-firmware-0:228.61.2.24-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch"
},
"product_reference": "iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch"
},
"product_reference": "iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5150-firmware-0:8.24.2.2-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch"
},
"product_reference": "iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000-firmware-0:9.221.4.1-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch"
},
"product_reference": "iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch"
},
"product_reference": "iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch"
},
"product_reference": "iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6050-firmware-0:41.28.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch"
},
"product_reference": "iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl7260-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl7265-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20180220-62.git6d51311.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch"
},
"product_reference": "linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20180220-62.git6d51311.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src"
},
"product_reference": "linux-firmware-0:20180220-62.git6d51311.el7.src",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl100-firmware-0:39.31.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch"
},
"product_reference": "iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl1000-firmware-1:39.31.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch"
},
"product_reference": "iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl105-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl135-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2000-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2030-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3160-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3945-firmware-0:15.32.2.9-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch"
},
"product_reference": "iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl4965-firmware-0:228.61.2.24-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch"
},
"product_reference": "iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch"
},
"product_reference": "iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5150-firmware-0:8.24.2.2-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch"
},
"product_reference": "iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000-firmware-0:9.221.4.1-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch"
},
"product_reference": "iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch"
},
"product_reference": "iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch"
},
"product_reference": "iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6050-firmware-0:41.28.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch"
},
"product_reference": "iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl7260-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl7265-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20180220-62.git6d51311.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch"
},
"product_reference": "linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20180220-62.git6d51311.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src"
},
"product_reference": "linux-firmware-0:20180220-62.git6d51311.el7.src",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl100-firmware-0:39.31.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch"
},
"product_reference": "iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl1000-firmware-1:39.31.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch"
},
"product_reference": "iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl105-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl135-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2000-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2030-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3160-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3945-firmware-0:15.32.2.9-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch"
},
"product_reference": "iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl4965-firmware-0:228.61.2.24-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch"
},
"product_reference": "iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch"
},
"product_reference": "iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5150-firmware-0:8.24.2.2-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch"
},
"product_reference": "iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000-firmware-0:9.221.4.1-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch"
},
"product_reference": "iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch"
},
"product_reference": "iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch"
},
"product_reference": "iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6050-firmware-0:41.28.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch"
},
"product_reference": "iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl7260-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl7265-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20180220-62.git6d51311.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch"
},
"product_reference": "linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20180220-62.git6d51311.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src"
},
"product_reference": "linux-firmware-0:20180220-62.git6d51311.el7.src",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl100-firmware-0:39.31.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch"
},
"product_reference": "iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl1000-firmware-1:39.31.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch"
},
"product_reference": "iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl105-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl135-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2000-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2030-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3160-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3945-firmware-0:15.32.2.9-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch"
},
"product_reference": "iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl4965-firmware-0:228.61.2.24-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch"
},
"product_reference": "iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch"
},
"product_reference": "iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5150-firmware-0:8.24.2.2-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch"
},
"product_reference": "iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000-firmware-0:9.221.4.1-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch"
},
"product_reference": "iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch"
},
"product_reference": "iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch"
},
"product_reference": "iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6050-firmware-0:41.28.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch"
},
"product_reference": "iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl7260-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl7265-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20180220-62.git6d51311.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch"
},
"product_reference": "linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20180220-62.git6d51311.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src"
},
"product_reference": "linux-firmware-0:20180220-62.git6d51311.el7.src",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl100-firmware-0:39.31.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch"
},
"product_reference": "iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl1000-firmware-1:39.31.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch"
},
"product_reference": "iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl105-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl135-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2000-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2030-firmware-0:18.168.6.1-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch"
},
"product_reference": "iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3160-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3945-firmware-0:15.32.2.9-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch"
},
"product_reference": "iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl4965-firmware-0:228.61.2.24-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch"
},
"product_reference": "iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch"
},
"product_reference": "iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5150-firmware-0:8.24.2.2-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch"
},
"product_reference": "iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000-firmware-0:9.221.4.1-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch"
},
"product_reference": "iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch"
},
"product_reference": "iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch"
},
"product_reference": "iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6050-firmware-0:41.28.5.1-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch"
},
"product_reference": "iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl7260-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl7265-firmware-0:22.0.7.0-62.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch"
},
"product_reference": "iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20180220-62.git6d51311.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch"
},
"product_reference": "linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20180220-62.git6d51311.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src"
},
"product_reference": "linux-firmware-0:20180220-62.git6d51311.el7.src",
"relates_to_product_reference": "7Workstation-7.5"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7Client-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7Client-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7Client-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7Client-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7Client-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7Client-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7Client-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7Client-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7Client-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7Client-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7Client-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7Client-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7Client-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7Client-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7Client-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7Client-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7Client-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7Client-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src",
"7ComputeNode-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7ComputeNode-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7ComputeNode-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7ComputeNode-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7ComputeNode-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7ComputeNode-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7ComputeNode-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7ComputeNode-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7ComputeNode-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7ComputeNode-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7ComputeNode-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7ComputeNode-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7ComputeNode-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7ComputeNode-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7ComputeNode-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7ComputeNode-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7ComputeNode-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7ComputeNode-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7ComputeNode-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src",
"7Server-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7Server-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7Server-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7Server-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7Server-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7Server-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7Server-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7Server-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7Server-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7Server-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7Server-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7Server-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src",
"7Server-Alt-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7Server-Alt-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7Server-Alt-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-Alt-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-Alt-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-Alt-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-Alt-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-Alt-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7Server-Alt-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7Server-Alt-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7Server-Alt-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7Server-Alt-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7Server-Alt-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7Server-Alt-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7Server-Alt-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7Server-Alt-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-Alt-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-Alt-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7Server-Alt-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src",
"7Workstation-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7Workstation-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7Workstation-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7Workstation-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7Workstation-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7Workstation-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7Workstation-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7Workstation-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7Workstation-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7Workstation-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7Workstation-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7Workstation-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7Workstation-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7Workstation-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7Workstation-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7Workstation-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7Workstation-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7Workstation-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7Workstation-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T09:36:46+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7Client-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7Client-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7Client-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7Client-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7Client-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7Client-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7Client-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7Client-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7Client-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7Client-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7Client-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7Client-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7Client-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7Client-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7Client-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7Client-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7Client-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7Client-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src",
"7ComputeNode-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7ComputeNode-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7ComputeNode-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7ComputeNode-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7ComputeNode-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7ComputeNode-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7ComputeNode-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7ComputeNode-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7ComputeNode-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7ComputeNode-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7ComputeNode-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7ComputeNode-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7ComputeNode-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7ComputeNode-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7ComputeNode-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7ComputeNode-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7ComputeNode-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7ComputeNode-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7ComputeNode-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src",
"7Server-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7Server-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7Server-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7Server-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7Server-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7Server-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7Server-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7Server-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7Server-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7Server-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7Server-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7Server-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src",
"7Server-Alt-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7Server-Alt-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7Server-Alt-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-Alt-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-Alt-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-Alt-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-Alt-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-Alt-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7Server-Alt-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7Server-Alt-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7Server-Alt-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7Server-Alt-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7Server-Alt-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7Server-Alt-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7Server-Alt-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7Server-Alt-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-Alt-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-Alt-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7Server-Alt-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src",
"7Workstation-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7Workstation-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7Workstation-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7Workstation-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7Workstation-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7Workstation-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7Workstation-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7Workstation-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7Workstation-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7Workstation-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7Workstation-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7Workstation-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7Workstation-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7Workstation-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7Workstation-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7Workstation-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7Workstation-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7Workstation-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7Workstation-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHEA-2018:0874"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7Client-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7Client-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7Client-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7Client-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7Client-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7Client-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7Client-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7Client-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7Client-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7Client-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7Client-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7Client-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7Client-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7Client-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7Client-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7Client-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7Client-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7Client-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src",
"7ComputeNode-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7ComputeNode-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7ComputeNode-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7ComputeNode-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7ComputeNode-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7ComputeNode-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7ComputeNode-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7ComputeNode-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7ComputeNode-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7ComputeNode-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7ComputeNode-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7ComputeNode-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7ComputeNode-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7ComputeNode-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7ComputeNode-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7ComputeNode-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7ComputeNode-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7ComputeNode-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7ComputeNode-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src",
"7Server-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7Server-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7Server-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7Server-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7Server-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7Server-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7Server-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7Server-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7Server-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7Server-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7Server-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7Server-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src",
"7Server-Alt-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7Server-Alt-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7Server-Alt-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-Alt-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-Alt-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-Alt-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7Server-Alt-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-Alt-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7Server-Alt-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7Server-Alt-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7Server-Alt-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7Server-Alt-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7Server-Alt-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7Server-Alt-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7Server-Alt-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7Server-Alt-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-Alt-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7Server-Alt-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7Server-Alt-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src",
"7Workstation-7.5:iwl100-firmware-0:39.31.5.1-62.el7.noarch",
"7Workstation-7.5:iwl1000-firmware-1:39.31.5.1-62.el7.noarch",
"7Workstation-7.5:iwl105-firmware-0:18.168.6.1-62.el7.noarch",
"7Workstation-7.5:iwl135-firmware-0:18.168.6.1-62.el7.noarch",
"7Workstation-7.5:iwl2000-firmware-0:18.168.6.1-62.el7.noarch",
"7Workstation-7.5:iwl2030-firmware-0:18.168.6.1-62.el7.noarch",
"7Workstation-7.5:iwl3160-firmware-0:22.0.7.0-62.el7.noarch",
"7Workstation-7.5:iwl3945-firmware-0:15.32.2.9-62.el7.noarch",
"7Workstation-7.5:iwl4965-firmware-0:228.61.2.24-62.el7.noarch",
"7Workstation-7.5:iwl5000-firmware-0:8.83.5.1_1-62.el7.noarch",
"7Workstation-7.5:iwl5150-firmware-0:8.24.2.2-62.el7.noarch",
"7Workstation-7.5:iwl6000-firmware-0:9.221.4.1-62.el7.noarch",
"7Workstation-7.5:iwl6000g2a-firmware-0:17.168.5.3-62.el7.noarch",
"7Workstation-7.5:iwl6000g2b-firmware-0:17.168.5.2-62.el7.noarch",
"7Workstation-7.5:iwl6050-firmware-0:41.28.5.1-62.el7.noarch",
"7Workstation-7.5:iwl7260-firmware-0:22.0.7.0-62.el7.noarch",
"7Workstation-7.5:iwl7265-firmware-0:22.0.7.0-62.el7.noarch",
"7Workstation-7.5:linux-firmware-0:20180220-62.git6d51311.el7.noarch",
"7Workstation-7.5:linux-firmware-0:20180220-62.git6d51311.el7.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
}
]
}
RHSA-2018:0017
Vulnerability from csaf_redhat - Published: 2018-01-04 05:49 - Updated: 2025-11-21 18:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0017",
"url": "https://access.redhat.com/errata/RHSA-2018:0017"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5753",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0017.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:03:17+00:00",
"generator": {
"date": "2025-11-21T18:03:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:0017",
"initial_release_date": "2018-01-04T05:49:35+00:00",
"revision_history": [
{
"date": "2018-01-04T05:49:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T05:49:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:03:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "python-perf-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "perf-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.64.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.64.4.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.64.4.el6.src",
"product": {
"name": "kernel-0:2.6.32-504.64.4.el6.src",
"product_id": "kernel-0:2.6.32-504.64.4.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.64.4.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.64.4.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.64.4.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.64.4.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.src",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T05:49:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0017"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5753",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519778"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution bounds-check bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "RHBZ#1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T05:49:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0017"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution bounds-check bypass"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T05:49:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0017"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
}
]
}
RHBA-2018:0831
Vulnerability from csaf_redhat - Published: 2018-04-10 09:00 - Updated: 2025-11-21 17:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New qemu-kvm-ma packages are now available for Red Hat Enterprise Linux 7.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power LE, and 64-bit ARM architectures.\n\nThis update adds the qemu-kvm-ma packages to Red Hat Enterprise Linux 7.\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2018:0831",
"url": "https://access.redhat.com/errata/RHBA-2018:0831"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/7/html/7.5_release_notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/7/html/7.5_release_notes/index.html"
},
{
"category": "external",
"summary": "1460957",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460957"
},
{
"category": "external",
"summary": "1485399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1485399"
},
{
"category": "external",
"summary": "1498662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498662"
},
{
"category": "external",
"summary": "1501230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501230"
},
{
"category": "external",
"summary": "1511990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511990"
},
{
"category": "external",
"summary": "1514352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1514352"
},
{
"category": "external",
"summary": "1535952",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535952"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhba-2018_0831.json"
}
],
"title": "Red Hat Bug Fix Advisory: new packages: qemu-kvm-ma",
"tracking": {
"current_release_date": "2025-11-21T17:21:38+00:00",
"generator": {
"date": "2025-11-21T17:21:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHBA-2018:0831",
"initial_release_date": "2018-04-10T09:00:18+00:00",
"revision_history": [
{
"date": "2018-04-10T09:00:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-10T09:00:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:21:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-ma-10:2.10.0-21.el7.src",
"product": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.src",
"product_id": "qemu-kvm-ma-10:2.10.0-21.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-ma@2.10.0-21.el7?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"product": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"product_id": "qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-ma@2.10.0-21.el7?arch=s390x\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-ma-10:2.10.0-21.el7.s390x",
"product": {
"name": "qemu-img-ma-10:2.10.0-21.el7.s390x",
"product_id": "qemu-img-ma-10:2.10.0-21.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-ma@2.10.0-21.el7?arch=s390x\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"product": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"product_id": "qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-ma@2.10.0-21.el7?arch=s390x\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"product": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"product_id": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-ma-debuginfo@2.10.0-21.el7?arch=s390x\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x",
"product": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x",
"product_id": "qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-ma@2.10.0-21.el7?arch=s390x\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"product": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"product_id": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-ma@2.10.0-21.el7?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"product": {
"name": "qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"product_id": "qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-ma@2.10.0-21.el7?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"product": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"product_id": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-ma@2.10.0-21.el7?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"product": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"product_id": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-ma-debuginfo@2.10.0-21.el7?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"product": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"product_id": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-ma@2.10.0-21.el7?arch=ppc64le\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-ma-10:2.10.0-21.el7.ppc64",
"product": {
"name": "qemu-img-ma-10:2.10.0-21.el7.ppc64",
"product_id": "qemu-img-ma-10:2.10.0-21.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-ma@2.10.0-21.el7?arch=ppc64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"product": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"product_id": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-ma-debuginfo@2.10.0-21.el7?arch=ppc64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"product": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"product_id": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-ma@2.10.0-21.el7?arch=ppc64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"product": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"product_id": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-ma@2.10.0-21.el7?arch=ppc64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"product": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"product_id": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-ma@2.10.0-21.el7?arch=ppc64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"product": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"product_id": "qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-ma@2.10.0-21.el7?arch=aarch64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-ma-10:2.10.0-21.el7.aarch64",
"product": {
"name": "qemu-img-ma-10:2.10.0-21.el7.aarch64",
"product_id": "qemu-img-ma-10:2.10.0-21.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-ma@2.10.0-21.el7?arch=aarch64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"product": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"product_id": "qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-ma@2.10.0-21.el7?arch=aarch64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"product": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"product_id": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-ma-debuginfo@2.10.0-21.el7?arch=aarch64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"product": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"product_id": "qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-ma@2.10.0-21.el7?arch=aarch64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-ma-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-img-ma-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-ma-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-img-ma-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-ma-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-ma-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-img-ma-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.src"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.src",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-ma-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-img-ma-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-ma-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-img-ma-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-ma-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-ma-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-img-ma-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.src"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.src",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-ma-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-img-ma-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-ma-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-img-ma-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-ma-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-ma-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-img-ma-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-ma-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-10:2.10.0-21.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.src"
},
"product_reference": "qemu-kvm-ma-10:2.10.0-21.el7.src",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64"
},
"product_reference": "qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64"
},
"product_reference": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le"
},
"product_reference": "qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x"
},
"product_reference": "qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.s390x",
"7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.src",
"7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.src",
"7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.src",
"7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T09:00:18+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.s390x",
"7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.src",
"7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.src",
"7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.src",
"7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2018:0831"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-img-ma-10:2.10.0-21.el7.s390x",
"7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"7Server-7.5:qemu-kvm-ma-10:2.10.0-21.el7.src",
"7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"7Server-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-img-ma-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-kvm-ma-10:2.10.0-21.el7.src",
"7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"7Server-Alt-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-img-ma-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-kvm-common-ma-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-kvm-ma-10:2.10.0-21.el7.src",
"7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-kvm-ma-debuginfo-10:2.10.0-21.el7.s390x",
"7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.aarch64",
"7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64",
"7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.ppc64le",
"7Server-optional-7.5:qemu-kvm-tools-ma-10:2.10.0-21.el7.s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
}
]
}
RHSA-2018:0020
Vulnerability from csaf_redhat - Published: 2018-01-04 15:26 - Updated: 2025-11-21 18:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0020",
"url": "https://access.redhat.com/errata/RHSA-2018:0020"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5753",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0020.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:03:18+00:00",
"generator": {
"date": "2025-11-21T18:03:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:0020",
"initial_release_date": "2018-01-04T15:26:01+00:00",
"revision_history": [
{
"date": "2018-01-04T15:26:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T15:26:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:03:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "perf-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-220.76.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-220.76.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-220.76.2.el6.src",
"product_id": "kernel-0:2.6.32-220.76.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-220.76.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-220.76.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-220.76.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.76.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-220.76.2.el6.src",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-220.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.76.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-220.76.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-220.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T15:26:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0020"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5753",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519778"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution bounds-check bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "RHBZ#1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T15:26:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0020"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution bounds-check bypass"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T15:26:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0020"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
}
]
}
RHSA-2018:1346
Vulnerability from csaf_redhat - Published: 2018-05-08 20:58 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: cpu: speculative execution permission faults handling (CVE-2017-5754, x86 32-bit)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Google Project Zero for reporting CVE-2017-5754 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.\n\nBug Fix(es):\n\n* The kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Retpolines. The Retpolines mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. (BZ#1554253)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1346",
"url": "https://access.redhat.com/errata/RHSA-2018:1346"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/pop_ss",
"url": "https://access.redhat.com/security/vulnerabilities/pop_ss"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "1567074",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1346.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:04:37+00:00",
"generator": {
"date": "2025-11-21T18:04:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1346",
"initial_release_date": "2018-05-08T20:58:30+00:00",
"revision_history": [
{
"date": "2018-05-08T20:58:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-10T18:26:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "perf-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.55.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.55.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-573.55.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-573.55.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-573.55.2.el6.i686",
"product_id": "python-perf-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-debug-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-devel-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-headers-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "perf-0:2.6.32-573.55.2.el6.i686",
"product_id": "perf-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.55.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.2.el6.i686",
"product": {
"name": "kernel-0:2.6.32-573.55.2.el6.i686",
"product_id": "kernel-0:2.6.32-573.55.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-573.55.2.el6.src",
"product_id": "kernel-0:2.6.32-573.55.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.55.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.55.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.55.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-573.55.2.el6.s390x",
"product_id": "python-perf-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "perf-0:2.6.32-573.55.2.el6.s390x",
"product_id": "perf-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.55.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.55.2.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "python-perf-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "perf-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.55.2.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.src",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.src",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T20:58:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1346"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T20:58:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1346"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
},
{
"acknowledgments": [
{
"names": [
"Andy Lutomirski"
]
},
{
"names": [
"Nick Peterson"
],
"organization": "Everdox Tech LLC"
}
],
"cve": "CVE-2018-8897",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2018-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1567074"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: error in exception handling leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8897"
},
{
"category": "external",
"summary": "RHBZ#1567074",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/pop_ss",
"url": "https://access.redhat.com/security/vulnerabilities/pop_ss"
}
],
"release_date": "2018-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-08T20:58:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1346"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: error in exception handling leads to DoS"
}
]
}
RHSA-2018:1252
Vulnerability from csaf_redhat - Published: 2018-04-25 20:37 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important, x86-64)\n\n* kernel: exec/ptrace: get_dumpable() incorrect tests (CVE-2013-2929, Low)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Google Project Zero for reporting CVE-2017-5715.\n\nBug Fix(es):\n\n* The Return Trampolines (Retpolines) mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. With this update, the support for Retpolines has been implemented into the Red Hat Enterprise Linux kernel. (BZ#1539655)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1252",
"url": "https://access.redhat.com/errata/RHSA-2018:1252"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "1028148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1028148"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1252.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:04:31+00:00",
"generator": {
"date": "2025-11-21T18:04:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1252",
"initial_release_date": "2018-04-25T20:37:38+00:00",
"revision_history": [
{
"date": "2018-04-25T20:37:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-25T20:37:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product": {
"name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:5.9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-348.39.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.39.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.39.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-xen-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-debug-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.39.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-348.39.1.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-348.39.1.el5.i686",
"product_id": "kernel-devel-0:2.6.18-348.39.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.39.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-348.39.1.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-348.39.1.el5.i386",
"product_id": "kernel-headers-0:2.6.18-348.39.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.39.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.39.1.el5.src",
"product": {
"name": "kernel-0:2.6.18-348.39.1.el5.src",
"product_id": "kernel-0:2.6.18-348.39.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.39.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.39.1.el5.src as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-348.39.1.el5.src",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-348.39.1.el5.noarch as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-348.39.1.el5.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-348.39.1.el5.i386",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-348.39.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-2929",
"discovery_date": "2013-10-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1028148"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the get_dumpable() function return value was interpreted in the ptrace subsystem of the Linux kernel. When \u0027fs.suid_dumpable\u0027 was set to 2, a local, unprivileged local user could use this flaw to bypass intended ptrace restrictions and obtain potentially sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: exec/ptrace: get_dumpable() incorrect tests",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2929"
},
{
"category": "external",
"summary": "RHBZ#1028148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1028148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2929"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2929",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2929"
}
],
"release_date": "2013-11-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-25T20:37:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1252"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: exec/ptrace: get_dumpable() incorrect tests"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-25T20:37:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1252"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
}
]
}
RHEA-2018:0704
Vulnerability from csaf_redhat - Published: 2018-04-10 11:57 - Updated: 2025-11-21 17:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 7.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.\n\nUsers of libvirt are advised to upgrade to these updated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2018:0704",
"url": "https://access.redhat.com/errata/RHEA-2018:0704"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/7/html/7.5_release_notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/7/html/7.5_release_notes/index.html"
},
{
"category": "external",
"summary": "815702",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=815702"
},
{
"category": "external",
"summary": "838070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=838070"
},
{
"category": "external",
"summary": "1075520",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1075520"
},
{
"category": "external",
"summary": "1225339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225339"
},
{
"category": "external",
"summary": "1233129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233129"
},
{
"category": "external",
"summary": "1242801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242801"
},
{
"category": "external",
"summary": "1254971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1254971"
},
{
"category": "external",
"summary": "1282859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1282859"
},
{
"category": "external",
"summary": "1289368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289368"
},
{
"category": "external",
"summary": "1308743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1308743"
},
{
"category": "external",
"summary": "1316370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316370"
},
{
"category": "external",
"summary": "1325066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325066"
},
{
"category": "external",
"summary": "1335534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335534"
},
{
"category": "external",
"summary": "1343919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343919"
},
{
"category": "external",
"summary": "1352529",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352529"
},
{
"category": "external",
"summary": "1366446",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1366446"
},
{
"category": "external",
"summary": "1368753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368753"
},
{
"category": "external",
"summary": "1371892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371892"
},
{
"category": "external",
"summary": "1373783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373783"
},
{
"category": "external",
"summary": "1373859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373859"
},
{
"category": "external",
"summary": "1378242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378242"
},
{
"category": "external",
"summary": "1379218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379218"
},
{
"category": "external",
"summary": "1379603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379603"
},
{
"category": "external",
"summary": "1395248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395248"
},
{
"category": "external",
"summary": "1401173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401173"
},
{
"category": "external",
"summary": "1419395",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419395"
},
{
"category": "external",
"summary": "1427049",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427049"
},
{
"category": "external",
"summary": "1430988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1430988"
},
{
"category": "external",
"summary": "1431112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1431112"
},
{
"category": "external",
"summary": "1434451",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434451"
},
{
"category": "external",
"summary": "1436042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436042"
},
{
"category": "external",
"summary": "1436065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436065"
},
{
"category": "external",
"summary": "1436574",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436574"
},
{
"category": "external",
"summary": "1437797",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437797"
},
{
"category": "external",
"summary": "1439991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1439991"
},
{
"category": "external",
"summary": "1442947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1442947"
},
{
"category": "external",
"summary": "1443434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443434"
},
{
"category": "external",
"summary": "1445325",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1445325"
},
{
"category": "external",
"summary": "1445598",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1445598"
},
{
"category": "external",
"summary": "1445600",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1445600"
},
{
"category": "external",
"summary": "1447618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1447618"
},
{
"category": "external",
"summary": "1448268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1448268"
},
{
"category": "external",
"summary": "1448766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1448766"
},
{
"category": "external",
"summary": "1449265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1449265"
},
{
"category": "external",
"summary": "1449712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1449712"
},
{
"category": "external",
"summary": "1449715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1449715"
},
{
"category": "external",
"summary": "1450317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450317"
},
{
"category": "external",
"summary": "1451557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1451557"
},
{
"category": "external",
"summary": "1451983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1451983"
},
{
"category": "external",
"summary": "1452053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452053"
},
{
"category": "external",
"summary": "1452441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452441"
},
{
"category": "external",
"summary": "1453194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1453194"
},
{
"category": "external",
"summary": "1454671",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1454671"
},
{
"category": "external",
"summary": "1455023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1455023"
},
{
"category": "external",
"summary": "1455819",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1455819"
},
{
"category": "external",
"summary": "1455825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1455825"
},
{
"category": "external",
"summary": "1457610",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1457610"
},
{
"category": "external",
"summary": "1458146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458146"
},
{
"category": "external",
"summary": "1458630",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458630"
},
{
"category": "external",
"summary": "1458638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458638"
},
{
"category": "external",
"summary": "1458708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458708"
},
{
"category": "external",
"summary": "1459091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459091"
},
{
"category": "external",
"summary": "1459592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459592"
},
{
"category": "external",
"summary": "1459785",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459785"
},
{
"category": "external",
"summary": "1460086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460086"
},
{
"category": "external",
"summary": "1460602",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460602"
},
{
"category": "external",
"summary": "1460623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460623"
},
{
"category": "external",
"summary": "1460677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460677"
},
{
"category": "external",
"summary": "1460962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460962"
},
{
"category": "external",
"summary": "1461214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461214"
},
{
"category": "external",
"summary": "1461270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461270"
},
{
"category": "external",
"summary": "1461301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461301"
},
{
"category": "external",
"summary": "1462060",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1462060"
},
{
"category": "external",
"summary": "1462092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1462092"
},
{
"category": "external",
"summary": "1463168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463168"
},
{
"category": "external",
"summary": "1463285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463285"
},
{
"category": "external",
"summary": "1463957",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463957"
},
{
"category": "external",
"summary": "1464300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1464300"
},
{
"category": "external",
"summary": "1464313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1464313"
},
{
"category": "external",
"summary": "1464821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1464821"
},
{
"category": "external",
"summary": "1464832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1464832"
},
{
"category": "external",
"summary": "1464975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1464975"
},
{
"category": "external",
"summary": "1465833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1465833"
},
{
"category": "external",
"summary": "1467245",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1467245"
},
{
"category": "external",
"summary": "1467826",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1467826"
},
{
"category": "external",
"summary": "1471225",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471225"
},
{
"category": "external",
"summary": "1472263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472263"
},
{
"category": "external",
"summary": "1472277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472277"
},
{
"category": "external",
"summary": "1475227",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475227"
},
{
"category": "external",
"summary": "1475250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475250"
},
{
"category": "external",
"summary": "1476775",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1476775"
},
{
"category": "external",
"summary": "1477880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477880"
},
{
"category": "external",
"summary": "1481252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481252"
},
{
"category": "external",
"summary": "1481309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481309"
},
{
"category": "external",
"summary": "1484230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484230"
},
{
"category": "external",
"summary": "1484234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484234"
},
{
"category": "external",
"summary": "1484341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484341"
},
{
"category": "external",
"summary": "1485022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1485022"
},
{
"category": "external",
"summary": "1487499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487499"
},
{
"category": "external",
"summary": "1490279",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490279"
},
{
"category": "external",
"summary": "1490826",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490826"
},
{
"category": "external",
"summary": "1491217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491217"
},
{
"category": "external",
"summary": "1494327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494327"
},
{
"category": "external",
"summary": "1494400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494400"
},
{
"category": "external",
"summary": "1495171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495171"
},
{
"category": "external",
"summary": "1495511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495511"
},
{
"category": "external",
"summary": "1497396",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497396"
},
{
"category": "external",
"summary": "1497410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497410"
},
{
"category": "external",
"summary": "1501715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501715"
},
{
"category": "external",
"summary": "1506494",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506494"
},
{
"category": "external",
"summary": "1509110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509110"
},
{
"category": "external",
"summary": "1509151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509151"
},
{
"category": "external",
"summary": "1509866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509866"
},
{
"category": "external",
"summary": "1510323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1510323"
},
{
"category": "external",
"summary": "1510781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1510781"
},
{
"category": "external",
"summary": "1511407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511407"
},
{
"category": "external",
"summary": "1511421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511421"
},
{
"category": "external",
"summary": "1511480",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511480"
},
{
"category": "external",
"summary": "1512929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512929"
},
{
"category": "external",
"summary": "1512934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512934"
},
{
"category": "external",
"summary": "1514930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1514930"
},
{
"category": "external",
"summary": "1517372",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517372"
},
{
"category": "external",
"summary": "1518148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518148"
},
{
"category": "external",
"summary": "1519745",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519745"
},
{
"category": "external",
"summary": "1519759",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519759"
},
{
"category": "external",
"summary": "1521202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1521202"
},
{
"category": "external",
"summary": "1522682",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522682"
},
{
"category": "external",
"summary": "1522879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522879"
},
{
"category": "external",
"summary": "1523036",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523036"
},
{
"category": "external",
"summary": "1523070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523070"
},
{
"category": "external",
"summary": "1523261",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523261"
},
{
"category": "external",
"summary": "1524837",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524837"
},
{
"category": "external",
"summary": "1525182",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525182"
},
{
"category": "external",
"summary": "1528572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528572"
},
{
"category": "external",
"summary": "1529338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1529338"
},
{
"category": "external",
"summary": "1529663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1529663"
},
{
"category": "external",
"summary": "1532980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532980"
},
{
"category": "external",
"summary": "1533125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533125"
},
{
"category": "external",
"summary": "1536351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536351"
},
{
"category": "external",
"summary": "1536461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536461"
},
{
"category": "external",
"summary": "1540022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540022"
},
{
"category": "external",
"summary": "1540290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540290"
},
{
"category": "external",
"summary": "1540780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540780"
},
{
"category": "external",
"summary": "1540817",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540817"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhea-2018_0704.json"
}
],
"title": "Red Hat Enhancement Advisory: libvirt bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T17:24:07+00:00",
"generator": {
"date": "2025-11-21T17:24:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHEA-2018:0704",
"initial_release_date": "2018-04-10T11:57:35+00:00",
"revision_history": [
{
"date": "2018-04-10T11:57:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-10T11:57:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:24:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-nss-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-admin-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-libs-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-devel-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-gluster@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-client-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-docs-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-rbd@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7.i686",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.i686",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7.i686",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7.i686",
"product_id": "libvirt-nss-0:3.9.0-14.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7.i686",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7.i686",
"product_id": "libvirt-libs-0:3.9.0-14.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7.i686",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7.i686",
"product_id": "libvirt-devel-0:3.9.0-14.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7.i686",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7.i686",
"product_id": "libvirt-client-0:3.9.0-14.el7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7.src",
"product": {
"name": "libvirt-0:3.9.0-14.el7.src",
"product_id": "libvirt-0:3.9.0-14.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-libs-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-devel-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-client-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-docs-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-nss-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7.s390x",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7.s390x",
"product_id": "libvirt-admin-0:3.9.0-14.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7.s390",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390",
"product_id": "libvirt-libs-0:3.9.0-14.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7.s390",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390",
"product_id": "libvirt-devel-0:3.9.0-14.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7.s390",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7.s390",
"product_id": "libvirt-client-0:3.9.0-14.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7.s390",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390",
"product_id": "libvirt-nss-0:3.9.0-14.el7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-libs-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-devel-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-client-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-docs-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-nss-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64",
"product_id": "libvirt-admin-0:3.9.0-14.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7.ppc",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc",
"product_id": "libvirt-libs-0:3.9.0-14.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7.ppc",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc",
"product_id": "libvirt-devel-0:3.9.0-14.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7.ppc",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc",
"product_id": "libvirt-client-0:3.9.0-14.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7.ppc",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc",
"product_id": "libvirt-nss-0:3.9.0-14.el7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-libs-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-devel-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-client-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-docs-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-nss-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64le",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64le",
"product_id": "libvirt-admin-0:3.9.0-14.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-libs-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-admin-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-devel-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-nss-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-client-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-docs-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-0:3.9.0-14.el7.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7.src",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-admin-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-client-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-client-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-client-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-client-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-client-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-client-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-client-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-devel-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-devel-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-devel-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-devel-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-docs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-libs-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-libs-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-libs-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-libs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-nss-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-nss-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-nss-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-nss-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-0:3.9.0-14.el7.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7.src",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7.src",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-0:3.9.0-14.el7.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7.src",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-admin-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-client-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-client-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-client-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-client-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-client-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-client-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-client-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-devel-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-devel-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-devel-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-devel-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-docs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-libs-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-libs-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-libs-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-libs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-nss-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-nss-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-nss-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-nss-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7.src",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7.src",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-0:3.9.0-14.el7.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7.src",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-0:3.9.0-14.el7.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7.src",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.i686",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-0:3.9.0-14.el7.src",
"7Client-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.src",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-0:3.9.0-14.el7.src",
"7Server-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.src",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.src",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T11:57:35+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-0:3.9.0-14.el7.src",
"7Client-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.src",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-0:3.9.0-14.el7.src",
"7Server-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.src",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.src",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2018:0704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-0:3.9.0-14.el7.src",
"7Client-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Client-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7Client-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Client-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.src",
"7ComputeNode-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7ComputeNode-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7ComputeNode-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7ComputeNode-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-0:3.9.0-14.el7.src",
"7Server-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Server-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.src",
"7Server-Alt-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Server-Alt-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7Server-Alt-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Server-Alt-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7Server-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Server-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.src",
"7Workstation-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Workstation-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.src",
"7Workstation-optional-7.5:libvirt-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-admin-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-client-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-config-network-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-interface-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-lxc-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-network-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-qemu-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-secret-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-kvm-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-daemon-lxc-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-debuginfo-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-devel-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-docs-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-libs-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-lock-sanlock-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-login-shell-0:3.9.0-14.el7.x86_64",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.aarch64",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.i686",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.ppc64le",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.s390x",
"7Workstation-optional-7.5:libvirt-nss-0:3.9.0-14.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
}
]
}
RHSA-2018_0021
Vulnerability from csaf_redhat - Published: 2018-01-04 16:50 - Updated: 2024-11-14 23:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0021",
"url": "https://access.redhat.com/errata/RHSA-2018:0021"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5753",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0021.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2024-11-14T23:40:27+00:00",
"generator": {
"date": "2024-11-14T23:40:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:0021",
"initial_release_date": "2018-01-04T16:50:09+00:00",
"revision_history": [
{
"date": "2018-01-04T16:50:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T16:50:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:40:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_id": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"product": {
"name": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"product_id": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.11.1.rt56.606.el6rt?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"product": {
"name": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"product_id": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.11.1.rt56.606.el6rt?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"product": {
"name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"product_id": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.11.1.rt56.606.el6rt?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src"
},
"product_reference": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch"
},
"product_reference": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch"
},
"product_reference": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T16:50:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0021"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5753",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519778"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution bounds-check bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "RHBZ#1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T16:50:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0021"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution bounds-check bypass"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T16:50:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0021"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
}
]
}
RHSA-2018_0016
Vulnerability from csaf_redhat - Published: 2018-01-04 05:49 - Updated: 2024-11-14 23:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0016",
"url": "https://access.redhat.com/errata/RHSA-2018:0016"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5753",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0016.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2024-11-14T23:40:33+00:00",
"generator": {
"date": "2024-11-14T23:40:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:0016",
"initial_release_date": "2018-01-04T05:49:20+00:00",
"revision_history": [
{
"date": "2018-01-04T05:49:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T05:49:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:40:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-693.11.1.rt56.639.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"product_id": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.11.1.rt56.639.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.11.1.rt56.639.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.4.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T05:49:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0016"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5753",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519778"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution bounds-check bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "RHBZ#1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T05:49:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0016"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution bounds-check bypass"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T05:49:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0016"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src",
"7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch",
"7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64",
"7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
}
]
}
RHSA-2018_0020
Vulnerability from csaf_redhat - Published: 2018-01-04 15:26 - Updated: 2024-11-14 23:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0020",
"url": "https://access.redhat.com/errata/RHSA-2018:0020"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5753",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0020.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-14T23:40:13+00:00",
"generator": {
"date": "2024-11-14T23:40:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:0020",
"initial_release_date": "2018-01-04T15:26:01+00:00",
"revision_history": [
{
"date": "2018-01-04T15:26:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T15:26:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:40:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "perf-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-220.76.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-220.76.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-220.76.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-220.76.2.el6.src",
"product_id": "kernel-0:2.6.32-220.76.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-220.76.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-220.76.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-220.76.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.76.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-220.76.2.el6.src",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-220.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.76.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-220.76.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-220.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T15:26:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0020"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5753",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519778"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution bounds-check bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "RHBZ#1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T15:26:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0020"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution bounds-check bypass"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T15:26:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0020"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
}
]
}
RHSA-2018:0027
Vulnerability from csaf_redhat - Published: 2018-01-04 17:08 - Updated: 2025-11-21 18:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm package provides the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715)\n\nNote: This is the qemu-kvm side of the CVE-2017-5715 mitigation.\n\nRed Hat would like to thank Google Project Zero for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0027",
"url": "https://access.redhat.com/errata/RHSA-2018:0027"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0027.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:03:19+00:00",
"generator": {
"date": "2025-11-21T18:03:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:0027",
"initial_release_date": "2018-01-04T17:08:49+00:00",
"revision_history": [
{
"date": "2018-01-04T17:08:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T17:08:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:03:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64",
"product": {
"name": "qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64",
"product_id": "qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@1.5.3-126.el7_3.13?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64",
"product": {
"name": "qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64",
"product_id": "qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common@1.5.3-126.el7_3.13?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-126.el7_3.13?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-126.el7_3.13.x86_64",
"product": {
"name": "qemu-img-10:1.5.3-126.el7_3.13.x86_64",
"product_id": "qemu-img-10:1.5.3-126.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-126.el7_3.13?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-126.el7_3.13.x86_64",
"product": {
"name": "qemu-kvm-10:1.5.3-126.el7_3.13.x86_64",
"product_id": "qemu-kvm-10:1.5.3-126.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-126.el7_3.13?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-126.el7_3.13.src",
"product": {
"name": "qemu-kvm-10:1.5.3-126.el7_3.13.src",
"product_id": "qemu-kvm-10:1.5.3-126.el7_3.13.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-126.el7_3.13?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-126.el7_3.13?arch=ppc64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-126.el7_3.13.ppc64",
"product": {
"name": "qemu-img-10:1.5.3-126.el7_3.13.ppc64",
"product_id": "qemu-img-10:1.5.3-126.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-126.el7_3.13?arch=ppc64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-126.el7_3.13?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-126.el7_3.13.ppc64le",
"product": {
"name": "qemu-img-10:1.5.3-126.el7_3.13.ppc64le",
"product_id": "qemu-img-10:1.5.3-126.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-126.el7_3.13?arch=ppc64le\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-126.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64"
},
"product_reference": "qemu-img-10:1.5.3-126.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-126.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64le"
},
"product_reference": "qemu-img-10:1.5.3-126.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-126.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-126.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-126.el7_3.13.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.src"
},
"product_reference": "qemu-kvm-10:1.5.3-126.el7_3.13.src",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-126.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-126.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-126.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64"
},
"product_reference": "qemu-img-10:1.5.3-126.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-126.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64le"
},
"product_reference": "qemu-img-10:1.5.3-126.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-126.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-126.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-126.el7_3.13.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.src"
},
"product_reference": "qemu-kvm-10:1.5.3-126.el7_3.13.src",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-126.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-126.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.src",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64le",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.src",
"7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T17:08:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.src",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64le",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.src",
"7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0027"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.src",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.ppc64le",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.src",
"7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.ppc64le",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.13.x86_64",
"7Server-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
}
]
}
RHSA-2018:1196
Vulnerability from csaf_redhat - Published: 2018-04-23 12:59 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 4th September 2019]\nThe Problem Description text has been updated to fix a list of architectures addressed by the CVE-2017-5715 mitigation. No changes have been made to the packages.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important, x86 and x86-64)\n\nRed Hat would like to thank Google Project Zero for reporting this issue.\n\nBug Fix(es):\n\n* The Return Trampolines (Retpolines) mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. With this update, the support for Retpolines has been implemented into the Red Hat Enterprise Linux kernel. (BZ#1535650)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1196",
"url": "https://access.redhat.com/errata/RHSA-2018:1196"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1196.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:04:25+00:00",
"generator": {
"date": "2025-11-21T18:04:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1196",
"initial_release_date": "2018-04-23T12:59:43+00:00",
"revision_history": [
{
"date": "2018-04-23T12:59:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-09-05T07:46:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 5 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-430.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-430.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-430.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-430.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-430.el5.i686",
"product_id": "kernel-xen-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-430.el5.i686",
"product_id": "kernel-devel-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-430.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-430.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-430.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-0:2.6.18-430.el5.i686",
"product_id": "kernel-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-430.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-430.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-430.el5.i686",
"product_id": "kernel-debug-0:2.6.18-430.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-430.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-430.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-430.el5.i386",
"product_id": "kernel-headers-0:2.6.18-430.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-430.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-430.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-430.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-430.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-430.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-430.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-430.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-430.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-430.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-430.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-430.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-430.el5.s390x",
"product_id": "kernel-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-430.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-430.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-430.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-430.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-430.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-430.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-430.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-430.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-430.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-430.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-430.el5.src",
"product": {
"name": "kernel-0:2.6.18-430.el5.src",
"product_id": "kernel-0:2.6.18-430.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-430.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-430.el5.src as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-0:2.6.18-430.el5.src"
},
"product_reference": "kernel-0:2.6.18-430.el5.src",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-PAE-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-PAE-devel-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-devel-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-devel-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-devel-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-430.el5.noarch as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-doc-0:2.6.18-430.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-430.el5.noarch",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-430.el5.i386 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-headers-0:2.6.18-430.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-430.el5.i386",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-headers-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-headers-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-kdump-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-430.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-kdump-devel-0:2.6.18-430.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-430.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-430.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-430.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-430.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-430.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-ELS:kernel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-0:2.6.18-430.el5.src",
"5Server-ELS:kernel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-PAE-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-PAE-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-doc-0:2.6.18-430.el5.noarch",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.i386",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-kdump-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-kdump-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-xen-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-23T12:59:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Server-ELS:kernel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-0:2.6.18-430.el5.src",
"5Server-ELS:kernel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-PAE-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-PAE-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-doc-0:2.6.18-430.el5.noarch",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.i386",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-kdump-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-kdump-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-xen-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1196"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"5Server-ELS:kernel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-0:2.6.18-430.el5.src",
"5Server-ELS:kernel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-PAE-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-PAE-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debug-devel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-devel-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-doc-0:2.6.18-430.el5.noarch",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.i386",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-headers-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-kdump-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-kdump-devel-0:2.6.18-430.el5.s390x",
"5Server-ELS:kernel-xen-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-430.el5.x86_64",
"5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.i686",
"5Server-ELS:kernel-xen-devel-0:2.6.18-430.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
}
]
}
RHSA-2018:0028
Vulnerability from csaf_redhat - Published: 2018-01-04 16:52 - Updated: 2025-11-21 18:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for RHEV 3.X Hypervisor and Agents for Red Hat Enterprise Linux 7 ELS.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715)\n\nNote: This is the qemu-kvm-rhev side of the CVE-2017-5715 mitigation.\n\nRed Hat would like to thank Google Project Zero for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0028",
"url": "https://access.redhat.com/errata/RHSA-2018:0028"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0028.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security update",
"tracking": {
"current_release_date": "2025-11-21T18:03:20+00:00",
"generator": {
"date": "2025-11-21T18:03:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:0028",
"initial_release_date": "2018-01-04T16:52:32+00:00",
"revision_history": [
{
"date": "2018-01-04T16:52:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T16:52:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:03:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEV-H and VDSM for 7 Hosts ELS",
"product": {
"name": "RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.15.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.15.x86_64",
"product_id": "qemu-kvm-rhev-10:2.6.0-28.el7_3.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.6.0-28.el7_3.15?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.15.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.15.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.6.0-28.el7_3.15?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.6.0-28.el7_3.15.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.6.0-28.el7_3.15.x86_64",
"product_id": "qemu-img-rhev-10:2.6.0-28.el7_3.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.6.0-28.el7_3.15?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.15.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.15.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.6.0-28.el7_3.15?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.15.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.15.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.6.0-28.el7_3.15?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.15.src",
"product": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.15.src",
"product_id": "qemu-kvm-rhev-10:2.6.0-28.el7_3.15.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.6.0-28.el7_3.15?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.6.0-28.el7_3.15.x86_64 as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:qemu-img-rhev-10:2.6.0-28.el7_3.15.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.6.0-28.el7_3.15.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.15.x86_64 as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.15.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.15.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.15.src as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.15.src"
},
"product_reference": "qemu-kvm-rhev-10:2.6.0-28.el7_3.15.src",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.15.x86_64 as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.15.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.6.0-28.el7_3.15.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.15.x86_64 as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.15.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.15.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.15.x86_64 as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.15.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.15.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-Agents-ELS-7:qemu-img-rhev-10:2.6.0-28.el7_3.15.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.15.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.15.src",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.15.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.15.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.15.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T16:52:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RHEV-Agents-ELS-7:qemu-img-rhev-10:2.6.0-28.el7_3.15.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.15.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.15.src",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.15.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.15.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.15.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0028"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHEV-Agents-ELS-7:qemu-img-rhev-10:2.6.0-28.el7_3.15.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.15.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.15.src",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.15.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.15.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.15.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
}
]
}
RHEA-2018:0690
Vulnerability from csaf_redhat - Published: 2018-04-10 10:58 - Updated: 2025-11-21 17:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.",
"title": "Topic"
},
{
"category": "general",
"text": "The microcode_ctl packages provide microcode updates for Intel and AMD processors.\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.\n\nUsers of microcode_ctl are advised to upgrade to these updated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2018:0690",
"url": "https://access.redhat.com/errata/RHEA-2018:0690"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.5_Release_Notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.5_Release_Notes/index.html"
},
{
"category": "external",
"summary": "1502360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502360"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhea-2018_0690.json"
}
],
"title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T17:24:07+00:00",
"generator": {
"date": "2025-11-21T17:24:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHEA-2018:0690",
"initial_release_date": "2018-04-10T10:58:29+00:00",
"revision_history": [
{
"date": "2018-04-10T10:58:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-10T10:58:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:24:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"product": {
"name": "microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"product_id": "microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-29.el7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "microcode_ctl-2:2.1-29.el7.x86_64",
"product": {
"name": "microcode_ctl-2:2.1-29.el7.x86_64",
"product_id": "microcode_ctl-2:2.1-29.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/microcode_ctl@2.1-29.el7?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "microcode_ctl-2:2.1-29.el7.src",
"product": {
"name": "microcode_ctl-2:2.1-29.el7.src",
"product_id": "microcode_ctl-2:2.1-29.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/microcode_ctl@2.1-29.el7?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-2:2.1-29.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:microcode_ctl-2:2.1-29.el7.src"
},
"product_reference": "microcode_ctl-2:2.1-29.el7.src",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-2:2.1-29.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:microcode_ctl-2:2.1-29.el7.x86_64"
},
"product_reference": "microcode_ctl-2:2.1-29.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-debuginfo-2:2.1-29.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64"
},
"product_reference": "microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"relates_to_product_reference": "7Client-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-2:2.1-29.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:microcode_ctl-2:2.1-29.el7.src"
},
"product_reference": "microcode_ctl-2:2.1-29.el7.src",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-2:2.1-29.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:microcode_ctl-2:2.1-29.el7.x86_64"
},
"product_reference": "microcode_ctl-2:2.1-29.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-debuginfo-2:2.1-29.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64"
},
"product_reference": "microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-2:2.1-29.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:microcode_ctl-2:2.1-29.el7.src"
},
"product_reference": "microcode_ctl-2:2.1-29.el7.src",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-2:2.1-29.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:microcode_ctl-2:2.1-29.el7.x86_64"
},
"product_reference": "microcode_ctl-2:2.1-29.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-debuginfo-2:2.1-29.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64"
},
"product_reference": "microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"relates_to_product_reference": "7Server-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-2:2.1-29.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:microcode_ctl-2:2.1-29.el7.src"
},
"product_reference": "microcode_ctl-2:2.1-29.el7.src",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-2:2.1-29.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:microcode_ctl-2:2.1-29.el7.x86_64"
},
"product_reference": "microcode_ctl-2:2.1-29.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-debuginfo-2:2.1-29.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64"
},
"product_reference": "microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5:microcode_ctl-2:2.1-29.el7.src",
"7Client-7.5:microcode_ctl-2:2.1-29.el7.x86_64",
"7Client-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"7ComputeNode-7.5:microcode_ctl-2:2.1-29.el7.src",
"7ComputeNode-7.5:microcode_ctl-2:2.1-29.el7.x86_64",
"7ComputeNode-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"7Server-7.5:microcode_ctl-2:2.1-29.el7.src",
"7Server-7.5:microcode_ctl-2:2.1-29.el7.x86_64",
"7Server-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"7Workstation-7.5:microcode_ctl-2:2.1-29.el7.src",
"7Workstation-7.5:microcode_ctl-2:2.1-29.el7.x86_64",
"7Workstation-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-10T10:58:29+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.5:microcode_ctl-2:2.1-29.el7.src",
"7Client-7.5:microcode_ctl-2:2.1-29.el7.x86_64",
"7Client-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"7ComputeNode-7.5:microcode_ctl-2:2.1-29.el7.src",
"7ComputeNode-7.5:microcode_ctl-2:2.1-29.el7.x86_64",
"7ComputeNode-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"7Server-7.5:microcode_ctl-2:2.1-29.el7.src",
"7Server-7.5:microcode_ctl-2:2.1-29.el7.x86_64",
"7Server-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"7Workstation-7.5:microcode_ctl-2:2.1-29.el7.src",
"7Workstation-7.5:microcode_ctl-2:2.1-29.el7.x86_64",
"7Workstation-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2018:0690"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5:microcode_ctl-2:2.1-29.el7.src",
"7Client-7.5:microcode_ctl-2:2.1-29.el7.x86_64",
"7Client-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"7ComputeNode-7.5:microcode_ctl-2:2.1-29.el7.src",
"7ComputeNode-7.5:microcode_ctl-2:2.1-29.el7.x86_64",
"7ComputeNode-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"7Server-7.5:microcode_ctl-2:2.1-29.el7.src",
"7Server-7.5:microcode_ctl-2:2.1-29.el7.x86_64",
"7Server-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64",
"7Workstation-7.5:microcode_ctl-2:2.1-29.el7.src",
"7Workstation-7.5:microcode_ctl-2:2.1-29.el7.x86_64",
"7Workstation-7.5:microcode_ctl-debuginfo-2:2.1-29.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
}
]
}
RHSA-2018:0018
Vulnerability from csaf_redhat - Published: 2018-01-04 13:06 - Updated: 2025-11-21 18:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0018",
"url": "https://access.redhat.com/errata/RHSA-2018:0018"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5753",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5754",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0018.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:03:17+00:00",
"generator": {
"date": "2025-11-21T18:03:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:0018",
"initial_release_date": "2018-01-04T13:06:10+00:00",
"revision_history": [
{
"date": "2018-01-04T13:06:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-01-04T13:06:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:03:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.84.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-358.84.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-358.84.2.el6.x86_64",
"product_id": "perf-0:2.6.32-358.84.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-358.84.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.84.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-358.84.2.el6.src",
"product_id": "kernel-0:2.6.32-358.84.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.84.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-358.84.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-358.84.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.84.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.84.2.el6.src",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.84.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.84.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.84.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.84.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T13:06:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0018"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5753",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519778"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution bounds-check bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "RHBZ#1519778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T13:06:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0018"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution bounds-check bypass"
},
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519781"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution permission faults handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "RHBZ#1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-01-04T13:06:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0018"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution permission faults handling"
}
]
}
SUSE-SU-2018:0831-1
Vulnerability from csaf_suse - Published: 2018-03-27 14:28 - Updated: 2018-03-27 14:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n \nThis update for qemu fixes the following issues:\n\nThis update has the next round of Spectre v2 related patches, which\nnow integrate with corresponding changes in libvirt. (CVE-2017-5715\nbsc#1068032)\n\nThe January 2018 release of qemu initially addressed the Spectre v2\nvulnerability for KVM guests by exposing the spec-ctrl feature\nfor all x86 vcpu types, which was the quick and dirty approach,\nbut not the proper solution.\n\nWe replaced our initial patch by the patches from upstream.\n\nThis update defines spec_ctrl and ibpb cpu feature flags as well as new\ncpu models which are clones of existing models with either -IBRS or -IBPB\nadded to the end of the model name. These new vcpu models explicitly\ninclude the new feature(s), whereas the feature flags can be added\nto the cpu parameter as with other features. In short, for continued\nSpectre v2 protection, ensure that either the appropriate cpu feature\nflag is added to the QEMU command-line, or one of the new cpu models is\nused.\n\nAlthough migration from older versions is supported, the new cpu\nfeatures won\u0027t be properly exposed to the guest until it is restarted\nwith the cpu features explicitly added. A reboot is insufficient.\n\nA warning patch is added which attempts to detect a migration\nfrom a qemu version which had the quick and dirty fix (it only\ndetects certain cases, but hopefully is helpful.)\nFor additional information on Spectre v2 as it relates to QEMU,\nsee:\n\thttps://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/\n\nA patch is added to continue to detect Spectre v2 mitigation\nfeatures (as shown by cpuid), and if found provide that feature\nto guests, even if running on older KVM (kernel) versions which\ndo not yet expose that feature to QEMU. (bsc#1082276)\n\nThese two patches will be removed when we can reasonably assume\neveryone is running with the appropriate updates.\n\n\nAlso security fixes for the following CVE issues are included:\n\n- CVE-2017-15119: The Network Block Device (NBD) server in Quick Emulator (QEMU), was vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS. (bsc#1070144)\n- CVE-2017-15124: VNC server implementation in Quick Emulator (QEMU) was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host. (bsc#1073489)\n- CVE-2017-16845: The PS2 driver in Qemu did not validate \u0027rptr\u0027 and \u0027count\u0027 values during guest migration, leading to out-of-bounds access. (bsc#1068613)\n- CVE-2017-17381: The Virtio Vring implementation in QEMU allowed local OS guest users to cause a denial of service (divide-by-zero error and QEMU process crash) by unsetting vring alignment while updating Virtio rings. (bsc#1071228)\n- CVE-2017-18030: A problem in the Cirrus driver in Qemu allowed local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch. (bsc#1076179)\n- CVE-2017-18043: Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allowed a user to cause a denial of service (Qemu process crash). (bsc#1076775)\n- CVE-2018-5683: The VGA driver in Qemu allowed local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation. (bsc#1076114)\n- CVE-2018-7550: The multiboot functionality in Quick Emulator (aka QEMU) allowed local guest OS users to execute arbitrary code on the QEMU host via an out-of-bounds read or write memory access. (bsc#1083291) \n\nAlso the following bugs were fixed:\n\n- Eliminate bogus use of CPUID_7_0_EDX_PRED_CMD which we\u0027ve\n carried since the initial Spectre v2 patch was added. EDX bit\n 27 of CPUID Leaf 07H, Sub-leaf 0 provides status on STIBP, and\n not the PRED_CMD MSR. Exposing the STIBP CPUID feature bit to the\n guest is wrong in general, since the VM doesn\u0027t directly control\n the scheduling of physical hyperthreads. This is left strictly to\n the L0 hypervisor.\n\n- Spectre fixes for IBM Z series by providing more hw features to guests\n (bsc#1076814)\n- Pre-add group kvm for qemu-tools (bsc#1040202)\n- the qemu-tools package also needs a prerequire of group management\n tools, from the shadow package. (bsc#1085598)\n\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP2-2018-555,SUSE-SLE-RPI-12-SP2-2018-555,SUSE-SLE-SERVER-12-SP2-2018-555",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0831-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0831-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180831-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0831-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003848.html"
},
{
"category": "self",
"summary": "SUSE Bug 1040202",
"url": "https://bugzilla.suse.com/1040202"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068613",
"url": "https://bugzilla.suse.com/1068613"
},
{
"category": "self",
"summary": "SUSE Bug 1070144",
"url": "https://bugzilla.suse.com/1070144"
},
{
"category": "self",
"summary": "SUSE Bug 1071228",
"url": "https://bugzilla.suse.com/1071228"
},
{
"category": "self",
"summary": "SUSE Bug 1073489",
"url": "https://bugzilla.suse.com/1073489"
},
{
"category": "self",
"summary": "SUSE Bug 1076114",
"url": "https://bugzilla.suse.com/1076114"
},
{
"category": "self",
"summary": "SUSE Bug 1076179",
"url": "https://bugzilla.suse.com/1076179"
},
{
"category": "self",
"summary": "SUSE Bug 1076775",
"url": "https://bugzilla.suse.com/1076775"
},
{
"category": "self",
"summary": "SUSE Bug 1076814",
"url": "https://bugzilla.suse.com/1076814"
},
{
"category": "self",
"summary": "SUSE Bug 1082276",
"url": "https://bugzilla.suse.com/1082276"
},
{
"category": "self",
"summary": "SUSE Bug 1083291",
"url": "https://bugzilla.suse.com/1083291"
},
{
"category": "self",
"summary": "SUSE Bug 1085598",
"url": "https://bugzilla.suse.com/1085598"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15119 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15124 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16845 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17381 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18030 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18043 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5683 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5683/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7550 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7550/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-03-27T14:28:56Z",
"generator": {
"date": "2018-03-27T14:28:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0831-1",
"initial_release_date": "2018-03-27T14:28:56Z",
"revision_history": [
{
"date": "2018-03-27T14:28:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.37.1.aarch64",
"product": {
"name": "qemu-2.6.2-41.37.1.aarch64",
"product_id": "qemu-2.6.2-41.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.6.2-41.37.1.aarch64",
"product": {
"name": "qemu-arm-2.6.2-41.37.1.aarch64",
"product_id": "qemu-arm-2.6.2-41.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.37.1.aarch64",
"product": {
"name": "qemu-block-curl-2.6.2-41.37.1.aarch64",
"product_id": "qemu-block-curl-2.6.2-41.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.6.2-41.37.1.aarch64",
"product": {
"name": "qemu-block-rbd-2.6.2-41.37.1.aarch64",
"product_id": "qemu-block-rbd-2.6.2-41.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.37.1.aarch64",
"product": {
"name": "qemu-block-ssh-2.6.2-41.37.1.aarch64",
"product_id": "qemu-block-ssh-2.6.2-41.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.37.1.aarch64",
"product": {
"name": "qemu-guest-agent-2.6.2-41.37.1.aarch64",
"product_id": "qemu-guest-agent-2.6.2-41.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.37.1.aarch64",
"product": {
"name": "qemu-lang-2.6.2-41.37.1.aarch64",
"product_id": "qemu-lang-2.6.2-41.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.37.1.aarch64",
"product": {
"name": "qemu-tools-2.6.2-41.37.1.aarch64",
"product_id": "qemu-tools-2.6.2-41.37.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-41.37.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-41.37.1.noarch",
"product_id": "qemu-ipxe-1.0.0-41.37.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.9.1-41.37.1.noarch",
"product": {
"name": "qemu-seabios-1.9.1-41.37.1.noarch",
"product_id": "qemu-seabios-1.9.1-41.37.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-41.37.1.noarch",
"product": {
"name": "qemu-sgabios-8-41.37.1.noarch",
"product_id": "qemu-sgabios-8-41.37.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.9.1-41.37.1.noarch",
"product": {
"name": "qemu-vgabios-1.9.1-41.37.1.noarch",
"product_id": "qemu-vgabios-1.9.1-41.37.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.37.1.ppc64le",
"product": {
"name": "qemu-2.6.2-41.37.1.ppc64le",
"product_id": "qemu-2.6.2-41.37.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.37.1.ppc64le",
"product": {
"name": "qemu-block-curl-2.6.2-41.37.1.ppc64le",
"product_id": "qemu-block-curl-2.6.2-41.37.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"product": {
"name": "qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"product_id": "qemu-block-ssh-2.6.2-41.37.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"product": {
"name": "qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"product_id": "qemu-guest-agent-2.6.2-41.37.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.37.1.ppc64le",
"product": {
"name": "qemu-lang-2.6.2-41.37.1.ppc64le",
"product_id": "qemu-lang-2.6.2-41.37.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.6.2-41.37.1.ppc64le",
"product": {
"name": "qemu-ppc-2.6.2-41.37.1.ppc64le",
"product_id": "qemu-ppc-2.6.2-41.37.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.37.1.ppc64le",
"product": {
"name": "qemu-tools-2.6.2-41.37.1.ppc64le",
"product_id": "qemu-tools-2.6.2-41.37.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.37.1.s390x",
"product": {
"name": "qemu-2.6.2-41.37.1.s390x",
"product_id": "qemu-2.6.2-41.37.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.37.1.s390x",
"product": {
"name": "qemu-block-curl-2.6.2-41.37.1.s390x",
"product_id": "qemu-block-curl-2.6.2-41.37.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.37.1.s390x",
"product": {
"name": "qemu-block-ssh-2.6.2-41.37.1.s390x",
"product_id": "qemu-block-ssh-2.6.2-41.37.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.37.1.s390x",
"product": {
"name": "qemu-guest-agent-2.6.2-41.37.1.s390x",
"product_id": "qemu-guest-agent-2.6.2-41.37.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.6.2-41.37.1.s390x",
"product": {
"name": "qemu-kvm-2.6.2-41.37.1.s390x",
"product_id": "qemu-kvm-2.6.2-41.37.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.37.1.s390x",
"product": {
"name": "qemu-lang-2.6.2-41.37.1.s390x",
"product_id": "qemu-lang-2.6.2-41.37.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.6.2-41.37.1.s390x",
"product": {
"name": "qemu-s390-2.6.2-41.37.1.s390x",
"product_id": "qemu-s390-2.6.2-41.37.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.37.1.s390x",
"product": {
"name": "qemu-tools-2.6.2-41.37.1.s390x",
"product_id": "qemu-tools-2.6.2-41.37.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.37.1.x86_64",
"product": {
"name": "qemu-2.6.2-41.37.1.x86_64",
"product_id": "qemu-2.6.2-41.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.37.1.x86_64",
"product": {
"name": "qemu-block-curl-2.6.2-41.37.1.x86_64",
"product_id": "qemu-block-curl-2.6.2-41.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.6.2-41.37.1.x86_64",
"product": {
"name": "qemu-kvm-2.6.2-41.37.1.x86_64",
"product_id": "qemu-kvm-2.6.2-41.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.37.1.x86_64",
"product": {
"name": "qemu-tools-2.6.2-41.37.1.x86_64",
"product_id": "qemu-tools-2.6.2-41.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.6.2-41.37.1.x86_64",
"product": {
"name": "qemu-x86-2.6.2-41.37.1.x86_64",
"product_id": "qemu-x86-2.6.2-41.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.6.2-41.37.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.6.2-41.37.1.x86_64",
"product_id": "qemu-block-rbd-2.6.2-41.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.37.1.x86_64",
"product": {
"name": "qemu-block-ssh-2.6.2-41.37.1.x86_64",
"product_id": "qemu-block-ssh-2.6.2-41.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.37.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.6.2-41.37.1.x86_64",
"product_id": "qemu-guest-agent-2.6.2-41.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.37.1.x86_64",
"product": {
"name": "qemu-lang-2.6.2-41.37.1.x86_64",
"product_id": "qemu-lang-2.6.2-41.37.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.37.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.37.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.37.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch"
},
"product_reference": "qemu-sgabios-8-41.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.37.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-arm-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-block-curl-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.37.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-lang-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-tools-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le"
},
"product_reference": "qemu-2.6.2-41.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-arm-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-block-curl-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.6.2-41.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-block-curl-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le"
},
"product_reference": "qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-block-ssh-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-guest-agent-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.37.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-kvm-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-lang-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le"
},
"product_reference": "qemu-lang-2.6.2-41.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-lang-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-lang-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.6.2-41.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le"
},
"product_reference": "qemu-ppc-2.6.2-41.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-s390-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.37.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.37.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch"
},
"product_reference": "qemu-sgabios-8-41.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-tools-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le"
},
"product_reference": "qemu-tools-2.6.2-41.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-tools-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.37.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le"
},
"product_reference": "qemu-2.6.2-41.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-arm-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-block-curl-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.6.2-41.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-block-curl-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le"
},
"product_reference": "qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-block-ssh-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-guest-agent-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.37.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-kvm-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-lang-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le"
},
"product_reference": "qemu-lang-2.6.2-41.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-lang-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-lang-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.6.2-41.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le"
},
"product_reference": "qemu-ppc-2.6.2-41.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-s390-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.37.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.37.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch"
},
"product_reference": "qemu-sgabios-8-41.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64"
},
"product_reference": "qemu-tools-2.6.2-41.37.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le"
},
"product_reference": "qemu-tools-2.6.2-41.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x"
},
"product_reference": "qemu-tools-2.6.2-41.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.37.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15119"
}
],
"notes": [
{
"category": "general",
"text": "The Network Block Device (NBD) server in Quick Emulator (QEMU) before 2.11 is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15119",
"url": "https://www.suse.com/security/cve/CVE-2017-15119"
},
{
"category": "external",
"summary": "SUSE Bug 1070144 for CVE-2017-15119",
"url": "https://bugzilla.suse.com/1070144"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-27T14:28:56Z",
"details": "low"
}
],
"title": "CVE-2017-15119"
},
{
"cve": "CVE-2017-15124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15124"
}
],
"notes": [
{
"category": "general",
"text": "VNC server implementation in Quick Emulator (QEMU) 2.11.0 and older was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15124",
"url": "https://www.suse.com/security/cve/CVE-2017-15124"
},
{
"category": "external",
"summary": "SUSE Bug 1073489 for CVE-2017-15124",
"url": "https://bugzilla.suse.com/1073489"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-27T14:28:56Z",
"details": "moderate"
}
],
"title": "CVE-2017-15124"
},
{
"cve": "CVE-2017-16845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16845"
}
],
"notes": [
{
"category": "general",
"text": "hw/input/ps2.c in Qemu does not validate \u0027rptr\u0027 and \u0027count\u0027 values during guest migration, leading to out-of-bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16845",
"url": "https://www.suse.com/security/cve/CVE-2017-16845"
},
{
"category": "external",
"summary": "SUSE Bug 1068613 for CVE-2017-16845",
"url": "https://bugzilla.suse.com/1068613"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-27T14:28:56Z",
"details": "low"
}
],
"title": "CVE-2017-16845"
},
{
"cve": "CVE-2017-17381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17381"
}
],
"notes": [
{
"category": "general",
"text": "The Virtio Vring implementation in QEMU allows local OS guest users to cause a denial of service (divide-by-zero error and QEMU process crash) by unsetting vring alignment while updating Virtio rings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17381",
"url": "https://www.suse.com/security/cve/CVE-2017-17381"
},
{
"category": "external",
"summary": "SUSE Bug 1071228 for CVE-2017-17381",
"url": "https://bugzilla.suse.com/1071228"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-27T14:28:56Z",
"details": "moderate"
}
],
"title": "CVE-2017-17381"
},
{
"cve": "CVE-2017-18030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18030"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18030",
"url": "https://www.suse.com/security/cve/CVE-2017-18030"
},
{
"category": "external",
"summary": "SUSE Bug 1076179 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076179"
},
{
"category": "external",
"summary": "SUSE Bug 1076180 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-27T14:28:56Z",
"details": "low"
}
],
"title": "CVE-2017-18030"
},
{
"cve": "CVE-2017-18043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18043"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allows a user to cause a denial of service (Qemu process crash).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18043",
"url": "https://www.suse.com/security/cve/CVE-2017-18043"
},
{
"category": "external",
"summary": "SUSE Bug 1076775 for CVE-2017-18043",
"url": "https://bugzilla.suse.com/1076775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-27T14:28:56Z",
"details": "low"
}
],
"title": "CVE-2017-18043"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-27T14:28:56Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-5683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5683"
}
],
"notes": [
{
"category": "general",
"text": "The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5683",
"url": "https://www.suse.com/security/cve/CVE-2018-5683"
},
{
"category": "external",
"summary": "SUSE Bug 1076114 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076114"
},
{
"category": "external",
"summary": "SUSE Bug 1076116 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-27T14:28:56Z",
"details": "moderate"
}
],
"title": "CVE-2018-5683"
},
{
"cve": "CVE-2018-7550",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7550"
}
],
"notes": [
{
"category": "general",
"text": "The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7550",
"url": "https://www.suse.com/security/cve/CVE-2018-7550"
},
{
"category": "external",
"summary": "SUSE Bug 1083291 for CVE-2018-7550",
"url": "https://bugzilla.suse.com/1083291"
},
{
"category": "external",
"summary": "SUSE Bug 1083292 for CVE-2018-7550",
"url": "https://bugzilla.suse.com/1083292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.37.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-27T14:28:56Z",
"details": "important"
}
],
"title": "CVE-2018-7550"
}
]
}
SUSE-SU-2018:1295-1
Vulnerability from csaf_suse - Published: 2018-05-15 13:11 - Updated: 2018-05-15 13:11Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2017-5715: Spectre fixes for libvirt (bsc#1079869, bsc#1088147, bsc#1087887).\n- CVE-2018-1064: Avoid denial of service reading from QEMU guest agent (bsc#1083625).\n- CVE-2018-5748: Avoid denial of service reading from QEMU monitor (bsc#1076500).\n\nBug fixes:\n\n- bsc#1025340: Use xend for nodeGetFreeMemory API.\n- bsc#960742: Allow read access to script directories in libvirtd AppArmor profile.\n- bsc#936233: Introduce qemuDomainDefCheckABIStability.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-libvirt-13600,slessp3-libvirt-13600",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1295-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1295-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181295-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1295-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html"
},
{
"category": "self",
"summary": "SUSE Bug 1025340",
"url": "https://bugzilla.suse.com/1025340"
},
{
"category": "self",
"summary": "SUSE Bug 1076500",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "self",
"summary": "SUSE Bug 1079869",
"url": "https://bugzilla.suse.com/1079869"
},
{
"category": "self",
"summary": "SUSE Bug 1083625",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "self",
"summary": "SUSE Bug 1087887",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "self",
"summary": "SUSE Bug 1088147",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "self",
"summary": "SUSE Bug 936233",
"url": "https://bugzilla.suse.com/936233"
},
{
"category": "self",
"summary": "SUSE Bug 960742",
"url": "https://bugzilla.suse.com/960742"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1064 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5748 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5748/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-05-15T13:11:23Z",
"generator": {
"date": "2018-05-15T13:11:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1295-1",
"initial_release_date": "2018-05-15T13:11:23Z",
"revision_history": [
{
"date": "2018-05-15T13:11:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.0.5.9-21.5.1.i586",
"product": {
"name": "libvirt-1.0.5.9-21.5.1.i586",
"product_id": "libvirt-1.0.5.9-21.5.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.0.5.9-21.5.1.i586",
"product": {
"name": "libvirt-client-1.0.5.9-21.5.1.i586",
"product_id": "libvirt-client-1.0.5.9-21.5.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.0.5.9-21.5.1.i586",
"product": {
"name": "libvirt-doc-1.0.5.9-21.5.1.i586",
"product_id": "libvirt-doc-1.0.5.9-21.5.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"product": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"product_id": "libvirt-lock-sanlock-1.0.5.9-21.5.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-python-1.0.5.9-21.5.1.i586",
"product": {
"name": "libvirt-python-1.0.5.9-21.5.1.i586",
"product_id": "libvirt-python-1.0.5.9-21.5.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.0.5.9-21.5.1.s390x",
"product": {
"name": "libvirt-1.0.5.9-21.5.1.s390x",
"product_id": "libvirt-1.0.5.9-21.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.0.5.9-21.5.1.s390x",
"product": {
"name": "libvirt-client-1.0.5.9-21.5.1.s390x",
"product_id": "libvirt-client-1.0.5.9-21.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"product": {
"name": "libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"product_id": "libvirt-client-32bit-1.0.5.9-21.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.0.5.9-21.5.1.s390x",
"product": {
"name": "libvirt-doc-1.0.5.9-21.5.1.s390x",
"product_id": "libvirt-doc-1.0.5.9-21.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"product": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"product_id": "libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-python-1.0.5.9-21.5.1.s390x",
"product": {
"name": "libvirt-python-1.0.5.9-21.5.1.s390x",
"product_id": "libvirt-python-1.0.5.9-21.5.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.0.5.9-21.5.1.x86_64",
"product": {
"name": "libvirt-1.0.5.9-21.5.1.x86_64",
"product_id": "libvirt-1.0.5.9-21.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.0.5.9-21.5.1.x86_64",
"product": {
"name": "libvirt-client-1.0.5.9-21.5.1.x86_64",
"product_id": "libvirt-client-1.0.5.9-21.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"product": {
"name": "libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"product_id": "libvirt-client-32bit-1.0.5.9-21.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.0.5.9-21.5.1.x86_64",
"product": {
"name": "libvirt-doc-1.0.5.9-21.5.1.x86_64",
"product_id": "libvirt-doc-1.0.5.9-21.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"product_id": "libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-python-1.0.5.9-21.5.1.x86_64",
"product": {
"name": "libvirt-python-1.0.5.9-21.5.1.x86_64",
"product_id": "libvirt-python-1.0.5.9-21.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-client-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-client-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-doc-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-doc-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-python-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-python-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.0.5.9-21.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.s390x"
},
"product_reference": "libvirt-1.0.5.9-21.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.0.5.9-21.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.x86_64"
},
"product_reference": "libvirt-1.0.5.9-21.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-client-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.0.5.9-21.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.s390x"
},
"product_reference": "libvirt-client-1.0.5.9-21.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.0.5.9-21.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.x86_64"
},
"product_reference": "libvirt-client-1.0.5.9-21.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.0.5.9-21.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.s390x"
},
"product_reference": "libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.0.5.9-21.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64"
},
"product_reference": "libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-doc-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.0.5.9-21.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.s390x"
},
"product_reference": "libvirt-doc-1.0.5.9-21.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.0.5.9-21.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.x86_64"
},
"product_reference": "libvirt-doc-1.0.5.9-21.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-python-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-1.0.5.9-21.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.s390x"
},
"product_reference": "libvirt-python-1.0.5.9-21.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-1.0.5.9-21.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.x86_64"
},
"product_reference": "libvirt-python-1.0.5.9-21.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.0.5.9-21.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.s390x"
},
"product_reference": "libvirt-1.0.5.9-21.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.0.5.9-21.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.x86_64"
},
"product_reference": "libvirt-1.0.5.9-21.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-client-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.0.5.9-21.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.s390x"
},
"product_reference": "libvirt-client-1.0.5.9-21.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.0.5.9-21.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.x86_64"
},
"product_reference": "libvirt-client-1.0.5.9-21.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.0.5.9-21.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.s390x"
},
"product_reference": "libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.0.5.9-21.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64"
},
"product_reference": "libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-doc-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.0.5.9-21.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.s390x"
},
"product_reference": "libvirt-doc-1.0.5.9-21.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.0.5.9-21.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.x86_64"
},
"product_reference": "libvirt-doc-1.0.5.9-21.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-1.0.5.9-21.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.i586"
},
"product_reference": "libvirt-python-1.0.5.9-21.5.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-1.0.5.9-21.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.s390x"
},
"product_reference": "libvirt-python-1.0.5.9-21.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-1.0.5.9-21.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.x86_64"
},
"product_reference": "libvirt-python-1.0.5.9-21.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-15T13:11:23Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1064"
}
],
"notes": [
{
"category": "general",
"text": "libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1064",
"url": "https://www.suse.com/security/cve/CVE-2018-1064"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1088147"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-15T13:11:23Z",
"details": "moderate"
}
],
"title": "CVE-2018-1064"
},
{
"cve": "CVE-2018-5748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5748"
}
],
"notes": [
{
"category": "general",
"text": "qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5748",
"url": "https://www.suse.com/security/cve/CVE-2018-5748"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1087887"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.5.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-15T13:11:23Z",
"details": "low"
}
],
"title": "CVE-2018-5748"
}
]
}
SUSE-SU-2018:0011-1
Vulnerability from csaf_suse - Published: 2018-01-04 07:51 - Updated: 2018-01-04 07:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThis update adds mitigations for various side channel attacks against\nmodern CPUs that could disclose content of otherwise unreadable memory\n(bnc#1068032).\n\n- CVE-2017-5753: Local attackers on systems with modern CPUs featuring\n deep instruction pipelining could use attacker controllable speculative\n execution over code patterns in the Linux Kernel to leak content from\n otherwise not readable memory in the same address space, allowing\n retrieval of passwords, cryptographic keys and other secrets.\n\n This problem is mitigated by adding speculative fencing on affected\n code paths throughout the Linux kernel.\n\n This issue is addressed for the x86_64, the IBM Power and IBM zSeries\n architecture.\n\n- CVE-2017-5715: Local attackers on systems with modern CPUs featuring\n branch prediction could use mispredicted branches to speculatively execute\n code patterns that in turn could be made to leak other non-readable\n content in the same address space, an attack similar to CVE-2017-5753.\n\n This problem is mitigated by disabling predictive branches, depending\n on CPU architecture either by firmware updates and/or fixes in the\n user-kernel privilege boundaries.\n\n This is done with help of Linux Kernel fixes on the Intel/AMD x86_64 and\n IBM zSeries architectures. On x86_64, this requires also updates of the\n CPU microcode packages, delivered in seperate updates.\n\n For IBM Power and zSeries the required firmware updates are supplied\n over regular channels by IBM.\n\n As this feature can have a performance impact, it can be disabled using\n the \u0027nospec\u0027 kernel commandline option.\n\n- CVE-2017-5754: Local attackers on systems with modern CPUs featuring\n deep instruction pipelining could use code patterns in userspace to\n speculative executive code that would read otherwise read protected\n memory, an attack similar to CVE-2017-5753.\n\n This problem is mitigated by unmapping the Linux Kernel from the user\n address space during user code execution, following a approach called\n \u0027KAISER\u0027. The terms used here are \u0027KAISER\u0027 / \u0027Kernel Address Isolation\u0027\n and \u0027PTI\u0027 / \u0027Page Table Isolation\u0027.\n\n This update does this on the Intel x86_64 and IBM Power\n architecture. Updates are also necessary for the ARM architecture,\n but will be delivered in the next round of updates.\n\n This feature can be enabled / disabled by the \u0027pti=[on|off|auto]\u0027 or\n \u0027nopti\u0027 commandline options.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).\n- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).\n- CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel did not ensure that an l2cap socket is available, which allowed local users to gain privileges via a crafted application (bnc#1071470).\n- CVE-2017-13167: An elevation of privilege vulnerability in the kernel sound timer. (bnc#1072876).\n- CVE-2017-16538: drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel allowed local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner) (bnc#1066569).\n- CVE-2017-17558: The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel did not consider the maximum number of configurations and interfaces before attempting to release resources, which allowed local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device (bnc#1072561).\n- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695).\n- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).\n- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).\n- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).\n- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).\n- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).\n- CVE-2017-7472: The KEYS subsystem in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).\n- CVE-2017-16534: The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066693).\n\nThe following non-security bugs were fixed:\n\n- adm80211: return an error if adm8211_alloc_rings() fails (bsc#1048185).\n- autofs: fix careless error in recent commit (bsc#1065180).\n- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).\n- carl9170: prevent speculative execution (bnc#1068032).\n- ecryptfs: fix dereference of NULL user_key_payload (bsc#1013018).\n- eCryptfs: use after free in ecryptfs_release_messaging() (bsc#1013018).\n- fs/9p: Compare qid.path in v9fs_test_inode (bsc#1013018).\n- fs: prevent speculative execution (bnc#1068032).\n- isa: Prevent NULL dereference in isa_bus driver callbacks (bsc#1045538).\n- kabi: silence spurious kabi error in net/sctp/socket.c (bsc#1068671).\n- kaiser: add \u0027nokaiser\u0027 boot option, using ALTERNATIVE.\n- kaiser: fix ldt freeing.\n- kaiser: Kernel Address Isolation.\n- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.\n- kaiser: work around kABI.\n- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).\n- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).\n- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).\n- media: cx231xx-cards: fix NULL-deref at probe (bsc#1050431).\n- mm/madvise.c: fix madvise() infinite loop under special circumstances (bnc#1070964).\n- mm/mmu_context, sched/core: Fix mmu_context.h assumption.\n- p54: prevent speculative execution (bnc#1068032).\n- powerpc/barrier: add gmb.\n- powerpc: Secure memory rfi flush (bsc#1068032).\n- ptrace: Add a new thread access check (bsc#1068032).\n- qeth: check not more than 16 SBALEs on the completion queue (bnc#1072457, LTC#148203).\n- s390: add ppa to system call and program check path (bsc#1068032).\n- s390/disassembler: correct disassembly lines alignment (bnc#1066973, LTC#161577).\n- s390/disassembler: increase show_code buffer size (bnc#1066973, LTC#161577).\n- s390: fix transactional execution control register handling (bnc#1072457, LTC#162116).\n- s390: introduce CPU alternatives.\n- s390: introduce CPU alternatives (bsc#1068032).\n- s390/spinlock: add gmb memory barrier.\n- s390/spinlock: add gmb memory barrier (bsc#1068032).\n- s390/spinlock: add ppa to system call path.\n- sched/core: Add switch_mm_irqs_off() and use it in the scheduler.\n- sched/core: Idle_task_exit() shouldn\u0027t use switch_mm_irqs_off().\n- scsi_scan: Exit loop if TUR to LUN0 fails with 0x05/0x25 (bsc#1063043). This is specific to FUJITSU ETERNUS_DX* targets. They can return \u0027Illegal Request - Logical unit not supported\u0027 and processing should leave the timeout loop in this case.\n- scsi: zfcp: fix erp_action use-before-initialize in REC action trace (bnc#1066973, LTC#160081).\n- temporary fix (bsc#1068032).\n- udf: prevent speculative execution (bnc#1068032).\n- usb: host: fix incorrect updating of offset (bsc#1047487).\n- usb: uas: fix bug in handling of alternate settings (bsc#1071074).\n- uvcvideo: prevent speculative execution (bnc#1068032).\n- video: udlfb: Fix read EDID timeout (bsc#1045538).\n- watchdog: hpwdt: add support for iLO5 (bsc#1024612).\n- watchdog/hpwdt: Check source of NMI (bsc#1024612).\n- x86-64: Give vvars their own page.\n- x86-64: Map the HPET NX.\n- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).\n- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).\n- x86/alternatives: Add instruction padding.\n- x86/alternatives: Cleanup DPRINTK macro.\n- x86/alternatives: Make JMPs more robust.\n- x86/alternatives: Use optimized NOPs for padding.\n- x86/boot: Add early cmdline parsing for options with arguments.\n- x86, boot: Carve out early cmdline parsing function.\n- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).\n- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).\n- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).\n- x86/CPU: Check speculation control CPUID bit (bsc#1068032).\n- x86/cpu: Fix bootup crashes by sanitizing the argument of the \u0027clearcpuid=\u0027 command-line option (bsc#1065600).\n- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).\n- x86/entry: Add a function to overwrite the RSB (bsc#1068032).\n- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).\n- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).\n- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).\n- x86/idle: Toggle IBRS when going idle (bsc#1068032).\n- x86/kaiser: Check boottime cmdline params.\n- x86/kaiser: disable vmstat accounting.\n- x86/kaiser: Move feature detection up (bsc#1068032).\n- x86/kaiser: propagate info to /proc/cpuinfo.\n- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.\n- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).\n- x86/kvm: Flush IBP when switching VMs (bsc#1068032).\n- x86/kvm: Pad RSB on VM transition (bsc#1068032).\n- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).\n- x86: Make alternative instruction pointers relative.\n- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).\n- x86/mm/64: Fix reboot interaction with CR4.PCIDE.\n- x86/mm: Add a \u0027noinvpcid\u0027 boot option to turn off INVPCID.\n- x86/mm: Add INVPCID helpers.\n- x86/mm: Add the \u0027nopcid\u0027 boot option to turn off PCID.\n- x86/mm: Build arch/x86/mm/tlb.c even on !SMP.\n- x86/mm: Disable PCID on 32-bit kernels.\n- x86/mm: Enable CR4.PCIDE on supported systems.\n- x86/mm: fix bad backport to disable PCID on Xen.\n- x86/mm: Fix INVPCID asm constraint.\n- x86/mm: If INVPCID is available, use it to flush global mappings.\n- x86/mm/kaiser: re-enable vsyscalls.\n- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).\n- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.\n- x86/mm, sched/core: Turn off IRQs in switch_mm().\n- x86/mm, sched/core: Uninline switch_mm().\n- x86/mm: Set IBPB upon context switch (bsc#1068032).\n- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).\n- x86/spec: Add IBRS control functions (bsc#1068032).\n- x86/spec: Add \u0027nospec\u0027 chicken bit (bsc#1068032).\n- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).\n- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).\n- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).\n- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).\n- x86/svm: Add code to clear registers on VM exit (bsc#1068032).\n- x86/svm: Clobber the RSB on VM exit (bsc#1068032).\n- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).\n- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).\n- xen/kaiser: add \u0027nokaiser\u0027 boot option, using ALTERNATIVE.\n- xen/KAISER: Kernel Address Isolation.\n- xen/kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.\n- xen/kaiser: work around kABI.\n- xen/x86-64: Give vvars their own page.\n- xen/x86-64: Map the HPET NX.\n- xen/x86/alternatives: Add instruction padding.\n- xen/x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.\n- xen/x86/mm: Enable CR4.PCIDE on supported systems.\n- xen/x86/mm/kaiser: re-enable vsyscalls.\n- xen/x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.\n- xen: x86/mm, sched/core: Turn off IRQs in switch_mm().\n- xen: x86/mm, sched/core: Uninline switch_mm().\n- zd1211rw: fix NULL-deref at probe (bsc#1045479).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-kernel-20180109-13391,slessp4-kernel-20180109-13391,slexsp3-kernel-20180109-13391",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0011-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0011-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180011-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0011-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html"
},
{
"category": "self",
"summary": "SUSE Bug 1013018",
"url": "https://bugzilla.suse.com/1013018"
},
{
"category": "self",
"summary": "SUSE Bug 1024612",
"url": "https://bugzilla.suse.com/1024612"
},
{
"category": "self",
"summary": "SUSE Bug 1034862",
"url": "https://bugzilla.suse.com/1034862"
},
{
"category": "self",
"summary": "SUSE Bug 1045479",
"url": "https://bugzilla.suse.com/1045479"
},
{
"category": "self",
"summary": "SUSE Bug 1045538",
"url": "https://bugzilla.suse.com/1045538"
},
{
"category": "self",
"summary": "SUSE Bug 1047487",
"url": "https://bugzilla.suse.com/1047487"
},
{
"category": "self",
"summary": "SUSE Bug 1048185",
"url": "https://bugzilla.suse.com/1048185"
},
{
"category": "self",
"summary": "SUSE Bug 1050231",
"url": "https://bugzilla.suse.com/1050231"
},
{
"category": "self",
"summary": "SUSE Bug 1050431",
"url": "https://bugzilla.suse.com/1050431"
},
{
"category": "self",
"summary": "SUSE Bug 1056982",
"url": "https://bugzilla.suse.com/1056982"
},
{
"category": "self",
"summary": "SUSE Bug 1063043",
"url": "https://bugzilla.suse.com/1063043"
},
{
"category": "self",
"summary": "SUSE Bug 1065180",
"url": "https://bugzilla.suse.com/1065180"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1066569",
"url": "https://bugzilla.suse.com/1066569"
},
{
"category": "self",
"summary": "SUSE Bug 1066693",
"url": "https://bugzilla.suse.com/1066693"
},
{
"category": "self",
"summary": "SUSE Bug 1066973",
"url": "https://bugzilla.suse.com/1066973"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068671",
"url": "https://bugzilla.suse.com/1068671"
},
{
"category": "self",
"summary": "SUSE Bug 1068984",
"url": "https://bugzilla.suse.com/1068984"
},
{
"category": "self",
"summary": "SUSE Bug 1069702",
"url": "https://bugzilla.suse.com/1069702"
},
{
"category": "self",
"summary": "SUSE Bug 1070771",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "self",
"summary": "SUSE Bug 1070964",
"url": "https://bugzilla.suse.com/1070964"
},
{
"category": "self",
"summary": "SUSE Bug 1071074",
"url": "https://bugzilla.suse.com/1071074"
},
{
"category": "self",
"summary": "SUSE Bug 1071470",
"url": "https://bugzilla.suse.com/1071470"
},
{
"category": "self",
"summary": "SUSE Bug 1071695",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "self",
"summary": "SUSE Bug 1072457",
"url": "https://bugzilla.suse.com/1072457"
},
{
"category": "self",
"summary": "SUSE Bug 1072561",
"url": "https://bugzilla.suse.com/1072561"
},
{
"category": "self",
"summary": "SUSE Bug 1072876",
"url": "https://bugzilla.suse.com/1072876"
},
{
"category": "self",
"summary": "SUSE Bug 1073792",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "self",
"summary": "SUSE Bug 1073874",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11600 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13167 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14106 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15115 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15868 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16534 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16534/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16538 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16538/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16939 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16939/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17558 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17805 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17806 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7472 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7472/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8824 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8824/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-01-04T07:51:57Z",
"generator": {
"date": "2018-01-04T07:51:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0011-1",
"initial_release_date": "2018-01-04T07:51:57Z",
"revision_history": [
{
"date": "2018-01-04T07:51:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-default-3.0.101-108.21.1.i586",
"product_id": "kernel-default-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-108.21.1.i586",
"product_id": "kernel-default-base-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-108.21.1.i586",
"product_id": "kernel-default-devel-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-108.21.1.i586",
"product_id": "kernel-ec2-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-108.21.1.i586",
"product_id": "kernel-ec2-base-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.21.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-pae-3.0.101-108.21.1.i586",
"product_id": "kernel-pae-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-108.21.1.i586",
"product_id": "kernel-pae-base-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-108.21.1.i586",
"product_id": "kernel-pae-devel-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-source-3.0.101-108.21.1.i586",
"product_id": "kernel-source-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-syms-3.0.101-108.21.1.i586",
"product_id": "kernel-syms-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-trace-3.0.101-108.21.1.i586",
"product_id": "kernel-trace-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-108.21.1.i586",
"product_id": "kernel-trace-base-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-108.21.1.i586",
"product_id": "kernel-trace-devel-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-xen-3.0.101-108.21.1.i586",
"product_id": "kernel-xen-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-108.21.1.i586",
"product_id": "kernel-xen-base-3.0.101-108.21.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.21.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-108.21.1.i586",
"product_id": "kernel-xen-devel-3.0.101-108.21.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.21.1.ia64",
"product": {
"name": "kernel-default-3.0.101-108.21.1.ia64",
"product_id": "kernel-default-3.0.101-108.21.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.21.1.ia64",
"product": {
"name": "kernel-default-base-3.0.101-108.21.1.ia64",
"product_id": "kernel-default-base-3.0.101-108.21.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.21.1.ia64",
"product": {
"name": "kernel-default-devel-3.0.101-108.21.1.ia64",
"product_id": "kernel-default-devel-3.0.101-108.21.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.21.1.ia64",
"product": {
"name": "kernel-source-3.0.101-108.21.1.ia64",
"product_id": "kernel-source-3.0.101-108.21.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.21.1.ia64",
"product": {
"name": "kernel-syms-3.0.101-108.21.1.ia64",
"product_id": "kernel-syms-3.0.101-108.21.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.21.1.ia64",
"product": {
"name": "kernel-trace-3.0.101-108.21.1.ia64",
"product_id": "kernel-trace-3.0.101-108.21.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.21.1.ia64",
"product": {
"name": "kernel-trace-base-3.0.101-108.21.1.ia64",
"product_id": "kernel-trace-base-3.0.101-108.21.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.21.1.ia64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.21.1.ia64",
"product_id": "kernel-trace-devel-3.0.101-108.21.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-docs-3.0.101-108.21.2.noarch",
"product": {
"name": "kernel-docs-3.0.101-108.21.2.noarch",
"product_id": "kernel-docs-3.0.101-108.21.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-bigmem-3.0.101-108.21.1.ppc64",
"product": {
"name": "kernel-bigmem-3.0.101-108.21.1.ppc64",
"product_id": "kernel-bigmem-3.0.101-108.21.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"product": {
"name": "kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"product_id": "kernel-bigmem-base-3.0.101-108.21.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"product": {
"name": "kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"product_id": "kernel-bigmem-devel-3.0.101-108.21.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.21.1.ppc64",
"product": {
"name": "kernel-default-3.0.101-108.21.1.ppc64",
"product_id": "kernel-default-3.0.101-108.21.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.21.1.ppc64",
"product": {
"name": "kernel-default-base-3.0.101-108.21.1.ppc64",
"product_id": "kernel-default-base-3.0.101-108.21.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.21.1.ppc64",
"product": {
"name": "kernel-default-devel-3.0.101-108.21.1.ppc64",
"product_id": "kernel-default-devel-3.0.101-108.21.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-3.0.101-108.21.1.ppc64",
"product": {
"name": "kernel-ppc64-3.0.101-108.21.1.ppc64",
"product_id": "kernel-ppc64-3.0.101-108.21.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"product": {
"name": "kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"product_id": "kernel-ppc64-base-3.0.101-108.21.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"product": {
"name": "kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"product_id": "kernel-ppc64-devel-3.0.101-108.21.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.21.1.ppc64",
"product": {
"name": "kernel-source-3.0.101-108.21.1.ppc64",
"product_id": "kernel-source-3.0.101-108.21.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.21.1.ppc64",
"product": {
"name": "kernel-syms-3.0.101-108.21.1.ppc64",
"product_id": "kernel-syms-3.0.101-108.21.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.21.1.ppc64",
"product": {
"name": "kernel-trace-3.0.101-108.21.1.ppc64",
"product_id": "kernel-trace-3.0.101-108.21.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.21.1.ppc64",
"product": {
"name": "kernel-trace-base-3.0.101-108.21.1.ppc64",
"product_id": "kernel-trace-base-3.0.101-108.21.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.21.1.ppc64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.21.1.ppc64",
"product_id": "kernel-trace-devel-3.0.101-108.21.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.21.1.s390x",
"product": {
"name": "kernel-default-3.0.101-108.21.1.s390x",
"product_id": "kernel-default-3.0.101-108.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.21.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-108.21.1.s390x",
"product_id": "kernel-default-base-3.0.101-108.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.21.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-108.21.1.s390x",
"product_id": "kernel-default-devel-3.0.101-108.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-108.21.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-108.21.1.s390x",
"product_id": "kernel-default-man-3.0.101-108.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.21.1.s390x",
"product": {
"name": "kernel-source-3.0.101-108.21.1.s390x",
"product_id": "kernel-source-3.0.101-108.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.21.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-108.21.1.s390x",
"product_id": "kernel-syms-3.0.101-108.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.21.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-108.21.1.s390x",
"product_id": "kernel-trace-3.0.101-108.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.21.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-108.21.1.s390x",
"product_id": "kernel-trace-base-3.0.101-108.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.21.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-108.21.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-108.21.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.21.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-108.21.1.x86_64",
"product_id": "kernel-default-3.0.101-108.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.21.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-108.21.1.x86_64",
"product_id": "kernel-default-base-3.0.101-108.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.21.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-108.21.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-108.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.21.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-108.21.1.x86_64",
"product_id": "kernel-ec2-3.0.101-108.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.21.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-108.21.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-108.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-108.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.21.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-108.21.1.x86_64",
"product_id": "kernel-source-3.0.101-108.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.21.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-108.21.1.x86_64",
"product_id": "kernel-syms-3.0.101-108.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.21.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-108.21.1.x86_64",
"product_id": "kernel-trace-3.0.101-108.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.21.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-108.21.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-108.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.21.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.21.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-108.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.21.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-108.21.1.x86_64",
"product_id": "kernel-xen-3.0.101-108.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.21.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-108.21.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-108.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.21.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-108.21.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-108.21.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-3.0.101-108.21.2.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
},
"product_reference": "kernel-docs-3.0.101-108.21.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-bigmem-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-base-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-devel-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-default-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-default-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-default-base-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-default-devel-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-pae-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-source-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-source-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-syms-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-syms-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-trace-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-trace-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-trace-base-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-xen-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-bigmem-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-base-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-devel-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-default-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-default-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-default-base-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-default-devel-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-pae-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-source-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-source-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-syms-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-syms-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-trace-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-trace-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-trace-base-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.21.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.21.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.21.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.21.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-xen-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-108.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-11600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11600"
}
],
"notes": [
{
"category": "general",
"text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11600",
"url": "https://www.suse.com/security/cve/CVE-2017-11600"
},
{
"category": "external",
"summary": "SUSE Bug 1050231 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1050231"
},
{
"category": "external",
"summary": "SUSE Bug 1096564 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1096564"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "important"
}
],
"title": "CVE-2017-11600"
},
{
"cve": "CVE-2017-13167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13167"
}
],
"notes": [
{
"category": "general",
"text": "An elevation of privilege vulnerability in the kernel sound timer. Product: Android. Versions: Android kernel. Android ID A-37240993.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13167",
"url": "https://www.suse.com/security/cve/CVE-2017-13167"
},
{
"category": "external",
"summary": "SUSE Bug 1072876 for CVE-2017-13167",
"url": "https://bugzilla.suse.com/1072876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "low"
}
],
"title": "CVE-2017-13167"
},
{
"cve": "CVE-2017-14106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14106"
}
],
"notes": [
{
"category": "general",
"text": "The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14106",
"url": "https://www.suse.com/security/cve/CVE-2017-14106"
},
{
"category": "external",
"summary": "SUSE Bug 1056982 for CVE-2017-14106",
"url": "https://bugzilla.suse.com/1056982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "moderate"
}
],
"title": "CVE-2017-14106"
},
{
"cve": "CVE-2017-15115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15115"
}
],
"notes": [
{
"category": "general",
"text": "The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15115",
"url": "https://www.suse.com/security/cve/CVE-2017-15115"
},
{
"category": "external",
"summary": "SUSE Bug 1068671 for CVE-2017-15115",
"url": "https://bugzilla.suse.com/1068671"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15115",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "moderate"
}
],
"title": "CVE-2017-15115"
},
{
"cve": "CVE-2017-15868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15868"
}
],
"notes": [
{
"category": "general",
"text": "The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel before 3.19 does not ensure that an l2cap socket is available, which allows local users to gain privileges via a crafted application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15868",
"url": "https://www.suse.com/security/cve/CVE-2017-15868"
},
{
"category": "external",
"summary": "SUSE Bug 1071470 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1071470"
},
{
"category": "external",
"summary": "SUSE Bug 1071471 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1071471"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "important"
}
],
"title": "CVE-2017-15868"
},
{
"cve": "CVE-2017-16534",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16534"
}
],
"notes": [
{
"category": "general",
"text": "The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16534",
"url": "https://www.suse.com/security/cve/CVE-2017-16534"
},
{
"category": "external",
"summary": "SUSE Bug 1066693 for CVE-2017-16534",
"url": "https://bugzilla.suse.com/1066693"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16534",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "moderate"
}
],
"title": "CVE-2017-16534"
},
{
"cve": "CVE-2017-16538",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16538"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16538",
"url": "https://www.suse.com/security/cve/CVE-2017-16538"
},
{
"category": "external",
"summary": "SUSE Bug 1066569 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1066569"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "moderate"
}
],
"title": "CVE-2017-16538"
},
{
"cve": "CVE-2017-16939",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16939"
}
],
"notes": [
{
"category": "general",
"text": "The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16939",
"url": "https://www.suse.com/security/cve/CVE-2017-16939"
},
{
"category": "external",
"summary": "SUSE Bug 1069702 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1069702"
},
{
"category": "external",
"summary": "SUSE Bug 1069708 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1069708"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1120260 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1120260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "moderate"
}
],
"title": "CVE-2017-16939"
},
{
"cve": "CVE-2017-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17450"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17450",
"url": "https://www.suse.com/security/cve/CVE-2017-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1071695 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "external",
"summary": "SUSE Bug 1074033 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1074033"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "moderate"
}
],
"title": "CVE-2017-17450"
},
{
"cve": "CVE-2017-17558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17558"
}
],
"notes": [
{
"category": "general",
"text": "The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17558",
"url": "https://www.suse.com/security/cve/CVE-2017-17558"
},
{
"category": "external",
"summary": "SUSE Bug 1072561 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1072561"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "moderate"
}
],
"title": "CVE-2017-17558"
},
{
"cve": "CVE-2017-17805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17805"
}
],
"notes": [
{
"category": "general",
"text": "The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17805",
"url": "https://www.suse.com/security/cve/CVE-2017-17805"
},
{
"category": "external",
"summary": "SUSE Bug 1073792 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "important"
}
],
"title": "CVE-2017-17805"
},
{
"cve": "CVE-2017-17806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17806"
}
],
"notes": [
{
"category": "general",
"text": "The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17806",
"url": "https://www.suse.com/security/cve/CVE-2017-17806"
},
{
"category": "external",
"summary": "SUSE Bug 1073874 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "low"
}
],
"title": "CVE-2017-17806"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-7472",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7472"
}
],
"notes": [
{
"category": "general",
"text": "The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7472",
"url": "https://www.suse.com/security/cve/CVE-2017-7472"
},
{
"category": "external",
"summary": "SUSE Bug 1034862 for CVE-2017-7472",
"url": "https://bugzilla.suse.com/1034862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "moderate"
}
],
"title": "CVE-2017-7472"
},
{
"cve": "CVE-2017-8824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8824"
}
],
"notes": [
{
"category": "general",
"text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8824",
"url": "https://www.suse.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "SUSE Bug 1070771 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "external",
"summary": "SUSE Bug 1076734 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1076734"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.21.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:51:57Z",
"details": "important"
}
],
"title": "CVE-2017-8824"
}
]
}
SUSE-SU-2018:0416-1
Vulnerability from csaf_suse - Published: 2018-02-09 15:27 - Updated: 2018-02-09 15:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.114 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).\n\n The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2017-15129: A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel The function get_net_ns_by_id() in net/core/net_namespace.c did not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely (bnc#1074839).\n- CVE-2017-17712: The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel has a race condition in inet-\u003ehdrincl that leads to uninitialized stack pointer usage; this allowed a local user to execute code and gain privileges (bnc#1073229).\n- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignored unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).\n- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a \u0027pointer leak (bnc#1073928).\n- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).\n- CVE-2018-1000004: In the Linux kernel a race condition vulnerability existed in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).\n- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).\n- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).\n\nThe following non-security bugs were fixed:\n\n- 8021q: fix a memory leak for VLAN 0 device (bnc#1012382).\n- ACPI / scan: Prefer devices without _HID/_CID for _ADR matching (bnc#1012382).\n- ARC: uaccess: dont use \u0027l\u0027 gcc inline asm constraint modifier (bnc#1012382).\n- Fix EX_SIZE. We do not have the patches that shave off parts of the exception data.\n- Fix build error in vma.c (bnc#1012382).\n- Fix mishandling of cases with MSR not being present (writing to MSR even though _state == -1).\n- Fix return value from ib[rs|pb]_enabled()\n- Input: trackpoint - force 3 buttons if 0 button is reported (bnc#1012382).\n- KVM: s390: Enable all facility bits that are known good for passthrough (bsc#1076806).\n- Kabi: Keep KVM stable after enable s390 wire up bpb feature (bsc#1076806).\n- Move RFI sysfs to a separate patch\n- Move the RFI debug code into separate patch.\n- Re-enable fixup detection by CPU type in case hypervisor call fails.\n- Revert \u0027Bluetooth: btusb: driver to enable the usb-wakeup feature\u0027 (bnc#1012382).\n- Revert \u0027Re-enable fixup detection by CPU type in case hypervisor call fails.\u0027 The firmware update is required for the existing instructions to also do the cache flush.\n- Revert \u0027arm64: alternatives: add enable parameter to conditional asm macros\u0027 (bsc#1068032).\n- Revert \u0027drm/armada: Fix compile fail\u0027 (bnc#1012382).\n- Revert \u0027drm/radeon: dont switch vt on suspend\u0027 (bnc#1012382).\n- Revert \u0027ipsec: Fix aborted xfrm policy dump crash\u0027 (kabi).\n- Revert \u0027kaiser: vmstat show NR_KAISERTABLE as nr_overhead\u0027 (kabi).\n- Revert \u0027lib/genalloc.c: make the avail variable an atomic_long_t\u0027 (kabi).\n- Revert \u0027module: Add retpoline tag to VERMAGIC\u0027 (bnc#1012382 kabi).\n- Revert \u0027netlink: add a start callback for starting a netlink dump\u0027 (kabi).\n- Revert \u0027ocfs2: should wait dio before inode lock in ocfs2_setattr()\u0027 (bnc#1012382).\n- Revert \u0027s390/kbuild: enable modversions for symbols exported from asm\u0027 (bnc#1012382).\n- Revert \u0027sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks\u0027 (kabi).\n- Revert \u0027scsi: libsas: align sata_device\u0027s rps_resp on a cacheline\u0027 (kabi).\n- Revert \u0027spi: SPI_FSL_DSPI should depend on HAS_DMA\u0027 (bnc#1012382).\n- Revert \u0027userfaultfd: selftest: vm: allow to build in vm/ directory\u0027 (bnc#1012382).\n- Revert \u0027x86/efi: Build our own page table structures\u0027 (bnc#1012382).\n- Revert \u0027x86/efi: Hoist page table switching code into efi_call_virt()\u0027 (bnc#1012382).\n- Revert \u0027x86/mm/pat: Ensure cpa-\u003epfn only contains page frame numbers\u0027 (bnc#1012382).\n- SMB2: Fix share type handling (bnc#1074392).\n- Set supported_modules_check 1 (bsc#1072163).\n- Update patches.suse/powerpc-Secure-memory-rfi-flush-SLE12SP3.patch (bsc#1068032, bsc#1075087).\n- af_key: fix buffer overread in parse_exthdrs() (bnc#1012382).\n- af_key: fix buffer overread in verify_address_len() (bnc#1012382).\n- afs: Adjust mode bits processing (bnc#1012382).\n- afs: Connect up the CB.ProbeUuid (bnc#1012382).\n- afs: Fix afs_kill_pages() (bnc#1012382).\n- afs: Fix missing put_page() (bnc#1012382).\n- afs: Fix page leak in afs_write_begin() (bnc#1012382).\n- afs: Fix the maths in afs_fs_store_data() (bnc#1012382).\n- afs: Flush outstanding writes when an fd is closed (bnc#1012382).\n- afs: Migrate vlocation fields to 64-bit (bnc#1012382).\n- afs: Populate and use client modification time (bnc#1012382).\n- afs: Populate group ID from vnode status (bnc#1012382).\n- afs: Prevent callback expiry timer overflow (bnc#1012382).\n- alpha: fix build failures (bnc#1012382).\n- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1031717).\n- alsa: aloop: Fix racy hw constraints adjustment (bsc#1031717).\n- alsa: aloop: Release cable upon open error path (bsc#1031717).\n- alsa: hda - Add HP ZBook 15u G3 Conexant CX20724 GPIO mute leds (bsc#1031717).\n- alsa: hda - Add MIC_NO_PRESENCE fixup for 2 HP machines (bsc#1031717).\n- alsa: hda - Add mute led support for HP EliteBook 840 G3 (bsc#1031717).\n- alsa: hda - Add mute led support for HP ProBook 440 G4 (bsc#1031717).\n- alsa: hda - Apply headphone noise quirk for another Dell XPS 13 variant (bsc#1031717).\n- alsa: hda - Apply the existing quirk to iMac 14,1 (bsc#1031717).\n- alsa: hda - Fix click noises on Samsung Ativ Book 8 (bsc#1031717).\n- alsa: hda - Fix headset microphone detection for ASUS N551 and N751 (bsc#1031717).\n- alsa: hda - Fix mic regression by ASRock mobo fixup (bsc#1031717).\n- alsa: hda - Fix missing COEF init for ALC225/295/299 (bsc#1031717).\n- alsa: hda - Fix surround output pins for ASRock B150M mobo (bsc#1031717).\n- alsa: hda - On-board speaker fixup on ACER Veriton (bsc#1031717).\n- alsa: hda - Skip Realtek SKU check for Lenovo machines (bsc#1031717).\n- alsa: hda - add support for docking station for HP 820 G2 (bsc#1031717).\n- alsa: hda - add support for docking station for HP 840 G3 (bsc#1031717).\n- alsa: hda - change the location for one mic on a Lenovo machine (bsc#1031717).\n- alsa: hda - fix headset mic detection issue on a Dell machine (bsc#1031717).\n- alsa: hda - fix headset mic problem for Dell machines with alc274 (bsc#1031717).\n- alsa: hda/realtek - ALC891 headset mode for Dell (bsc#1031717).\n- alsa: hda/realtek - Add ALC256 HP depop function (bsc#1031717).\n- alsa: hda/realtek - Add default procedure for suspend and resume state (bsc#1031717).\n- alsa: hda/realtek - Add support for ALC1220 (bsc#1031717).\n- alsa: hda/realtek - Add support for Acer Aspire E5-475 headset mic (bsc#1031717).\n- alsa: hda/realtek - Add support for headset MIC for ALC622 (bsc#1031717).\n- alsa: hda/realtek - Enable jack detection function for Intel ALC700 (bsc#1031717).\n- alsa: hda/realtek - Fix ALC275 no sound issue (bsc#1031717).\n- alsa: hda/realtek - Fix Dell AIO LineOut issue (bsc#1031717).\n- alsa: hda/realtek - Fix headset and mic on several Asus laptops with ALC256 (bsc#1031717).\n- alsa: hda/realtek - Fix headset mic and speaker on Asus X441SA/X441UV (bsc#1031717).\n- alsa: hda/realtek - Fix headset mic on several Asus laptops with ALC255 (bsc#1031717).\n- alsa: hda/realtek - Fix pincfg for Dell XPS 13 9370 (bsc#1031717).\n- alsa: hda/realtek - Fix speaker support for Asus AiO ZN270IE (bsc#1031717).\n- alsa: hda/realtek - Fix typo of pincfg for Dell quirk (bsc#1031717).\n- alsa: hda/realtek - New codec device ID for ALC1220 (bsc#1031717).\n- alsa: hda/realtek - New codec support for ALC257 (bsc#1031717).\n- alsa: hda/realtek - New codec support of ALC1220 (bsc#1031717).\n- alsa: hda/realtek - New codecs support for ALC215/ALC285/ALC289 (bsc#1031717).\n- alsa: hda/realtek - No loopback on ALC225/ALC295 codec (bsc#1031717).\n- alsa: hda/realtek - Remove ALC285 device ID (bsc#1031717).\n- alsa: hda/realtek - Support Dell headset mode for ALC3271 (bsc#1031717).\n- alsa: hda/realtek - Support headset mode for ALC234/ALC274/ALC294 (bsc#1031717).\n- alsa: hda/realtek - There is no loopback mixer in the ALC234/274/294 (bsc#1031717).\n- alsa: hda/realtek - Update headset mode for ALC225 (bsc#1031717).\n- alsa: hda/realtek - Update headset mode for ALC298 (bsc#1031717).\n- alsa: hda/realtek - change the location for one of two front microphones (bsc#1031717).\n- alsa: hda/realtek - fix headset mic detection for MSI MS-B120 (bsc#1031717).\n- alsa: hda: Drop useless WARN_ON() (bsc#1031717).\n- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1031717).\n- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1031717).\n- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1031717).\n- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1031717).\n- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1031717).\n- alsa: pcm: prevent UAF in snd_pcm_info (bsc#1031717).\n- alsa: rawmidi: Avoid racy info ioctl via ctl device (bsc#1031717).\n- alsa: seq: Remove spurious WARN_ON() at timer check (bsc#1031717).\n- alsa: usb-audio: Add check return value for usb_string() (bsc#1031717).\n- alsa: usb-audio: Fix out-of-bound error (bsc#1031717).\n- alsa: usb-audio: Fix the missing ctl name suffix at parsing SU (bsc#1031717).\n- arm-ccn: perf: Prevent module unload while PMU is in use (bnc#1012382).\n- arm64/cpufeature: do not use mutex in bringup path (bsc#1068032).\n- arm64: Add hypervisor safe helper for checking constant capabilities (bsc#1068032).\n- arm64: Add macros to read/write system registers (bsc#1068032).\n- arm64: Add skeleton to harden the branch predictor against aliasing attacks (bsc#1068032).\n- arm64: Add trace_hardirqs_off annotation in ret_to_user (bsc#1068032).\n- arm64: Disable TTBR0_EL1 during normal kernel execution (bsc#1068032).\n- arm64: Disable kpti for non broadcast TLB HW (bsc#1068032).\n- arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: Factor out PAN enabling/disabling into separate uaccess_* macros (bsc#1068032).\n- arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm macro (bsc#1068032).\n- arm64: Fix circular include of asm/lse.h through linux/jump_label.h (bsc#1068032).\n- arm64: Fix compilation (bsc#1068032).\n- arm64: Handle el1 synchronous instruction aborts cleanly (bsc#1068032).\n- arm64: Implement branch predictor hardening for affected Cortex-A CPUs (bsc#1068032).\n- arm64: Initialise high_memory global variable earlier (bnc#1012382).\n- arm64: Introduce uaccess_{disable,enable} functionality based on TTBR0_EL1 (bsc#1068032).\n- arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 (bsc#1068032).\n- arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry (bsc#1068032).\n- arm64: Mask all exceptions during kernel_exit (bsc#1068032).\n- arm64: Move BP hardening to check_and_switch_context (bsc#1068032).\n- arm64: Move post_ttbr_update_workaround to C code (bsc#1068032).\n- arm64: Move the async/fiq helpers to explicitly set process context flags (bsc#1068032).\n- arm64: SW PAN: Point saved ttbr0 at the zero page when switching to init_mm (bsc#1068032).\n- arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb (bsc#1068032).\n- arm64: Store struct thread_info in sp_el0 (bsc#1068032).\n- arm64: Take into account ID_AA64PFR0_EL1.CSV3 (bsc#1068032).\n- arm64: Use static keys for CPU features (bsc#1068032).\n- arm64: add macro to extract ESR_ELx.EC (bsc#1068032).\n- arm64: alternative: add auto-nop infrastructure (bsc#1068032).\n- arm64: barriers: introduce nops and __nops macros for NOP sequences (bsc#1068032).\n- arm64: cpu_errata: Allow an erratum to be match for all revisions of a core (bsc#1068032).\n- arm64: cpufeature: Add scope for capability check (bsc#1068032).\n- arm64: cpufeature: Pass capability structure to -\u003eenable callback (bsc#1068032).\n- arm64: debug: remove unused local_dbg_{enable, disable} macros (bsc#1068032).\n- arm64: do not pull uaccess.h into *.S (bsc#1068032).\n- arm64: entry.S convert el0_sync (bsc#1068032).\n- arm64: entry.S: Remove disable_dbg (bsc#1068032).\n- arm64: entry.S: convert el1_sync (bsc#1068032).\n- arm64: entry.S: convert elX_irq (bsc#1068032).\n- arm64: entry.S: move SError handling into a C function for future expansion (bsc#1068032).\n- arm64: entry: Add exception trampoline page for exceptions from EL0 (bsc#1068032).\n- arm64: entry: Add fake CPU feature for unmapping the kernel at EL0 (bsc#1068032).\n- arm64: entry: Explicitly pass exception level to kernel_ventry macro (bsc#1068032).\n- arm64: entry: Hook up entry trampoline to exception vectors (bsc#1068032).\n- arm64: entry: remove pointless SPSR mode check (bsc#1068032).\n- arm64: explicitly mask all exceptions (bsc#1068032).\n- arm64: factor out PAGE_* and CONT_* definitions (bsc#1068032).\n- arm64: factor out entry stack manipulation (bsc#1068032).\n- arm64: factor work_pending state machine to C (bsc#1068032).\n- arm64: fpsimd: Prevent registers leaking from dead tasks (bnc#1012382).\n- arm64: head.S: get rid of x25 and x26 with \u0027global\u0027 scope (bsc#1068032).\n- arm64: introduce an order for exceptions (bsc#1068032).\n- arm64: introduce mov_q macro to move a constant into a 64-bit register (bsc#1068032).\n- arm64: kaslr: Put kernel vectors address in separate data page (bsc#1068032).\n- arm64: kill ESR_LNX_EXEC (bsc#1068032).\n- arm64: kpti: Fix the interaction between ASID switching and software PAN (bsc#1068032).\n- arm64: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bnc#1012382).\n- arm64: kvm: Survive unknown traps from guests (bnc#1012382).\n- arm64: kvm: Use per-CPU vector when BP hardening is enabled (bsc#1068032).\n- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).\n- arm64: mm: Add arm64_kernel_unmapped_at_el0 helper (bsc#1068032).\n- arm64: mm: Allocate ASIDs in pairs (bsc#1068032).\n- arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR (bsc#1068032).\n- arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI (bsc#1068032).\n- arm64: mm: Map entry trampoline into trampoline and kernel page tables (bsc#1068032).\n- arm64: mm: Move ASID from TTBR0 to TTBR1 (bsc#1068032).\n- arm64: mm: Rename post_ttbr0_update_workaround (bsc#1068032).\n- arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: mm: Use non-global mappings for kernel space (bsc#1068032).\n- arm64: mm: hardcode rodata=true (bsc#1068032).\n- arm64: swp emulation: bound LL/SC retries before rescheduling (bsc#1068032).\n- arm64: sysreg: Fix unprotected macro argmuent in write_sysreg (bsc#1068032).\n- arm64: sysreg: allow write_sysreg to use XZR (bsc#1068032).\n- arm64: tlbflush.h: add __tlbi() macro (bsc#1068032).\n- arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks (bsc#1068032).\n- arm64: use RET instruction for exiting the trampoline (bsc#1068032).\n- arm64: use alternative auto-nop (bsc#1068032).\n- arm64: xen: Enable user access before a privcmd hvc call (bsc#1068032).\n- arm: BUG if jumping to usermode address in kernel mode (bnc#1012382).\n- arm: OMAP1: DMA: Correct the number of logical channels (bnc#1012382).\n- arm: OMAP2+: Fix device node reference counts (bnc#1012382).\n- arm: OMAP2+: Release device node after it is no longer needed (bnc#1012382).\n- arm: OMAP2+: gpmc-onenand: propagate error on initialization failure (bnc#1012382).\n- arm: avoid faulting on qemu (bnc#1012382).\n- arm: dma-mapping: disallow dma_get_sgtable() for non-kernel managed memory (bnc#1012382).\n- arm: dts: am335x-evmsk: adjust mmc2 param to allow suspend (bnc#1012382).\n- arm: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7 (bnc#1012382).\n- arm: dts: omap3: logicpd-torpedo-37xx-devkit: Fix MMC1 cd-gpio (bnc#1012382).\n- arm: dts: ti: fix PCI bus dtc warnings (bnc#1012382).\n- arm: kprobes: Align stack to 8-bytes in test code (bnc#1012382).\n- arm: kprobes: Fix the return address of multiple kretprobes (bnc#1012382).\n- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).\n- arm: kvm: Survive unknown traps from guests (bnc#1012382).\n- asm-prototypes: Clear any CPP defines before declaring the functions (git-fixes).\n- asn.1: check for error from ASN1_OP_END__ACT actions (bnc#1012382).\n- asn.1: fix out-of-bounds read when parsing indefinite length item (bnc#1012382).\n- asoc: fsl_ssi: AC\u002797 ops need regmap, clock and cleaning up on failure (bsc#1031717).\n- asoc: twl4030: fix child-node lookup (bsc#1031717).\n- asoc: wm_adsp: Fix validation of firmware and coeff lengths (bsc#1031717).\n- ath9k: fix tx99 potential info leak (bnc#1012382).\n- atm: horizon: Fix irq release error (bnc#1012382).\n- audit: ensure that \u0027audit=1\u0027 actually enables audit for PID 1 (bnc#1012382).\n- axonram: Fix gendisk handling (bnc#1012382).\n- backlight: pwm_bl: Fix overflow condition (bnc#1012382).\n- bcache.txt: standardize document format (bsc#1076110).\n- bcache: Avoid nested function definition (bsc#1076110).\n- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).\n- bcache: Fix building error on MIPS (bnc#1012382).\n- bcache: Remove deprecated create_workqueue (bsc#1076110).\n- bcache: Remove redundant block_size assignment (bsc#1076110).\n- bcache: Remove redundant parameter for cache_alloc() (bsc#1076110).\n- bcache: Remove redundant set_capacity (bsc#1076110).\n- bcache: Update continue_at() documentation (bsc#1076110).\n- bcache: add a comment in journal bucket reading (bsc#1076110).\n- bcache: check return value of register_shrinker (bsc#1076110).\n- bcache: debug: avoid accessing .bi_io_vec directly (bsc#1076110).\n- bcache: do not write back data if reading it failed (bsc#1076110).\n- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).\n- bcache: documentation updates and corrections (bsc#1076110).\n- bcache: explicitly destroy mutex while exiting (bnc#1012382).\n- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).\n- bcache: fix sequential large write IO bypass (bsc#1076110).\n- bcache: fix wrong cache_misses statistics (bnc#1012382).\n- bcache: gc does not work when triggering by manual command (bsc#1076110, bsc#1038078).\n- bcache: implement PI controller for writeback rate (bsc#1076110).\n- bcache: increase the number of open buckets (bsc#1076110).\n- bcache: only permit to recovery read error when cache device is clean (bnc#1012382 bsc#1043652).\n- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110).\n- bcache: pr_err: more meaningful error message when nr_stripes is invalid (bsc#1076110).\n- bcache: rearrange writeback main thread ratelimit (bsc#1076110).\n- bcache: recover data from backing when data is clean (bnc#1012382 bsc#1043652).\n- bcache: register_bcache(): call blkdev_put() when cache_alloc() fails (bsc#1076110).\n- bcache: remove unused parameter (bsc#1076110).\n- bcache: rewrite multiple partitions support (bsc#1076110, bsc#1038085, bsc#1019784).\n- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).\n- bcache: silence static checker warning (bsc#1076110).\n- bcache: smooth writeback rate control (bsc#1076110).\n- bcache: switch to using blk_queue_write_cache() (bsc#1076110).\n- bcache: update bio-\u003ebi_opf bypass/writeback REQ_ flag hints (bsc#1076110).\n- bcache: update bucket_in_use in real time (bsc#1076110).\n- bcache: update document info (bsc#1076110).\n- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).\n- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).\n- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).\n- bcache: writeback rate shouldn\u0027t artifically clamp (bsc#1076110).\n- be2net: restore properly promisc mode after queues reconfiguration (bsc#963844).\n- block: export bio_free_pages to other modules (bsc#1076110).\n- block: wake up all tasks blocked in get_request() (bnc#1012382).\n- bluetooth: btusb: driver to enable the usb-wakeup feature (bnc#1012382).\n- bnx2x: do not rollback VF MAC/VLAN filters we did not configure (bnc#1012382).\n- bnx2x: fix possible overrun of VFPF multicast addresses array (bnc#1012382).\n- bnx2x: prevent crash when accessing PTP with interface down (bnc#1012382).\n- btrfs: account for pinned bytes in should_alloc_chunk (bsc#1066842).\n- btrfs: add missing memset while reading compressed inline extents (bnc#1012382).\n- btrfs: clear space cache inode generation always (bnc#1012382).\n- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).\n- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).\n- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: gs_usb: fix return value of the \u0027set_bittiming\u0027 callback (bnc#1012382).\n- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bnc#1012382).\n- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: kvaser_usb: free buf in error paths (bnc#1012382).\n- can: kvaser_usb: ratelimit errors if incomplete messages are received (bnc#1012382).\n- can: peak: fix potential bug in packet fragmentation (bnc#1012382).\n- can: ti_hecc: Fix napi poll return value for repoll (bnc#1012382).\n- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- cdc-acm: apply quirk for card reader (bsc#1060279).\n- cdrom: factor out common open_for_* code (bsc#1048585).\n- cdrom: wait for tray to close (bsc#1048585).\n- ceph: drop negative child dentries before try pruning inode\u0027s alias (bnc#1012382).\n- ceph: more accurate statfs (bsc#1077068).\n- clk: imx6: refine hdmi_isfr\u0027s parent to make HDMI work on i.MX6 SoCs w/o VPU (bnc#1012382).\n- clk: mediatek: add the option for determining PLL source clock (bnc#1012382).\n- clk: tegra: Fix cclk_lp divisor register (bnc#1012382).\n- cpuidle: Validate cpu_dev in cpuidle_add_sysfs() (bnc#1012382).\n- cpuidle: fix broadcast control when broadcast can not be entered (bnc#1012382).\n- cpuidle: powernv: Pass correct drv-\u003ecpumask for registration (bnc#1012382).\n- crypto: algapi - fix NULL dereference in crypto_remove_spawns() (bnc#1012382).\n- crypto: chacha20poly1305 - validate the digest size (bnc#1012382).\n- crypto: crypto4xx - increase context and scatter ring buffer elements (bnc#1012382).\n- crypto: deadlock between crypto_alg_sem/rtnl_mutex/genl_mutex (bnc#1012382).\n- crypto: mcryptd - protect the per-CPU queue with a lock (bnc#1012382).\n- crypto: n2 - cure use after free (bnc#1012382).\n- crypto: pcrypt - fix freeing pcrypt instances (bnc#1012382).\n- crypto: s5p-sss - Fix completing crypto request in IRQ handler (bnc#1012382).\n- crypto: tcrypt - fix buffer lengths in test_aead_speed() (bnc#1012382).\n- cxl: Check if vphb exists before iterating over AFU devices (bsc#1066223).\n- dax: Pass detailed error code from __dax_fault() (bsc#1072484).\n- dccp: don\u0027t restart ccid2_hc_tx_rto_expire() if sk in closed state (bnc#1012382).\n- delay: add poll_event_interruptible (bsc#1048585).\n- dm btree: fix serious bug in btree_split_beneath() (bnc#1012382).\n- dm bufio: fix shrinker scans when (nr_to_scan \u003c retain_target) (bnc#1012382).\n- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bnc#1012382).\n- dmaengine: Fix array index out of bounds warning in __get_unmap_pool() (bnc#1012382).\n- dmaengine: dmatest: move callback wait queue to thread context (bnc#1012382).\n- dmaengine: pl330: fix double lock (bnc#1012382).\n- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bnc#1012382).\n- drivers/firmware: Expose psci_get_version through psci_ops structure (bsc#1068032).\n- drivers/md/bcache/util.h: remove duplicate inclusion of blkdev.h (bsc#1076110).\n- drivers: base: cacheinfo: fix boot error message when acpi is enabled (bnc#1012382).\n- drivers: base: cacheinfo: fix x86 with CONFIG_OF enabled (bnc#1012382).\n- drivers: net: xgene: Fix hardware checksum setting (bsc#1078526).\n- drm/amd/amdgpu: fix console deadlock if late init failed (bnc#1012382).\n- drm/exynos/decon5433: set STANDALONE_UPDATE_F on output enablement (bnc#1012382).\n- drm/exynos: gem: Drop NONCONTIG flag for buffers allocated without IOMMU (bnc#1012382).\n- drm/omap: fix dmabuf mmap for dma_alloc\u0027ed buffers (bnc#1012382).\n- drm/radeon/si: add dpm quirk for Oland (bnc#1012382).\n- drm/radeon: fix atombios on big endian (bnc#1012382).\n- drm/radeon: reinstate oland workaround for sclk (bnc#1012382).\n- drm/vmwgfx: Potential off by one in vmw_view_add() (bnc#1012382).\n- drm: extra printk() wrapper macros (bnc#1012382).\n- dynamic-debug-howto: fix optional/omitted ending line number to be LARGE instead of 0 (bnc#1012382).\n- edac, i5000, i5400: Fix definition of NRECMEMB register (bnc#1012382).\n- edac, i5000, i5400: Fix use of MTR_DRAM_WIDTH macro (bnc#1012382).\n- edac, sb_edac: Fix missing break in switch (bnc#1012382).\n- eeprom: at24: check at24_read/write arguments (bnc#1012382).\n- efi/esrt: Cleanup bad memory map log messages (bnc#1012382).\n- efi: Move some sysfs files to be read-only by root (bnc#1012382).\n- eventpoll.h: add missing epoll event masks (bnc#1012382).\n- ext4: Fix ENOSPC handling in DAX page fault handle (bsc#1072484).\n- ext4: fix crash when a directory\u0027s i_size is too small (bnc#1012382).\n- ext4: fix fdatasync(2) after fallocate(2) operation (bnc#1012382).\n- fbdev: controlfb: Add missing modes to fix out of bounds access (bnc#1012382).\n- fjes: Fix wrong netdevice feature flags (bnc#1012382).\n- flow_dissector: properly cap thoff field (bnc#1012382).\n- fm10k: ensure we process SM mbx when processing VF mbx (bnc#1012382).\n- fork: clear thread stack upon allocation (bsc#1077560). Conflicts: \tseries.conf\n- fscache: Fix the default for fscache_maybe_release_page() (bnc#1012382).\n- futex: Prevent overflow by strengthen input validation (bnc#1012382).\n- gcov: disable for COMPILE_TEST (bnc#1012382).\n- gfs2: Take inode off order_write list when setting jdata flag (bnc#1012382).\n- gpio: altera: Use handle_level_irq when configured as a level_high (bnc#1012382).\n- hid: chicony: Add support for another ASUS Zen AiO keyboard (bnc#1012382).\n- hid: xinmo: fix for out of range for THT 2P arcade controller (bnc#1012382).\n- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1012382).\n- hv: kvp: Avoid reading past allocated blocks from KVP file (bnc#1012382).\n- hwmon: (asus_atk0110) fix uninitialized data access (bnc#1012382).\n- i40e: Do not enable NAPI on q_vectors that have no rings (bnc#1012382).\n- ib/hfi1: Correct defered count after processing qp_wait_list (git-fixes).\n- ib/hfi1: Fix rnr_timer addition (git-fixes).\n- ib/hfi1: Handle kzalloc failure in init_pervl_scs (git-fixes).\n- ib/hfi1: Move iowait_init() to priv allocate (git-fixes).\n- ib/hfi1: Prevent kernel QP post send hard lockups (git-fixes).\n- ib/hfi1: Reset QSFP on every run through channel tuning (git-fixes).\n- ib/ipoib: Fix lockdep issue found on ipoib_ib_dev_heavy_flush (git-fixes).\n- ib/ipoib: Grab rtnl lock on heavy flush when calling ndo_open/stop (bnc#1012382).\n- ib/mlx4: Increase maximal message size under UD QP (bnc#1012382).\n- ib/mlx5: Assign send CQ and recv CQ of UMR QP (bnc#1012382).\n- ib/qib: Remove qpt_mask global (git-fixes).\n- ib/rdmavt: restore IRQs on error path in rvt_create_ah() (git-fixes).\n- ib/srpt: Disable RDMA access by the initiator (bnc#1012382).\n- ibmvnic: Allocate and request vpd in init_resources (bsc#1076872).\n- ibmvnic: Do not handle RX interrupts when not up (bsc#1075066).\n- ibmvnic: Fix IP offload control buffer (bsc#1076899).\n- ibmvnic: Fix IPv6 packet descriptors (bsc#1076899).\n- ibmvnic: Fix pending MAC address changes (bsc#1075627).\n- ibmvnic: Modify buffer size and number of queues on failover (bsc#1076872).\n- ibmvnic: Revert to previous mtu when unsupported value requested (bsc#1076872).\n- ibmvnic: Wait for device response when changing MAC (bsc#1078681).\n- igb: check memory allocation failure (bnc#1012382).\n- ima: fix hash algorithm initialization (bnc#1012382).\n- inet: frag: release spinlock before calling icmp_send() (bnc#1012382).\n- input: 88pm860x-ts - fix child-node lookup (bnc#1012382).\n- input: elantech - add new icbody type 15 (bnc#1012382).\n- input: i8042 - add TUXEDO BU1406 (N24_25BU) to the nomux list (bnc#1012382).\n- input: twl4030-vibra - fix sibling-node lookup (bnc#1012382).\n- input: twl6040-vibra - fix DT node memory management (bnc#1012382).\n- input: twl6040-vibra - fix child-node lookup (bnc#1012382).\n- intel_th: pci: Add Gemini Lake support (bnc#1012382).\n- iommu/arm-smmu-v3: Do not free page table ops twice (bnc#1012382).\n- iommu/vt-d: Fix scatterlist offset handling (bnc#1012382).\n- ip6_tunnel: disable dst caching if tunnel is dual-stack (bnc#1012382).\n- ipmi: Stop timers before cleaning up the module (bnc#1012382).\n- ipv4: Fix use-after-free when flushing FIB tables (bnc#1012382).\n- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (bnc#1012382).\n- ipv4: igmp: guard against silly MTU values (bnc#1012382).\n- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (bnc#1012382).\n- ipv6: fix possible mem leaks in ipv6_make_skb() (bnc#1012382).\n- ipv6: fix udpv6 sendmsg crash caused by too small MTU (bnc#1012382).\n- ipv6: ip6_make_skb() needs to clear cork.base.dst (git-fixes).\n- ipv6: mcast: better catch silly mtu values (bnc#1012382).\n- ipv6: reorder icmpv6_init() and ip6_mr_init() (bnc#1012382).\n- ipvlan: fix ipv6 outbound device (bnc#1012382).\n- ipvlan: remove excessive packet scrubbing (bsc#1070799).\n- irda: vlsi_ir: fix check for DMA mapping errors (bnc#1012382).\n- irqchip/crossbar: Fix incorrect type of register size (bnc#1012382).\n- iscsi-target: Make TASK_REASSIGN use proper se_cmd-\u003ecmd_kref (bnc#1012382).\n- iscsi-target: fix memory leak in lio_target_tiqn_addtpg() (bnc#1012382).\n- isdn: kcapi: avoid uninitialized data (bnc#1012382).\n- iw_cxgb4: Only validate the MSN for successful completions (bnc#1012382).\n- ixgbe: fix use of uninitialized padding (bnc#1012382).\n- jump_label: Invoke jump_label_test() via early_initcall() (bnc#1012382).\n- jump_label: Make it possible for arches to invoke jump_label_init() earlier (bsc#1068032).\n- jump_labels: Allow array initialisers (bsc#1068032).\n- kABI: protect struct bpf_map (kabi).\n- kABI: protect struct ipv6_pinfo (kabi).\n- kABI: protect struct t10_alua_tg_pt_gp (kabi).\n- kabi fix for new hash_cred function (bsc#1012917).\n- kabi/severities: do not care about stuff_RSB\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382).\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382).\n- kbuild: add \u0027-fno-stack-check\u0027 to kernel build options (bnc#1012382).\n- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).\n- kbuild: pkg: use --transform option to prefix paths in tar (bnc#1012382).\n- kdb: Fix handling of kallsyms_symbol_next() return value (bnc#1012382).\n- kernel/acct.c: fix the acct-\u003eneedcheck check in check_free_space() (bnc#1012382).\n- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals (bnc#1012382).\n- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL (bnc#1012382).\n- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() (bnc#1012382).\n- kernel: make groups_sort calling a responsibility group_info allocators (bnc#1012382).\n- keys: add missing permission check for request_key() destination (bnc#1012382).\n- kprobes/x86: Disable preemption in ftrace-based jprobes (bnc#1012382).\n- kpti: Rename to PAGE_TABLE_ISOLATION (bnc#1012382).\n- kpti: Report when enabled (bnc#1012382).\n- kvm: Fix stack-out-of-bounds read in write_mmio (bnc#1012382).\n- kvm: VMX: Fix enable VPID conditions (bnc#1012382).\n- kvm: VMX: remove I/O port 0x80 bypass on Intel hosts (bnc#1012382).\n- kvm: X86: Fix load RFLAGS w/o the fixed bit (bnc#1012382).\n- kvm: arm/arm64: Fix occasional warning from the timer work function (bnc#1012382 bsc#988524).\n- kvm: nVMX: VMCLEAR should not cause the vCPU to shut down (bnc#1012382).\n- kvm: nVMX: reset nested_run_pending if the vCPU is going to be reset (bnc#1012382).\n- kvm: pci-assign: do not map smm memory slot pages in vt-d page tables (bnc#1012382).\n- kvm: s390: wire up bpb feature (bsc#1076806).\n- kvm: vmx: Scrub hardware GPRs at VM-exit (bnc#1012382).\n- kvm: x86: Add memory barrier on vmcs field lookup (bnc#1012382).\n- kvm: x86: Exit to user-mode on #UD intercept when emulator requires (bnc#1012382).\n- kvm: x86: correct async page present tracepoint (bnc#1012382).\n- kvm: x86: fix RSM when PCID is non-zero (bnc#1012382).\n- kvm: x86: inject exceptions produced by x86_decode_insn (bnc#1012382).\n- kvm: x86: pvclock: Handle first-time write to pvclock-page contains random junk (bnc#1012382).\n- l2tp: cleanup l2tp_tunnel_delete calls (bnc#1012382).\n- lan78xx: Fix failure in USB Full Speed (bnc#1012382).\n- lib/genalloc.c: make the avail variable an atomic_long_t (bnc#1012382).\n- libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (bnc#1012382).\n- libata: drop WARN from protocol error in ata_sff_qc_issue() (bnc#1012382).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bnc#1012382).\n- md-cluster: free md_cluster_info if node leave cluster (bnc#1012382).\n- media: dvb: i2c transfers over usb cannot be done from stack (bnc#1012382).\n- mfd: cros ec: spi: Do not send first message too soon (bnc#1012382).\n- mfd: twl4030-audio: Fix sibling-node lookup (bnc#1012382).\n- mfd: twl6040: Fix child-node lookup (bnc#1012382).\n- mlxsw: reg: Fix SPVM max record count (bnc#1012382).\n- mlxsw: reg: Fix SPVMLR max record count (bnc#1012382).\n- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1012382).\n- mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP (bnc#1012382).\n- mm: Handle 0 flags in _calc_vm_trans() macro (bnc#1012382).\n- mm: Introduce lm_alias (bsc#1068032).\n- mm: avoid returning VM_FAULT_RETRY from -\u003epage_mkwrite handlers (bnc#1012382).\n- mm: drop unused pmdp_huge_get_and_clear_notify() (bnc#1012382).\n- mmc: core: Do not leave the block driver in a suspended state (bnc#1012382).\n- mmc: mediatek: Fixed bug where clock frequency could be set wrong (bnc#1012382).\n- module: set __jump_table alignment to 8 (bnc#1012382).\n- more bio_map_user_iov() leak fixes (bnc#1012382).\n- mtd: nand: Fix writing mtdoops to nand flash (bnc#1012382).\n- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) (bnc#1012382).\n- net/appletalk: Fix kernel memory disclosure (bnc#1012382).\n- net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y (bnc#1012382).\n- net/packet: fix a race in packet_bind() and packet_notifier() (bnc#1012382).\n- net: Allow neigh contructor functions ability to modify the primary_key (bnc#1012382).\n- net: Do not allow negative values for busy_read and busy_poll sysctl interfaces (bnc#1012382).\n- net: Fix double free and memory corruption in get_net_ns_by_id() (bnc#1012382).\n- net: Resend IGMP memberships upon peer notification (bnc#1012382).\n- net: bcmgenet: Power up the internal PHY before probing the MII (bnc#1012382).\n- net: bcmgenet: correct MIB access of UniMAC RUNT counters (bnc#1012382).\n- net: bcmgenet: correct the RBUF_OVFL_CNT and RBUF_ERR_CNT MIB values (bnc#1012382).\n- net: bcmgenet: power down internal phy if open or resume fails (bnc#1012382).\n- net: bcmgenet: reserved phy revisions must be checked first (bnc#1012382).\n- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks (bnc#1012382).\n- net: core: fix module type in sock_diag_bind (bnc#1012382).\n- net: fec: fix multicast filtering hardware setup (bnc#1012382).\n- net: igmp: Use correct source address on IGMPv3 reports (bnc#1012382).\n- net: igmp: fix source address check for IGMPv3 reports (bnc#1012382).\n- net: initialize msg.msg_flags in recvfrom (bnc#1012382).\n- net: ipv4: fix for a race condition in raw_sendmsg (bnc#1012382).\n- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (bnc#1012382).\n- net: mvneta: clear interface link status on port disable (bnc#1012382).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bnc#1012382).\n- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround (bnc#1012382).\n- net: qdisc_pkt_len_init() should be more robust (bnc#1012382).\n- net: qmi_wwan: Add USB IDs for MDM6600 modem on Motorola Droid 4 (bnc#1012382).\n- net: qmi_wwan: add Sierra EM7565 1199:9091 (bnc#1012382).\n- net: reevalulate autoflowlabel setting after sysctl setting (bnc#1012382).\n- net: sctp: fix array overrun read on sctp_timer_tbl (bnc#1012382).\n- net: stmmac: enable EEE in MII, GMII or RGMII only (bnc#1012382).\n- net: systemport: Pad packet before inserting TSB (bnc#1012382).\n- net: systemport: Utilize skb_put_padto() (bnc#1012382).\n- net: tcp: close sock if net namespace is exiting (bnc#1012382).\n- net: wimax/i2400m: fix NULL-deref at probe (bnc#1012382).\n- netfilter: bridge: honor frag_max_size when refragmenting (bnc#1012382).\n- netfilter: do not track fragmented packets (bnc#1012382).\n- netfilter: ipvs: Fix inappropriate output of procfs (bnc#1012382).\n- netfilter: nfnetlink_queue: fix secctx memory leak (bnc#1012382).\n- netfilter: nfnetlink_queue: fix timestamp attribute (bsc#1074134).\n- netfilter: nfnl_cthelper: Fix memory leak (bnc#1012382).\n- netfilter: nfnl_cthelper: fix a race when walk the nf_ct_helper_hash table (bnc#1012382).\n- netfilter: nfnl_cthelper: fix runtime expectation policy updates (bnc#1012382).\n- netlink: add a start callback for starting a netlink dump (bnc#1012382).\n- nfs: Do not take a reference on fl-\u003efl_file for LOCK operation (bnc#1012382).\n- nfs: Fix a typo in nfs_rename() (bnc#1012382).\n- nfs: improve shinking of access cache (bsc#1012917).\n- nfsd: Fix another OPEN stateid race (bnc#1012382).\n- nfsd: Fix stateid races between OPEN and CLOSE (bnc#1012382).\n- nfsd: Make init_open_stateid() a bit more whole (bnc#1012382).\n- nfsd: auth: Fix gid sorting when rootsquash enabled (bnc#1012382).\n- nfsd: fix nfsd_minorversion(.., NFSD_AVAIL) (bnc#1012382).\n- nfsd: fix nfsd_reset_versions for NFSv4 (bnc#1012382).\n- nfsv4.1 respect server\u0027s max size in CREATE_SESSION (bnc#1012382).\n- nfsv4: Fix client recovery when server reboots multiple times (bnc#1012382).\n- nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick() (bnc#1012382).\n- openrisc: fix issue handling 8 byte get_user calls (bnc#1012382).\n- packet: fix crash in fanout_demux_rollover() (bnc#1012382).\n- parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel (bnc#1012382).\n- parisc: Hide Diva-built-in serial aux and graphics card (bnc#1012382).\n- partially revert tipc improve link resiliency when rps is activated (bsc#1068038).\n- pci / PM: Force devices to D0 in pci_pm_thaw_noirq() (bnc#1012382).\n- pci/AER: Report non-fatal errors only to the affected endpoint (bnc#1012382).\n- pci/PME: Handle invalid data when reading Root Status (bnc#1012382).\n- pci: Avoid bus reset if bridge itself is broken (bnc#1012382).\n- pci: Create SR-IOV virtfn/physfn links before attaching driver (bnc#1012382).\n- pci: Detach driver before procfs \u0026 sysfs teardown on device remove (bnc#1012382).\n- perf symbols: Fix symbols__fixup_end heuristic for corner cases (bnc#1012382).\n- perf test attr: Fix ignored test case result (bnc#1012382).\n- perf: xgene: Add support for SoC PMU version 3 (bsc#1076809).\n- perf: xgene: Include module.h (bsc#1076809).\n- perf: xgene: Move PMU leaf functions into function pointer structure (bsc#1076809).\n- perf: xgene: Parse PMU subnode from the match table (bsc#1076809).\n- perf: xgene: Remove unnecessary managed resources cleanup (bsc#1076809).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bnc#1012382).\n- pinctrl: adi2: Fix Kconfig build problem (bnc#1012382).\n- pinctrl: st: add irq_request/release_resources callbacks (bnc#1012382).\n- pipe: avoid round_pipe_size() nr_pages overflow on 32-bit (bnc#1012382).\n- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075087).\n- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075087).\n- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032, bsc#1075087).\n- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075087).\n- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075087).\n- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075087).\n- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).\n- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075087).\n- powerpc/ipic: Fix status get and status clear (bnc#1012382).\n- powerpc/perf/hv-24x7: Fix incorrect comparison in memord (bnc#1012382).\n- powerpc/perf: Dereference BHRB entries safely (bsc#1066223).\n- powerpc/powernv/cpufreq: Fix the frequency read by /proc/cpuinfo (bnc#1012382).\n- powerpc/powernv/ioda2: Gracefully fail if too many TCE levels requested (bnc#1012382).\n- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032, bsc#1075087).\n- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).\n- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075087).\n- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032, bsc#1075087).\n- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075087).\n- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: prevent crash when changing flush type to fallback after system boot (bsc#1068032, bsc#1075087).\n- ppp: Destroy the mutex when cleanup (bnc#1012382).\n- pppoe: take -\u003eneeded_headroom of lower device into account on xmit (bnc#1012382).\n- pti: unbreak EFI (bsc#1074709).\n- r8152: fix the list rx_done may be used without initialization (bnc#1012382).\n- r8152: prevent the driver from transmitting packets with carrier off (bnc#1012382).\n- r8169: fix memory corruption on retrieval of hardware statistics (bnc#1012382).\n- raid5: Set R5_Expanded on parity devices as well as data (bnc#1012382).\n- ravb: Remove Rx overflow log messages (bnc#1012382).\n- rbd: set max_segments to USHRT_MAX (bnc#1012382).\n- rdma/cma: Avoid triggering undefined behavior (bnc#1012382).\n- rdma/iser: Fix possible mr leak on device removal event (bnc#1012382).\n- rds: Fix NULL pointer dereference in __rds_rdma_map (bnc#1012382).\n- rds: Heap OOB write in rds_message_alloc_sgs() (bnc#1012382).\n- rds: null pointer dereference in rds_atomic_free_op (bnc#1012382).\n- regulator: Try to resolve regulators supplies on registration (bsc#1074847).\n- regulator: core: Rely on regulator_dev_release to free constraints (bsc#1074847).\n- regulator: da9063: Return an error code on probe failure (bsc#1074847).\n- regulator: pwm: Fix regulator ramp delay for continuous mode (bsc#1074847).\n- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075087).\n- ring-buffer: Mask out the info bits when returning buffer page length (bnc#1012382).\n- route: also update fnhe_genid when updating a route cache (bnc#1012382).\n- route: update fnhe_expires for redirect when the fnhe exists (bnc#1012382).\n- rtc: cmos: Initialize hpet timer before irq is registered (bsc#1077592).\n- rtc: pcf8563: fix output clock rate (bnc#1012382).\n- rtc: pl031: make interrupt optional (bnc#1012382).\n- rtc: set the alarm to the next expiring timer (bnc#1012382).\n- s390/pci: do not require AIS facility (bnc#1012382).\n- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1012382).\n- s390/runtime instrumentation: simplify task exit handling (bnc#1012382).\n- s390: always save and restore all registers on context switch (bnc#1012382).\n- s390: fix compat system call table (bnc#1012382).\n- sch_dsmark: fix invalid skb_cow() usage (bnc#1012382).\n- sched/deadline: Make sure the replenishment timer fires in the next period (bnc#1012382).\n- sched/deadline: Throttle a constrained deadline task activated after the deadline (bnc#1012382).\n- sched/deadline: Use deadline instead of period when calculating overflow (bnc#1012382).\n- sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks (bnc#1012382).\n- sched/deadline: Zero out positive runtime after throttling constrained tasks (git-fixes).\n- sched/rt: Do not pull from current CPU if only one CPU to pull (bnc#1022476).\n- scsi: bfa: integer overflow in debugfs (bnc#1012382).\n- scsi: check for device state in __scsi_remove_target() (bsc#1072589).\n- scsi: cxgb4i: fix Tx skb leak (bnc#1012382).\n- scsi: fixup kernel warning during rmmod() (bsc#1052360).\n- scsi: hpsa: cleanup sas_phy structures in sysfs when unloading (bnc#1012382).\n- scsi: hpsa: destroy sas transport properties before scsi_host (bnc#1012382).\n- scsi: libsas: align sata_device\u0027s rps_resp on a cacheline (bnc#1012382).\n- scsi: lpfc: Fix PT2PT PRLI reject (bnc#1012382).\n- scsi: lpfc: Fix crash during Hardware error recovery on SLI3 adapters (bnc#1012382).\n- scsi: lpfc: Fix secure firmware updates (bnc#1012382).\n- scsi: lpfc: PLOGI failures during NPIV testing (bnc#1012382).\n- scsi: mpt3sas: Fix IO error occurs on pulling out a drive from RAID1 volume created on two SATA drive (bnc#1012382).\n- scsi: sd: change allow_restart to bool in sysfs interface (bnc#1012382).\n- scsi: sd: change manage_start_stop to bool in sysfs interface (bnc#1012382).\n- scsi: sg: disable SET_FORCE_LOW_DMA (bnc#1012382).\n- scsi: sr: wait for the medium to become ready (bsc#1048585).\n- sctp: Replace use of sockets_allocated with specified macro (bnc#1012382).\n- sctp: do not allow the v4 socket to bind a v4mapped v6 address (bnc#1012382).\n- sctp: do not free asoc when it is already dead in sctp_sendmsg (bnc#1012382).\n- sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf (bnc#1012382).\n- sctp: use the right sk after waking up from wait_buf sleep (bnc#1012382).\n- selftest/powerpc: Fix false failures for skipped tests (bnc#1012382).\n- selftests/x86/ldt_get: Add a few additional tests for limits (bnc#1012382).\n- selftests/x86: Add test_vsyscall (bnc#1012382).\n- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bnc#1012382).\n- serial: 8250_pci: Add Amazon PCI serial device ID (bnc#1012382).\n- series.conf: fix wrong bsc reference\n- series.conf: whitespace cleanup\n- sfc: do not warn on successful change of MAC (bnc#1012382).\n- sh_eth: fix SH7757 GEther initialization (bnc#1012382).\n- sh_eth: fix TSU resource handling (bnc#1012382).\n- sit: update frag_off info (bnc#1012382).\n- sock: free skb in skb_complete_tx_timestamp on error (bnc#1012382).\n- sparc64/mm: set fields in deferred pages (bnc#1012382).\n- spi: sh-msiof: Fix DMA transfer size check (bnc#1012382).\n- spi: xilinx: Detect stall with Unknown commands (bnc#1012382).\n- spi_ks8995: fix \u0027BUG: key accdaa28 not in .data!\u0027 (bnc#1012382).\n- staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl (bnc#1012382).\n- sunrpc: Fix rpc_task_begin trace point (bnc#1012382).\n- sunrpc: add RPCSEC_GSS hash_cred() function (bsc#1012917).\n- sunrpc: add auth_unix hash_cred() function (bsc#1012917).\n- sunrpc: add generic_auth hash_cred() function (bsc#1012917).\n- sunrpc: add hash_cred() function to rpc_authops struct (bsc#1012917).\n- sunrpc: replace generic auth_cred hash with auth-specific function (bsc#1012917).\n- sunrpc: use supplimental groups in auth hash (bsc#1012917).\n- sunxi-rsb: Include OF based modalias in device uevent (bnc#1012382).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- sysrq : fix Show Regs call trace on ARM (bnc#1012382).\n- target/file: Do not return error for UNMAP if length is zero (bnc#1012382).\n- target/iscsi: Fix a race condition in iscsit_add_reject_from_cmd() (bnc#1012382).\n- target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK (bnc#1012382).\n- target: Use system workqueue for ALUA transitions (bnc#1012382).\n- target: fix ALUA transition timeout handling (bnc#1012382).\n- target: fix race during implicit transition work flushes (bnc#1012382).\n- target:fix condition return in core_pr_dump_initiator_port() (bnc#1012382).\n- tcp md5sig: Use skb\u0027s saddr when replying to an incoming segment (bnc#1012382).\n- tcp: __tcp_hdrlen() helper (bnc#1012382).\n- tcp: correct memory barrier usage in tcp_check_space() (bnc#1012382).\n- tcp: fix under-evaluated ssthresh in TCP Vegas (bnc#1012382).\n- tg3: Fix rx hang on MTU change with 5717/5719 (bnc#1012382).\n- thermal/drivers/step_wise: Fix temperature regulation misbehavior (bnc#1012382).\n- thermal: hisilicon: Handle return value of clk_prepare_enable (bnc#1012382).\n- tipc: fix cleanup at module unload (bnc#1012382).\n- tipc: fix memory leak in tipc_accept_from_sock() (bnc#1012382).\n- tipc: improve link resiliency when rps is activated (bsc#1068038).\n- tracing: Allocate mask_str buffer dynamically (bnc#1012382).\n- tracing: Fix converting enum\u0027s from the map in trace_event_eval_update() (bnc#1012382).\n- tracing: Fix crash when it fails to alloc ring buffer (bnc#1012382).\n- tracing: Fix possible double free on failure of allocating trace buffer (bnc#1012382).\n- tracing: Remove extra zeroing out of the ring buffer page (bnc#1012382).\n- tty fix oops when rmmod 8250 (bnc#1012382).\n- uas: Always apply US_FL_NO_ATA_1X quirk to Seagate devices (bnc#1012382).\n- uas: ignore UAS for Norelsys NS1068(X) chips (bnc#1012382).\n- udf: Avoid overflow when session starts at large offset (bnc#1012382).\n- um: link vmlinux with -no-pie (bnc#1012382).\n- usb: Add device quirk for Logitech HD Pro Webcam C925e (bnc#1012382).\n- usb: Fix off by one in type-specific length check of BOS SSP capability (git-fixes).\n- usb: Increase usbfs transfer limit (bnc#1012382).\n- usb: add RESET_RESUME for ELSA MicroLink 56K (bnc#1012382).\n- usb: core: Add type-specific length check of BOS descriptors (bnc#1012382).\n- usb: core: prevent malicious bNumInterfaces overflow (bnc#1012382).\n- usb: devio: Prevent integer overflow in proc_do_submiturb() (bnc#1012382).\n- usb: fix usbmon BUG trigger (bnc#1012382).\n- usb: gadget: configs: plug memory leak (bnc#1012382).\n- usb: gadget: f_uvc: Sanity check wMaxPacketSize for SuperSpeed (bnc#1012382).\n- usb: gadget: ffs: Forbid usb_ep_alloc_request from sleeping (bnc#1012382).\n- usb: gadget: udc: remove pointer dereference after free (bnc#1012382).\n- usb: gadgetfs: Fix a potential memory leak in \u0027dev_config()\u0027 (bnc#1012382).\n- usb: hub: Cycle HUB power when initialization fails (bnc#1012382).\n- usb: misc: usb3503: make sure reset is low for at least 100us (bnc#1012382).\n- usb: musb: da8xx: fix babble condition handling (bnc#1012382).\n- usb: phy: isp1301: Add OF device ID table (bnc#1012382).\n- usb: phy: isp1301: Fix build warning when CONFIG_OF is disabled (git-fixes).\n- usb: phy: tahvo: fix error handling in tahvo_usb_probe() (bnc#1012382).\n- usb: quirks: Add no-lpm quirk for KY-688 USB 3.1 Type-C Hub (bnc#1012382).\n- usb: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ (bnc#1012382).\n- usb: serial: cp210x: add new device ID ELV ALC 8xxx (bnc#1012382).\n- usb: serial: ftdi_sio: add id for Airbus DS P8GR (bnc#1012382).\n- usb: serial: option: add Quectel BG96 id (bnc#1012382).\n- usb: serial: option: add support for Telit ME910 PID 0x1101 (bnc#1012382).\n- usb: serial: option: adding support for YUGA CLM920-NC5 (bnc#1012382).\n- usb: serial: qcserial: add Sierra Wireless EM7565 (bnc#1012382).\n- usb: uas and storage: Add US_FL_BROKEN_FUA for another JMicron JMS567 ID (bnc#1012382).\n- usb: usbfs: Filter flags passed in from user space (bnc#1012382).\n- usb: usbip: Fix possible deadlocks reported by lockdep (bnc#1012382).\n- usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 (bnc#1012382).\n- usb: xhci: fix panic in xhci_free_virt_devices_depth_first (bnc#1012382).\n- usbip: Fix implicit fallthrough warning (bnc#1012382).\n- usbip: Fix potential format overflow in userspace tools (bnc#1012382).\n- usbip: fix stub_rx: get_pipe() to validate endpoint number (bnc#1012382).\n- usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input (bnc#1012382).\n- usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer (bnc#1012382).\n- usbip: fix usbip bind writing random string after command in match_busid (bnc#1012382).\n- usbip: prevent leaking socket pointer address in messages (bnc#1012382).\n- usbip: prevent vhci_hcd driver from leaking a socket pointer address (bnc#1012382).\n- usbip: remove kernel addresses from usb device and urb debug msgs (bnc#1012382).\n- usbip: stub: stop printing kernel pointer addresses in messages (bnc#1012382).\n- usbip: vhci: stop printing kernel pointer addresses in messages (bnc#1012382).\n- userfaultfd: selftest: vm: allow to build in vm/ directory (bnc#1012382).\n- userfaultfd: shmem: __do_fault requires VM_FAULT_NOPAGE (bnc#1012382).\n- video: fbdev: au1200fb: Release some resources if a memory allocation fails (bnc#1012382).\n- video: fbdev: au1200fb: Return an error code if a memory allocation fails (bnc#1012382).\n- virtio: release virtio index when fail to device_register (bnc#1012382).\n- vmxnet3: repair memory leak (bnc#1012382).\n- vsyscall: Fix permissions for emulate mode with KAISER/PTI (bnc#1012382).\n- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend (bnc#1012382).\n- vti6: Do not report path MTU below IPV6_MIN_MTU (bnc#1012382).\n- vti6: fix device register to report IFLA_INFO_KIND (bnc#1012382).\n- workqueue: trigger WARN if queue_delayed_work() is called with NULL @wq (bnc#1012382).\n- writeback: fix memory leak in wb_queue_work() (bnc#1012382).\n- x.509: fix buffer overflow detection in sprint_oid() (bsc#1075078).\n- x.509: reject invalid BIT STRING for subjectPublicKey (bnc#1012382).\n- x509: fix printing uninitialized stack memory when OID is empty (bsc#1075078).\n- x86/Documentation: Add PTI description (bnc#1012382).\n- x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bnc#1012382).\n- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).\n- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).\n- x86/alternatives: Add missing \u0027\\n\u0027 at end of ALTERNATIVE inline asm (bnc#1012382).\n- x86/alternatives: Fix optimize_nops() checking (bnc#1012382).\n- x86/apic/vector: Fix off by one in error path (bnc#1012382).\n- x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels (bnc#1012382).\n- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).\n- x86/cpu, x86/pti: Do not enable PTI on AMD processors (bnc#1012382).\n- x86/cpu: Factor out application of forced CPU caps (bnc#1012382).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/cpu: Merge bugs.c and bugs_64.c (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).\n- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).\n- x86/efi-bgrt: Fix kernel panic when mapping BGRT data (bnc#1012382).\n- x86/efi-bgrt: Replace early_memremap() with memremap() (bnc#1012382).\n- x86/efi: Build our own page table structures (bnc#1012382).\n- x86/efi: Hoist page table switching code into efi_call_virt() (bnc#1012382).\n- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt() (bnc#1012382).\n- x86/hpet: Prevent might sleep splat on resume (bnc#1012382).\n- x86/kasan: Clear kasan_zero_page after TLB flush (bnc#1012382).\n- x86/kasan: Write protect kasan zero shadow (bnc#1012382).\n- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bnc#1012382).\n- x86/microcode/intel: Extend BDW late-loading with a revision check (bnc#1012382).\n- x86/microcode/intel: Fix BDW late-loading revision check (bnc#1012382).\n- x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier (git-fixes).\n- x86/mm/pat: Ensure cpa-\u003epfn only contains page frame numbers (bnc#1012382).\n- x86/mm: Disable PCID on 32-bit kernels (bnc#1012382).\n- x86/pti/efi: broken conversion from efi to kernel page table (bnc#1012382).\n- x86/pti: Document fix wrong index (bnc#1012382).\n- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/smpboot: Remove stale TLB flush invocations (bnc#1012382).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n- x86/tlb: Drop the _GPL from the cpu_tlbstate export (bnc#1012382).\n- x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly() (bnc#1012382).\n- xen-netfront: Improve error handling during initialization (bnc#1012382).\n- xen-netfront: avoid crashing on resume after a failure in talk_to_netback() (bnc#1012382).\n- xfrm: Copy policy family in clone_policy (bnc#1012382).\n- xfs: Add infrastructure needed for error propagation during buffer IO failure (bsc#1068569).\n- xfs: Properly retry failed inode items in case of error during buffer writeback (bsc#1068569).\n- xfs: add \u0027fail at unmount\u0027 error handling configuration (bsc#1068569).\n- xfs: add configurable error support to metadata buffers (bsc#1068569).\n- xfs: add configuration handlers for specific errors (bsc#1068569).\n- xfs: add configuration of error failure speed (bsc#1068569).\n- xfs: address kabi for xfs buffer retry infrastructure (kabi).\n- xfs: configurable error behavior via sysfs (bsc#1068569).\n- xfs: fix incorrect extent state in xfs_bmap_add_extent_unwritten_real (bnc#1012382).\n- xfs: fix log block underflow during recovery cycle verification (bnc#1012382).\n- xfs: fix up inode32/64 (re)mount handling (bsc#1069160).\n- xfs: introduce metadata IO error class (bsc#1068569).\n- xfs: introduce table-based init for error behaviors (bsc#1068569).\n- xfs: remove xfs_trans_ail_delete_bulk (bsc#1068569).\n- xhci: Do not add a virt_dev to the devs array before it\u0027s fully allocated (bnc#1012382).\n- xhci: Fix ring leak in failure path of xhci_alloc_virt_device() (bnc#1012382).\n- xhci: plat: Register shutdown for xhci_plat (bnc#1012382).\n- zram: set physical queue limits to avoid array out of bounds accesses (bnc#1012382).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-285,SUSE-SLE-DESKTOP-12-SP2-2018-285,SUSE-SLE-HA-12-SP2-2018-285,SUSE-SLE-Live-Patching-12-2018-285,SUSE-SLE-RPI-12-SP2-2018-285,SUSE-SLE-SDK-12-SP2-2018-285,SUSE-SLE-SERVER-12-SP2-2018-285,SUSE-SLE-WE-12-SP2-2018-285",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0416-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0416-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180416-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0416-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-February/003721.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1012917",
"url": "https://bugzilla.suse.com/1012917"
},
{
"category": "self",
"summary": "SUSE Bug 1019784",
"url": "https://bugzilla.suse.com/1019784"
},
{
"category": "self",
"summary": "SUSE Bug 1022476",
"url": "https://bugzilla.suse.com/1022476"
},
{
"category": "self",
"summary": "SUSE Bug 1031717",
"url": "https://bugzilla.suse.com/1031717"
},
{
"category": "self",
"summary": "SUSE Bug 1038078",
"url": "https://bugzilla.suse.com/1038078"
},
{
"category": "self",
"summary": "SUSE Bug 1038085",
"url": "https://bugzilla.suse.com/1038085"
},
{
"category": "self",
"summary": "SUSE Bug 1043652",
"url": "https://bugzilla.suse.com/1043652"
},
{
"category": "self",
"summary": "SUSE Bug 1048585",
"url": "https://bugzilla.suse.com/1048585"
},
{
"category": "self",
"summary": "SUSE Bug 1052360",
"url": "https://bugzilla.suse.com/1052360"
},
{
"category": "self",
"summary": "SUSE Bug 1060279",
"url": "https://bugzilla.suse.com/1060279"
},
{
"category": "self",
"summary": "SUSE Bug 1066223",
"url": "https://bugzilla.suse.com/1066223"
},
{
"category": "self",
"summary": "SUSE Bug 1066842",
"url": "https://bugzilla.suse.com/1066842"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068038",
"url": "https://bugzilla.suse.com/1068038"
},
{
"category": "self",
"summary": "SUSE Bug 1068569",
"url": "https://bugzilla.suse.com/1068569"
},
{
"category": "self",
"summary": "SUSE Bug 1068984",
"url": "https://bugzilla.suse.com/1068984"
},
{
"category": "self",
"summary": "SUSE Bug 1069160",
"url": "https://bugzilla.suse.com/1069160"
},
{
"category": "self",
"summary": "SUSE Bug 1070799",
"url": "https://bugzilla.suse.com/1070799"
},
{
"category": "self",
"summary": "SUSE Bug 1072163",
"url": "https://bugzilla.suse.com/1072163"
},
{
"category": "self",
"summary": "SUSE Bug 1072484",
"url": "https://bugzilla.suse.com/1072484"
},
{
"category": "self",
"summary": "SUSE Bug 1072589",
"url": "https://bugzilla.suse.com/1072589"
},
{
"category": "self",
"summary": "SUSE Bug 1073229",
"url": "https://bugzilla.suse.com/1073229"
},
{
"category": "self",
"summary": "SUSE Bug 1073928",
"url": "https://bugzilla.suse.com/1073928"
},
{
"category": "self",
"summary": "SUSE Bug 1074134",
"url": "https://bugzilla.suse.com/1074134"
},
{
"category": "self",
"summary": "SUSE Bug 1074392",
"url": "https://bugzilla.suse.com/1074392"
},
{
"category": "self",
"summary": "SUSE Bug 1074488",
"url": "https://bugzilla.suse.com/1074488"
},
{
"category": "self",
"summary": "SUSE Bug 1074621",
"url": "https://bugzilla.suse.com/1074621"
},
{
"category": "self",
"summary": "SUSE Bug 1074709",
"url": "https://bugzilla.suse.com/1074709"
},
{
"category": "self",
"summary": "SUSE Bug 1074839",
"url": "https://bugzilla.suse.com/1074839"
},
{
"category": "self",
"summary": "SUSE Bug 1074847",
"url": "https://bugzilla.suse.com/1074847"
},
{
"category": "self",
"summary": "SUSE Bug 1075066",
"url": "https://bugzilla.suse.com/1075066"
},
{
"category": "self",
"summary": "SUSE Bug 1075078",
"url": "https://bugzilla.suse.com/1075078"
},
{
"category": "self",
"summary": "SUSE Bug 1075087",
"url": "https://bugzilla.suse.com/1075087"
},
{
"category": "self",
"summary": "SUSE Bug 1075091",
"url": "https://bugzilla.suse.com/1075091"
},
{
"category": "self",
"summary": "SUSE Bug 1075428",
"url": "https://bugzilla.suse.com/1075428"
},
{
"category": "self",
"summary": "SUSE Bug 1075617",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "self",
"summary": "SUSE Bug 1075621",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "self",
"summary": "SUSE Bug 1075627",
"url": "https://bugzilla.suse.com/1075627"
},
{
"category": "self",
"summary": "SUSE Bug 1075994",
"url": "https://bugzilla.suse.com/1075994"
},
{
"category": "self",
"summary": "SUSE Bug 1076017",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "self",
"summary": "SUSE Bug 1076110",
"url": "https://bugzilla.suse.com/1076110"
},
{
"category": "self",
"summary": "SUSE Bug 1076806",
"url": "https://bugzilla.suse.com/1076806"
},
{
"category": "self",
"summary": "SUSE Bug 1076809",
"url": "https://bugzilla.suse.com/1076809"
},
{
"category": "self",
"summary": "SUSE Bug 1076872",
"url": "https://bugzilla.suse.com/1076872"
},
{
"category": "self",
"summary": "SUSE Bug 1076899",
"url": "https://bugzilla.suse.com/1076899"
},
{
"category": "self",
"summary": "SUSE Bug 1077068",
"url": "https://bugzilla.suse.com/1077068"
},
{
"category": "self",
"summary": "SUSE Bug 1077560",
"url": "https://bugzilla.suse.com/1077560"
},
{
"category": "self",
"summary": "SUSE Bug 1077592",
"url": "https://bugzilla.suse.com/1077592"
},
{
"category": "self",
"summary": "SUSE Bug 1078526",
"url": "https://bugzilla.suse.com/1078526"
},
{
"category": "self",
"summary": "SUSE Bug 1078681",
"url": "https://bugzilla.suse.com/1078681"
},
{
"category": "self",
"summary": "SUSE Bug 963844",
"url": "https://bugzilla.suse.com/963844"
},
{
"category": "self",
"summary": "SUSE Bug 988524",
"url": "https://bugzilla.suse.com/988524"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15129 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17712 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17712/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17862 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17864 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18017 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5332 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5333 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5333/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-02-09T15:27:09Z",
"generator": {
"date": "2018-02-09T15:27:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0416-1",
"initial_release_date": "2018-02-09T15:27:09Z",
"revision_history": [
{
"date": "2018-02-09T15:27:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.114-92.64.1.aarch64",
"product": {
"name": "kernel-default-4.4.114-92.64.1.aarch64",
"product_id": "kernel-default-4.4.114-92.64.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.114-92.64.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.114-92.64.1.aarch64",
"product_id": "kernel-default-base-4.4.114-92.64.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.114-92.64.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.114-92.64.1.aarch64",
"product_id": "kernel-default-devel-4.4.114-92.64.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.114-92.64.1.aarch64",
"product": {
"name": "kernel-syms-4.4.114-92.64.1.aarch64",
"product_id": "kernel-syms-4.4.114-92.64.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.114-92.64.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.114-92.64.1.aarch64",
"product_id": "kernel-obs-build-4.4.114-92.64.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.114-92.64.1.noarch",
"product": {
"name": "kernel-devel-4.4.114-92.64.1.noarch",
"product_id": "kernel-devel-4.4.114-92.64.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.114-92.64.1.noarch",
"product": {
"name": "kernel-macros-4.4.114-92.64.1.noarch",
"product_id": "kernel-macros-4.4.114-92.64.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.114-92.64.1.noarch",
"product": {
"name": "kernel-source-4.4.114-92.64.1.noarch",
"product_id": "kernel-source-4.4.114-92.64.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.114-92.64.2.noarch",
"product": {
"name": "kernel-docs-4.4.114-92.64.2.noarch",
"product_id": "kernel-docs-4.4.114-92.64.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.114-92.64.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"product": {
"name": "cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"product_id": "cluster-network-kmp-default-4.4.114-92.64.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.114-92.64.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.114-92.64.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.114-92.64.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.114-92.64.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.114-92.64.1.ppc64le",
"product_id": "kernel-obs-build-4.4.114-92.64.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.114-92.64.1.ppc64le",
"product": {
"name": "kernel-default-4.4.114-92.64.1.ppc64le",
"product_id": "kernel-default-4.4.114-92.64.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.114-92.64.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.114-92.64.1.ppc64le",
"product_id": "kernel-default-base-4.4.114-92.64.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.114-92.64.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.114-92.64.1.ppc64le",
"product_id": "kernel-default-devel-4.4.114-92.64.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.114-92.64.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.114-92.64.1.ppc64le",
"product_id": "kernel-syms-4.4.114-92.64.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.114-92.64.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"product_id": "cluster-network-kmp-default-4.4.114-92.64.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.114-92.64.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.114-92.64.1.s390x",
"product_id": "dlm-kmp-default-4.4.114-92.64.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.114-92.64.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.114-92.64.1.s390x",
"product_id": "gfs2-kmp-default-4.4.114-92.64.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.114-92.64.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.114-92.64.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.114-92.64.1.s390x",
"product_id": "kernel-obs-build-4.4.114-92.64.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.114-92.64.1.s390x",
"product": {
"name": "kernel-default-4.4.114-92.64.1.s390x",
"product_id": "kernel-default-4.4.114-92.64.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.114-92.64.1.s390x",
"product": {
"name": "kernel-default-base-4.4.114-92.64.1.s390x",
"product_id": "kernel-default-base-4.4.114-92.64.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.114-92.64.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.114-92.64.1.s390x",
"product_id": "kernel-default-devel-4.4.114-92.64.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.114-92.64.1.s390x",
"product": {
"name": "kernel-default-man-4.4.114-92.64.1.s390x",
"product_id": "kernel-default-man-4.4.114-92.64.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.114-92.64.1.s390x",
"product": {
"name": "kernel-syms-4.4.114-92.64.1.s390x",
"product_id": "kernel-syms-4.4.114-92.64.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.114-92.64.1.x86_64",
"product": {
"name": "kernel-default-4.4.114-92.64.1.x86_64",
"product_id": "kernel-default-4.4.114-92.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.114-92.64.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.114-92.64.1.x86_64",
"product_id": "kernel-default-devel-4.4.114-92.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.114-92.64.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.114-92.64.1.x86_64",
"product_id": "kernel-default-extra-4.4.114-92.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.114-92.64.1.x86_64",
"product": {
"name": "kernel-syms-4.4.114-92.64.1.x86_64",
"product_id": "kernel-syms-4.4.114-92.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.114-92.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"product_id": "cluster-network-kmp-default-4.4.114-92.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.114-92.64.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.114-92.64.1.x86_64",
"product_id": "dlm-kmp-default-4.4.114-92.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.114-92.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.114-92.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"product_id": "kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.114-92.64.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.114-92.64.1.x86_64",
"product_id": "kernel-obs-build-4.4.114-92.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.114-92.64.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.114-92.64.1.x86_64",
"product_id": "kernel-default-base-4.4.114-92.64.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64"
},
"product_reference": "kernel-default-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
},
"product_reference": "kernel-default-extra-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.114-92.64.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch"
},
"product_reference": "kernel-devel-4.4.114-92.64.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.114-92.64.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch"
},
"product_reference": "kernel-macros-4.4.114-92.64.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.114-92.64.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch"
},
"product_reference": "kernel-source-4.4.114-92.64.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64"
},
"product_reference": "kernel-syms-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.114-92.64.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.114-92.64.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le"
},
"product_reference": "cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x"
},
"product_reference": "cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64"
},
"product_reference": "cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.114-92.64.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.114-92.64.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.114-92.64.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-92.64.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64"
},
"product_reference": "kernel-default-4.4.114-92.64.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-92.64.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.114-92.64.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-92.64.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.114-92.64.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.114-92.64.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch"
},
"product_reference": "kernel-devel-4.4.114-92.64.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.114-92.64.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch"
},
"product_reference": "kernel-macros-4.4.114-92.64.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.114-92.64.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch"
},
"product_reference": "kernel-source-4.4.114-92.64.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-92.64.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64"
},
"product_reference": "kernel-syms-4.4.114-92.64.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.4.114-92.64.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch"
},
"product_reference": "kernel-docs-4.4.114-92.64.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.114-92.64.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64"
},
"product_reference": "kernel-obs-build-4.4.114-92.64.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.114-92.64.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.4.114-92.64.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x"
},
"product_reference": "kernel-obs-build-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64"
},
"product_reference": "kernel-obs-build-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-92.64.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64"
},
"product_reference": "kernel-default-4.4.114-92.64.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-92.64.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le"
},
"product_reference": "kernel-default-4.4.114-92.64.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x"
},
"product_reference": "kernel-default-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64"
},
"product_reference": "kernel-default-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-92.64.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.114-92.64.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-92.64.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.114-92.64.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x"
},
"product_reference": "kernel-default-base-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-92.64.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.114-92.64.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-92.64.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.114-92.64.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x"
},
"product_reference": "kernel-default-man-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.114-92.64.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch"
},
"product_reference": "kernel-devel-4.4.114-92.64.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.114-92.64.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch"
},
"product_reference": "kernel-macros-4.4.114-92.64.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.114-92.64.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch"
},
"product_reference": "kernel-source-4.4.114-92.64.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-92.64.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64"
},
"product_reference": "kernel-syms-4.4.114-92.64.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-92.64.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.114-92.64.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x"
},
"product_reference": "kernel-syms-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64"
},
"product_reference": "kernel-syms-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-92.64.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64"
},
"product_reference": "kernel-default-4.4.114-92.64.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-92.64.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le"
},
"product_reference": "kernel-default-4.4.114-92.64.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x"
},
"product_reference": "kernel-default-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64"
},
"product_reference": "kernel-default-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-92.64.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.114-92.64.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-92.64.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.114-92.64.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x"
},
"product_reference": "kernel-default-base-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-92.64.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.114-92.64.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-92.64.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.114-92.64.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x"
},
"product_reference": "kernel-default-man-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.114-92.64.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch"
},
"product_reference": "kernel-devel-4.4.114-92.64.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.114-92.64.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch"
},
"product_reference": "kernel-macros-4.4.114-92.64.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.114-92.64.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch"
},
"product_reference": "kernel-source-4.4.114-92.64.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-92.64.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64"
},
"product_reference": "kernel-syms-4.4.114-92.64.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-92.64.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.114-92.64.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-92.64.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x"
},
"product_reference": "kernel-syms-4.4.114-92.64.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64"
},
"product_reference": "kernel-syms-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.114-92.64.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
},
"product_reference": "kernel-default-extra-4.4.114-92.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15129"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15129",
"url": "https://www.suse.com/security/cve/CVE-2017-15129"
},
{
"category": "external",
"summary": "SUSE Bug 1074839 for CVE-2017-15129",
"url": "https://bugzilla.suse.com/1074839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-09T15:27:09Z",
"details": "moderate"
}
],
"title": "CVE-2017-15129"
},
{
"cve": "CVE-2017-17712",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17712"
}
],
"notes": [
{
"category": "general",
"text": "The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet-\u003ehdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17712",
"url": "https://www.suse.com/security/cve/CVE-2017-17712"
},
{
"category": "external",
"summary": "SUSE Bug 1073229 for CVE-2017-17712",
"url": "https://bugzilla.suse.com/1073229"
},
{
"category": "external",
"summary": "SUSE Bug 1073230 for CVE-2017-17712",
"url": "https://bugzilla.suse.com/1073230"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-09T15:27:09Z",
"details": "important"
}
],
"title": "CVE-2017-17712"
},
{
"cve": "CVE-2017-17862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17862"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17862",
"url": "https://www.suse.com/security/cve/CVE-2017-17862"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17862",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-09T15:27:09Z",
"details": "moderate"
}
],
"title": "CVE-2017-17862"
},
{
"cve": "CVE-2017-17864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17864"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17864",
"url": "https://www.suse.com/security/cve/CVE-2017-17864"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17864",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-09T15:27:09Z",
"details": "moderate"
}
],
"title": "CVE-2017-17864"
},
{
"cve": "CVE-2017-18017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18017"
}
],
"notes": [
{
"category": "general",
"text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18017",
"url": "https://www.suse.com/security/cve/CVE-2017-18017"
},
{
"category": "external",
"summary": "SUSE Bug 1074488 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1074488"
},
{
"category": "external",
"summary": "SUSE Bug 1080255 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1080255"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 971126 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/971126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-09T15:27:09Z",
"details": "important"
}
],
"title": "CVE-2017-18017"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-09T15:27:09Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-09T15:27:09Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-5332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5332"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5332",
"url": "https://www.suse.com/security/cve/CVE-2018-5332"
},
{
"category": "external",
"summary": "SUSE Bug 1075621 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-09T15:27:09Z",
"details": "low"
}
],
"title": "CVE-2018-5332"
},
{
"cve": "CVE-2018-5333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5333"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5333",
"url": "https://www.suse.com/security/cve/CVE-2018-5333"
},
{
"category": "external",
"summary": "SUSE Bug 1075617 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_114-92_64-default-1-3.3.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.114-92.64.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.114-92.64.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.114-92.64.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.114-92.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-09T15:27:09Z",
"details": "low"
}
],
"title": "CVE-2018-5333"
}
]
}
SUSE-SU-2018:0555-1
Vulnerability from csaf_suse - Published: 2018-02-27 16:16 - Updated: 2018-02-27 16:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative\n execution and indirect branch prediction may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis (bnc#1068032).\n\n The previous fix using CPU Microcode has been complemented by building\n the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function\n did not validate a value that is used during DMA page allocation, leading\n to a heap-based out-of-bounds write (related to the rds_rdma_extra_size\n function in net/rds/rdma.c) (bnc#1075621).\n- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in\n net/rds/rdma.c mishandled cases where page pinning fails or an invalid\n address is supplied, leading to an rds_atomic_free_op NULL pointer\n dereference (bnc#1075617).\n- CVE-2017-18017: The tcpmss_mangle_packet function in\n net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers\n to cause a denial of service (use-after-free and memory corruption)\n or possibly have unspecified other impact by leveraging the presence of\n xt_TCPMSS in an iptables action (bnc#1074488).\n- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed\n attackers to cause a denial of service (NULL pointer dereference and\n system crash) or possibly have unspecified other impact because the\n port-\u003eexists value can change after it is validated (bnc#1077922).\n- CVE-2015-1142857: On multiple SR-IOV cars it is possible for VF\u0027s\n assigned to guests to send ethernet flow control pause frames via the\n PF. (bnc#1077355).\n- CVE-2017-17741: The KVM implementation in the Linux kernel allowed\n attackers to obtain potentially sensitive information from kernel\n memory, aka a write_mmio stack-based out-of-bounds read, related to\n arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).\n- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream\n kernel skcipher. (bnc#1075908).\n- CVE-2018-1000004: In the Linux kernel a race condition vulnerability\n existed in the sound system, this can lead to a deadlock and denial of\n service condition (bnc#1076017).\n\nThe following non-security bugs were fixed:\n\n- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1045538).\n- alsa: aloop: Fix racy hw constraints adjustment (bsc#1045538).\n- alsa: aloop: Release cable upon open error path (bsc#1045538).\n- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1045538).\n- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1045538).\n- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1045538).\n- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1045538).\n- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1045538).\n- btrfs: cleanup unnecessary assignment when cleaning up all the residual transaction (FATE#325056).\n- btrfs: copy fsid to super_block s_uuid (bsc#1080774).\n- btrfs: do not wait for all the writers circularly during the transaction commit (FATE#325056).\n- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1080363).\n- btrfs: fix two use-after-free bugs with transaction cleanup (FATE#325056).\n- btrfs: make the state of the transaction more readable (FATE#325056).\n- btrfs: qgroup: exit the rescan worker during umount (bsc#1080685).\n- btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#1080685).\n- btrfs: reset intwrite on transaction abort (FATE#325056).\n- btrfs: set qgroup_ulist to be null after calling ulist_free() (bsc#1080359).\n- btrfs: stop waiting on current trans if we aborted (FATE#325056).\n- cdc-acm: apply quirk for card reader (bsc#1060279).\n- cdrom: factor out common open_for_* code (bsc#1048585).\n- cdrom: wait for tray to close (bsc#1048585).\n- delay: add poll_event_interruptible (bsc#1048585).\n- dm flakey: add corrupt_bio_byte feature (bsc#1080372).\n- dm flakey: add drop_writes (bsc#1080372).\n- dm flakey: error READ bios during the down_interval (bsc#1080372).\n- dm flakey: fix crash on read when corrupt_bio_byte not set (bsc#1080372).\n- dm flakey: fix reads to be issued if drop_writes configured (bsc#1080372).\n- dm flakey: introduce \u0027error_writes\u0027 feature (bsc#1080372).\n- dm flakey: support feature args (bsc#1080372).\n- dm flakey: use dm_target_offset and support discards (bsc#1080372).\n- ext2: free memory allocated and forget buffer head when io error happens (bnc#1069508).\n- ext2: use unlikely to improve the efficiency of the kernel (bnc#1069508).\n- ext3: add necessary check in case IO error happens (bnc#1069508).\n- ext3: use unlikely to improve the efficiency of the kernel (bnc#1069508).\n- fork: clear thread stack upon allocation (bsc#1077560).\n- kaiser: Add proper NX handling for !NX-capable systems also to kaiser_add_user_map(). (bsc#1076278).\n- kaiser: do not clobber ZF by calling ENABLE_IBRS after test and before jz\n- kaiser: fix ia32 compat sysexit (bsc#1080579) sysexit_from_sys_call cannot make assumption of accessible stack after CR3 switch, and therefore should use the SWITCH_USER_CR3_NO_STACK method to flip the pagetable hierarchy.\n- kaiser: Fix trampoline stack loading issue on XEN PV\n- kaiser: handle non-accessible stack in sysretl_from_sys_call properly (bsc#bsc#1080579)\n- kaiser: make sure not to touch stack after CR3 switch in compat syscall return\n- kaiser: really do switch away from trampoline stack to kernel stack in ia32_syscall entry (bsc#1080579)\n- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).\n- keys: trusted: fix writing past end of buffer in trusted_read() (bsc#1074880).\n- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).\n- mISDN: fix a loop count (bsc#1077191).\n- nfsd: do not share group_info among threads (bsc@1070623).\n- ocfs2: avoid blocking in ocfs2_mark_lockres_freeing() in downconvert thread (bsc#1076437).\n- ocfs2: do not set OCFS2_LOCK_UPCONVERT_FINISHING if nonblocking lock can not be granted at once (bsc#1076437).\n- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).\n- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075088).\n- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).\n- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).\n- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075088).\n- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032, bsc#1075088).\n- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075088).\n- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).\n- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075088).\n- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075088).\n- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).\n- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075088).\n- powerpc: Fix register clobbering when accumulating stolen time (bsc#1059174).\n- powerpc: Fix up the kdump base cap to 128M (bsc#1079917, bsc#1077487).\n- powerpc: Mark CONFIG_PPC_DEBUG_RFI as BROKEN (bsc#1075088).\n- powerpc/perf: Dereference BHRB entries safely (bsc#1064861, FATE#317619, git-fixes).\n- powerpc/perf: Fix book3s kernel to userspace backtraces (bsc#1080133).\n- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags \u0026 wrapper (bsc#1068032, bsc#1075088).\n- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075088).\n- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075088).\n- powerpc/pseries: Kill all prefetch streams on context switch (bsc#1068032, bsc#1075088).\n- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032, bsc#1075088).\n- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088).\n- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1075088).\n- powerpc/pseries/rfi-flush: Drop PVR-based selection (bsc#1075088).\n- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075088).\n- powerpc/rfi-flush: Factor out init_fallback_flush() (bsc#1075088).\n- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1075088).\n- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075088).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075088).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1075088).\n- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).\n- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075088).\n- rfi-flush: Move rfi_flush_fallback_area to end of paca (bsc#1075088).\n- rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1075088).\n- rfi-flush: Switch to new linear fallback flush (bsc#1068032,bsc#1075088).\n- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).\n- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).\n- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1078875).\n- scsi: sr: wait for the medium to become ready (bsc#1048585).\n- scsi: virtio_scsi: let host do exception handling (bsc#936530,bsc#1060682).\n- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).\n- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).\n- x86, asm: Extend definitions of _ASM_* with a raw format (bsc#1068032 CVE-2017-5754).\n- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).\n- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).\n- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).\n- x86/kaiser: use trampoline stack for kernel entry.\n- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).\n- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).\n- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL (bsc#1068032 CVE-2017-5715).\n- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-kernel-20180207-13491,slehasp4-kernel-20180207-13491,slertesp4-kernel-20180207-13491,slessp4-kernel-20180207-13491,slexsp3-kernel-20180207-13491",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0555-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0555-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180555-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0555-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-February/003756.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1045538",
"url": "https://bugzilla.suse.com/1045538"
},
{
"category": "self",
"summary": "SUSE Bug 1048585",
"url": "https://bugzilla.suse.com/1048585"
},
{
"category": "self",
"summary": "SUSE Bug 1050431",
"url": "https://bugzilla.suse.com/1050431"
},
{
"category": "self",
"summary": "SUSE Bug 1054305",
"url": "https://bugzilla.suse.com/1054305"
},
{
"category": "self",
"summary": "SUSE Bug 1059174",
"url": "https://bugzilla.suse.com/1059174"
},
{
"category": "self",
"summary": "SUSE Bug 1060279",
"url": "https://bugzilla.suse.com/1060279"
},
{
"category": "self",
"summary": "SUSE Bug 1060682",
"url": "https://bugzilla.suse.com/1060682"
},
{
"category": "self",
"summary": "SUSE Bug 1063544",
"url": "https://bugzilla.suse.com/1063544"
},
{
"category": "self",
"summary": "SUSE Bug 1064861",
"url": "https://bugzilla.suse.com/1064861"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068984",
"url": "https://bugzilla.suse.com/1068984"
},
{
"category": "self",
"summary": "SUSE Bug 1069508",
"url": "https://bugzilla.suse.com/1069508"
},
{
"category": "self",
"summary": "SUSE Bug 1070623",
"url": "https://bugzilla.suse.com/1070623"
},
{
"category": "self",
"summary": "SUSE Bug 1070781",
"url": "https://bugzilla.suse.com/1070781"
},
{
"category": "self",
"summary": "SUSE Bug 1073311",
"url": "https://bugzilla.suse.com/1073311"
},
{
"category": "self",
"summary": "SUSE Bug 1074488",
"url": "https://bugzilla.suse.com/1074488"
},
{
"category": "self",
"summary": "SUSE Bug 1074621",
"url": "https://bugzilla.suse.com/1074621"
},
{
"category": "self",
"summary": "SUSE Bug 1074880",
"url": "https://bugzilla.suse.com/1074880"
},
{
"category": "self",
"summary": "SUSE Bug 1075088",
"url": "https://bugzilla.suse.com/1075088"
},
{
"category": "self",
"summary": "SUSE Bug 1075091",
"url": "https://bugzilla.suse.com/1075091"
},
{
"category": "self",
"summary": "SUSE Bug 1075410",
"url": "https://bugzilla.suse.com/1075410"
},
{
"category": "self",
"summary": "SUSE Bug 1075617",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "self",
"summary": "SUSE Bug 1075621",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "self",
"summary": "SUSE Bug 1075908",
"url": "https://bugzilla.suse.com/1075908"
},
{
"category": "self",
"summary": "SUSE Bug 1075994",
"url": "https://bugzilla.suse.com/1075994"
},
{
"category": "self",
"summary": "SUSE Bug 1076017",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "self",
"summary": "SUSE Bug 1076154",
"url": "https://bugzilla.suse.com/1076154"
},
{
"category": "self",
"summary": "SUSE Bug 1076278",
"url": "https://bugzilla.suse.com/1076278"
},
{
"category": "self",
"summary": "SUSE Bug 1076437",
"url": "https://bugzilla.suse.com/1076437"
},
{
"category": "self",
"summary": "SUSE Bug 1076849",
"url": "https://bugzilla.suse.com/1076849"
},
{
"category": "self",
"summary": "SUSE Bug 1077191",
"url": "https://bugzilla.suse.com/1077191"
},
{
"category": "self",
"summary": "SUSE Bug 1077355",
"url": "https://bugzilla.suse.com/1077355"
},
{
"category": "self",
"summary": "SUSE Bug 1077406",
"url": "https://bugzilla.suse.com/1077406"
},
{
"category": "self",
"summary": "SUSE Bug 1077487",
"url": "https://bugzilla.suse.com/1077487"
},
{
"category": "self",
"summary": "SUSE Bug 1077560",
"url": "https://bugzilla.suse.com/1077560"
},
{
"category": "self",
"summary": "SUSE Bug 1077922",
"url": "https://bugzilla.suse.com/1077922"
},
{
"category": "self",
"summary": "SUSE Bug 1078875",
"url": "https://bugzilla.suse.com/1078875"
},
{
"category": "self",
"summary": "SUSE Bug 1079917",
"url": "https://bugzilla.suse.com/1079917"
},
{
"category": "self",
"summary": "SUSE Bug 1080133",
"url": "https://bugzilla.suse.com/1080133"
},
{
"category": "self",
"summary": "SUSE Bug 1080359",
"url": "https://bugzilla.suse.com/1080359"
},
{
"category": "self",
"summary": "SUSE Bug 1080363",
"url": "https://bugzilla.suse.com/1080363"
},
{
"category": "self",
"summary": "SUSE Bug 1080372",
"url": "https://bugzilla.suse.com/1080372"
},
{
"category": "self",
"summary": "SUSE Bug 1080579",
"url": "https://bugzilla.suse.com/1080579"
},
{
"category": "self",
"summary": "SUSE Bug 1080685",
"url": "https://bugzilla.suse.com/1080685"
},
{
"category": "self",
"summary": "SUSE Bug 1080774",
"url": "https://bugzilla.suse.com/1080774"
},
{
"category": "self",
"summary": "SUSE Bug 1081500",
"url": "https://bugzilla.suse.com/1081500"
},
{
"category": "self",
"summary": "SUSE Bug 936530",
"url": "https://bugzilla.suse.com/936530"
},
{
"category": "self",
"summary": "SUSE Bug 962257",
"url": "https://bugzilla.suse.com/962257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1142857 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1142857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13215 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17741 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18017 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18079 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5332 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5333 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5333/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-02-27T16:16:04Z",
"generator": {
"date": "2018-02-27T16:16:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0555-1",
"initial_release_date": "2018-02-27T16:16:04Z",
"revision_history": [
{
"date": "2018-02-27T16:16:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"product": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"product_id": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"product": {
"name": "cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"product_id": "cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"product": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"product": {
"name": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"product_id": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586"
}
},
{
"category": "product_version",
"name": "drbd-8.4.4-0.27.4.2.i586",
"product": {
"name": "drbd-8.4.4-0.27.4.2.i586",
"product_id": "drbd-8.4.4-0.27.4.2.i586"
}
},
{
"category": "product_version",
"name": "drbd-bash-completion-8.4.4-0.27.4.2.i586",
"product": {
"name": "drbd-bash-completion-8.4.4-0.27.4.2.i586",
"product_id": "drbd-bash-completion-8.4.4-0.27.4.2.i586"
}
},
{
"category": "product_version",
"name": "drbd-heartbeat-8.4.4-0.27.4.2.i586",
"product": {
"name": "drbd-heartbeat-8.4.4-0.27.4.2.i586",
"product_id": "drbd-heartbeat-8.4.4-0.27.4.2.i586"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"product": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"product_id": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586"
}
},
{
"category": "product_version",
"name": "drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"product": {
"name": "drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"product_id": "drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586"
}
},
{
"category": "product_version",
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"product": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586"
}
},
{
"category": "product_version",
"name": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"product": {
"name": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"product_id": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586"
}
},
{
"category": "product_version",
"name": "drbd-pacemaker-8.4.4-0.27.4.2.i586",
"product": {
"name": "drbd-pacemaker-8.4.4-0.27.4.2.i586",
"product_id": "drbd-pacemaker-8.4.4-0.27.4.2.i586"
}
},
{
"category": "product_version",
"name": "drbd-udev-8.4.4-0.27.4.2.i586",
"product": {
"name": "drbd-udev-8.4.4-0.27.4.2.i586",
"product_id": "drbd-udev-8.4.4-0.27.4.2.i586"
}
},
{
"category": "product_version",
"name": "drbd-utils-8.4.4-0.27.4.2.i586",
"product": {
"name": "drbd-utils-8.4.4-0.27.4.2.i586",
"product_id": "drbd-utils-8.4.4-0.27.4.2.i586"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"product": {
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"product_id": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"product": {
"name": "gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"product_id": "gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"product": {
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"product_id": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"product": {
"name": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"product_id": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"product": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"product_id": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"product": {
"name": "ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"product_id": "ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"product": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"product": {
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"product_id": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-default-3.0.101-108.35.1.i586",
"product_id": "kernel-default-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-108.35.1.i586",
"product_id": "kernel-default-base-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-108.35.1.i586",
"product_id": "kernel-default-devel-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-108.35.1.i586",
"product_id": "kernel-ec2-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-108.35.1.i586",
"product_id": "kernel-ec2-base-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.35.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-pae-3.0.101-108.35.1.i586",
"product_id": "kernel-pae-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-108.35.1.i586",
"product_id": "kernel-pae-base-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-108.35.1.i586",
"product_id": "kernel-pae-devel-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-source-3.0.101-108.35.1.i586",
"product_id": "kernel-source-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-syms-3.0.101-108.35.1.i586",
"product_id": "kernel-syms-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-trace-3.0.101-108.35.1.i586",
"product_id": "kernel-trace-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-108.35.1.i586",
"product_id": "kernel-trace-base-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-108.35.1.i586",
"product_id": "kernel-trace-devel-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-xen-3.0.101-108.35.1.i586",
"product_id": "kernel-xen-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-108.35.1.i586",
"product_id": "kernel-xen-base-3.0.101-108.35.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.35.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-108.35.1.i586",
"product_id": "kernel-xen-devel-3.0.101-108.35.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"product": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"product_id": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"product": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64"
}
},
{
"category": "product_version",
"name": "drbd-8.4.4-0.27.4.2.ia64",
"product": {
"name": "drbd-8.4.4-0.27.4.2.ia64",
"product_id": "drbd-8.4.4-0.27.4.2.ia64"
}
},
{
"category": "product_version",
"name": "drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"product": {
"name": "drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"product_id": "drbd-bash-completion-8.4.4-0.27.4.2.ia64"
}
},
{
"category": "product_version",
"name": "drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"product": {
"name": "drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"product_id": "drbd-heartbeat-8.4.4-0.27.4.2.ia64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"product": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"product_id": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"product": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64"
}
},
{
"category": "product_version",
"name": "drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"product": {
"name": "drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"product_id": "drbd-pacemaker-8.4.4-0.27.4.2.ia64"
}
},
{
"category": "product_version",
"name": "drbd-udev-8.4.4-0.27.4.2.ia64",
"product": {
"name": "drbd-udev-8.4.4-0.27.4.2.ia64",
"product_id": "drbd-udev-8.4.4-0.27.4.2.ia64"
}
},
{
"category": "product_version",
"name": "drbd-utils-8.4.4-0.27.4.2.ia64",
"product": {
"name": "drbd-utils-8.4.4-0.27.4.2.ia64",
"product_id": "drbd-utils-8.4.4-0.27.4.2.ia64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"product": {
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"product_id": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"product": {
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"product_id": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"product": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"product_id": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"product": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.35.1.ia64",
"product": {
"name": "kernel-default-3.0.101-108.35.1.ia64",
"product_id": "kernel-default-3.0.101-108.35.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.35.1.ia64",
"product": {
"name": "kernel-default-base-3.0.101-108.35.1.ia64",
"product_id": "kernel-default-base-3.0.101-108.35.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.35.1.ia64",
"product": {
"name": "kernel-default-devel-3.0.101-108.35.1.ia64",
"product_id": "kernel-default-devel-3.0.101-108.35.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.35.1.ia64",
"product": {
"name": "kernel-source-3.0.101-108.35.1.ia64",
"product_id": "kernel-source-3.0.101-108.35.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.35.1.ia64",
"product": {
"name": "kernel-syms-3.0.101-108.35.1.ia64",
"product_id": "kernel-syms-3.0.101-108.35.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.35.1.ia64",
"product": {
"name": "kernel-trace-3.0.101-108.35.1.ia64",
"product_id": "kernel-trace-3.0.101-108.35.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.35.1.ia64",
"product": {
"name": "kernel-trace-base-3.0.101-108.35.1.ia64",
"product_id": "kernel-trace-base-3.0.101-108.35.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.35.1.ia64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.35.1.ia64",
"product_id": "kernel-trace-devel-3.0.101-108.35.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-docs-3.0.101-108.35.1.noarch",
"product": {
"name": "kernel-docs-3.0.101-108.35.1.noarch",
"product_id": "kernel-docs-3.0.101-108.35.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"product": {
"name": "cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"product_id": "cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"product": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"product_id": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"product": {
"name": "cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"product_id": "cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"product": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-8.4.4-0.27.4.2.ppc64",
"product": {
"name": "drbd-8.4.4-0.27.4.2.ppc64",
"product_id": "drbd-8.4.4-0.27.4.2.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"product": {
"name": "drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"product_id": "drbd-bash-completion-8.4.4-0.27.4.2.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"product": {
"name": "drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"product_id": "drbd-heartbeat-8.4.4-0.27.4.2.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"product": {
"name": "drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"product_id": "drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"product": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"product_id": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"product": {
"name": "drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"product_id": "drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"product": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"product": {
"name": "drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"product_id": "drbd-pacemaker-8.4.4-0.27.4.2.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-udev-8.4.4-0.27.4.2.ppc64",
"product": {
"name": "drbd-udev-8.4.4-0.27.4.2.ppc64",
"product_id": "drbd-udev-8.4.4-0.27.4.2.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-utils-8.4.4-0.27.4.2.ppc64",
"product": {
"name": "drbd-utils-8.4.4-0.27.4.2.ppc64",
"product_id": "drbd-utils-8.4.4-0.27.4.2.ppc64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"product": {
"name": "gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"product_id": "gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"product": {
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"product_id": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"product": {
"name": "gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"product_id": "gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"product": {
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"product_id": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"product": {
"name": "ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"product_id": "ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"product": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"product_id": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"product": {
"name": "ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"product_id": "ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"product": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-3.0.101-108.35.1.ppc64",
"product": {
"name": "kernel-bigmem-3.0.101-108.35.1.ppc64",
"product_id": "kernel-bigmem-3.0.101-108.35.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"product": {
"name": "kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"product_id": "kernel-bigmem-base-3.0.101-108.35.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"product": {
"name": "kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"product_id": "kernel-bigmem-devel-3.0.101-108.35.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.35.1.ppc64",
"product": {
"name": "kernel-default-3.0.101-108.35.1.ppc64",
"product_id": "kernel-default-3.0.101-108.35.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.35.1.ppc64",
"product": {
"name": "kernel-default-base-3.0.101-108.35.1.ppc64",
"product_id": "kernel-default-base-3.0.101-108.35.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.35.1.ppc64",
"product": {
"name": "kernel-default-devel-3.0.101-108.35.1.ppc64",
"product_id": "kernel-default-devel-3.0.101-108.35.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-3.0.101-108.35.1.ppc64",
"product": {
"name": "kernel-ppc64-3.0.101-108.35.1.ppc64",
"product_id": "kernel-ppc64-3.0.101-108.35.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"product": {
"name": "kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"product_id": "kernel-ppc64-base-3.0.101-108.35.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"product": {
"name": "kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"product_id": "kernel-ppc64-devel-3.0.101-108.35.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.35.1.ppc64",
"product": {
"name": "kernel-source-3.0.101-108.35.1.ppc64",
"product_id": "kernel-source-3.0.101-108.35.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.35.1.ppc64",
"product": {
"name": "kernel-syms-3.0.101-108.35.1.ppc64",
"product_id": "kernel-syms-3.0.101-108.35.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.35.1.ppc64",
"product": {
"name": "kernel-trace-3.0.101-108.35.1.ppc64",
"product_id": "kernel-trace-3.0.101-108.35.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.35.1.ppc64",
"product": {
"name": "kernel-trace-base-3.0.101-108.35.1.ppc64",
"product_id": "kernel-trace-base-3.0.101-108.35.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.35.1.ppc64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.35.1.ppc64",
"product_id": "kernel-trace-devel-3.0.101-108.35.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"product": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"product_id": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"product": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x"
}
},
{
"category": "product_version",
"name": "drbd-8.4.4-0.27.4.2.s390x",
"product": {
"name": "drbd-8.4.4-0.27.4.2.s390x",
"product_id": "drbd-8.4.4-0.27.4.2.s390x"
}
},
{
"category": "product_version",
"name": "drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"product": {
"name": "drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"product_id": "drbd-bash-completion-8.4.4-0.27.4.2.s390x"
}
},
{
"category": "product_version",
"name": "drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"product": {
"name": "drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"product_id": "drbd-heartbeat-8.4.4-0.27.4.2.s390x"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"product": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"product_id": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x"
}
},
{
"category": "product_version",
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"product": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x"
}
},
{
"category": "product_version",
"name": "drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"product": {
"name": "drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"product_id": "drbd-pacemaker-8.4.4-0.27.4.2.s390x"
}
},
{
"category": "product_version",
"name": "drbd-udev-8.4.4-0.27.4.2.s390x",
"product": {
"name": "drbd-udev-8.4.4-0.27.4.2.s390x",
"product_id": "drbd-udev-8.4.4-0.27.4.2.s390x"
}
},
{
"category": "product_version",
"name": "drbd-utils-8.4.4-0.27.4.2.s390x",
"product": {
"name": "drbd-utils-8.4.4-0.27.4.2.s390x",
"product_id": "drbd-utils-8.4.4-0.27.4.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"product": {
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"product_id": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"product": {
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"product_id": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"product": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"product_id": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"product": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.35.1.s390x",
"product": {
"name": "kernel-default-3.0.101-108.35.1.s390x",
"product_id": "kernel-default-3.0.101-108.35.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.35.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-108.35.1.s390x",
"product_id": "kernel-default-base-3.0.101-108.35.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.35.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-108.35.1.s390x",
"product_id": "kernel-default-devel-3.0.101-108.35.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-108.35.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-108.35.1.s390x",
"product_id": "kernel-default-man-3.0.101-108.35.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.35.1.s390x",
"product": {
"name": "kernel-source-3.0.101-108.35.1.s390x",
"product_id": "kernel-source-3.0.101-108.35.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.35.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-108.35.1.s390x",
"product_id": "kernel-syms-3.0.101-108.35.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.35.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-108.35.1.s390x",
"product_id": "kernel-trace-3.0.101-108.35.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.35.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-108.35.1.s390x",
"product_id": "kernel-trace-base-3.0.101-108.35.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.35.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-108.35.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-108.35.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"product": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"product_id": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"product": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"product": {
"name": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"product_id": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-8.4.4-0.27.4.2.x86_64",
"product": {
"name": "drbd-8.4.4-0.27.4.2.x86_64",
"product_id": "drbd-8.4.4-0.27.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"product": {
"name": "drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"product_id": "drbd-bash-completion-8.4.4-0.27.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"product": {
"name": "drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"product_id": "drbd-heartbeat-8.4.4-0.27.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"product": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"product_id": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"product": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"product": {
"name": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"product_id": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"product": {
"name": "drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"product_id": "drbd-pacemaker-8.4.4-0.27.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-udev-8.4.4-0.27.4.2.x86_64",
"product": {
"name": "drbd-udev-8.4.4-0.27.4.2.x86_64",
"product_id": "drbd-udev-8.4.4-0.27.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-utils-8.4.4-0.27.4.2.x86_64",
"product": {
"name": "drbd-utils-8.4.4-0.27.4.2.x86_64",
"product_id": "drbd-utils-8.4.4-0.27.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-xen-8.4.4-0.27.4.2.x86_64",
"product": {
"name": "drbd-xen-8.4.4-0.27.4.2.x86_64",
"product_id": "drbd-xen-8.4.4-0.27.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"product": {
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"product_id": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"product": {
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"product_id": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"product": {
"name": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"product_id": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"product": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"product_id": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"product": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"product": {
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"product_id": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"product": {
"name": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"product_id": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"product": {
"name": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"product_id": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"product": {
"name": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"product_id": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"product": {
"name": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"product_id": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"product": {
"name": "gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"product_id": "gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"product": {
"name": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"product_id": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"product": {
"name": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"product_id": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"product": {
"name": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"product_id": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.35.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-108.35.1.x86_64",
"product_id": "kernel-default-3.0.101-108.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.35.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-108.35.1.x86_64",
"product_id": "kernel-default-base-3.0.101-108.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.35.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-108.35.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-108.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.35.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-108.35.1.x86_64",
"product_id": "kernel-ec2-3.0.101-108.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.35.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-108.35.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-108.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-108.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.35.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-108.35.1.x86_64",
"product_id": "kernel-source-3.0.101-108.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.35.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-108.35.1.x86_64",
"product_id": "kernel-syms-3.0.101-108.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.35.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-108.35.1.x86_64",
"product_id": "kernel-trace-3.0.101-108.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.35.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-108.35.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-108.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.35.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.35.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-108.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.35.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-108.35.1.x86_64",
"product_id": "kernel-xen-3.0.101-108.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.35.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-108.35.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-108.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.35.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-108.35.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-108.35.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 11 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-hae:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-3.0.101-108.35.1.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
},
"product_reference": "kernel-docs-3.0.101-108.35.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64"
},
"product_reference": "cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586"
},
"product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64"
},
"product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64"
},
"product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x"
},
"product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64"
},
"product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586"
},
"product_reference": "cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64"
},
"product_reference": "cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586"
},
"product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64"
},
"product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64"
},
"product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x"
},
"product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64"
},
"product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586"
},
"product_reference": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64"
},
"product_reference": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.4-0.27.4.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586"
},
"product_reference": "drbd-8.4.4-0.27.4.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.4-0.27.4.2.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64"
},
"product_reference": "drbd-8.4.4-0.27.4.2.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.4-0.27.4.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64"
},
"product_reference": "drbd-8.4.4-0.27.4.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.4-0.27.4.2.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x"
},
"product_reference": "drbd-8.4.4-0.27.4.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.4-0.27.4.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64"
},
"product_reference": "drbd-8.4.4-0.27.4.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-bash-completion-8.4.4-0.27.4.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586"
},
"product_reference": "drbd-bash-completion-8.4.4-0.27.4.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-bash-completion-8.4.4-0.27.4.2.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64"
},
"product_reference": "drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-bash-completion-8.4.4-0.27.4.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64"
},
"product_reference": "drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-bash-completion-8.4.4-0.27.4.2.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x"
},
"product_reference": "drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-bash-completion-8.4.4-0.27.4.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64"
},
"product_reference": "drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-heartbeat-8.4.4-0.27.4.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586"
},
"product_reference": "drbd-heartbeat-8.4.4-0.27.4.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-heartbeat-8.4.4-0.27.4.2.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64"
},
"product_reference": "drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-heartbeat-8.4.4-0.27.4.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64"
},
"product_reference": "drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-heartbeat-8.4.4-0.27.4.2.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x"
},
"product_reference": "drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-heartbeat-8.4.4-0.27.4.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64"
},
"product_reference": "drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64"
},
"product_reference": "drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586"
},
"product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64"
},
"product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64"
},
"product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x"
},
"product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64"
},
"product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586"
},
"product_reference": "drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64"
},
"product_reference": "drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586"
},
"product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64"
},
"product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64"
},
"product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x"
},
"product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64"
},
"product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586"
},
"product_reference": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64"
},
"product_reference": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-pacemaker-8.4.4-0.27.4.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586"
},
"product_reference": "drbd-pacemaker-8.4.4-0.27.4.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-pacemaker-8.4.4-0.27.4.2.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64"
},
"product_reference": "drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-pacemaker-8.4.4-0.27.4.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64"
},
"product_reference": "drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-pacemaker-8.4.4-0.27.4.2.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x"
},
"product_reference": "drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-pacemaker-8.4.4-0.27.4.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64"
},
"product_reference": "drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-udev-8.4.4-0.27.4.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586"
},
"product_reference": "drbd-udev-8.4.4-0.27.4.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-udev-8.4.4-0.27.4.2.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64"
},
"product_reference": "drbd-udev-8.4.4-0.27.4.2.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-udev-8.4.4-0.27.4.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64"
},
"product_reference": "drbd-udev-8.4.4-0.27.4.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-udev-8.4.4-0.27.4.2.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x"
},
"product_reference": "drbd-udev-8.4.4-0.27.4.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-udev-8.4.4-0.27.4.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64"
},
"product_reference": "drbd-udev-8.4.4-0.27.4.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-8.4.4-0.27.4.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586"
},
"product_reference": "drbd-utils-8.4.4-0.27.4.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-8.4.4-0.27.4.2.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64"
},
"product_reference": "drbd-utils-8.4.4-0.27.4.2.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-8.4.4-0.27.4.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64"
},
"product_reference": "drbd-utils-8.4.4-0.27.4.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-8.4.4-0.27.4.2.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x"
},
"product_reference": "drbd-utils-8.4.4-0.27.4.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-8.4.4-0.27.4.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64"
},
"product_reference": "drbd-utils-8.4.4-0.27.4.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-xen-8.4.4-0.27.4.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64"
},
"product_reference": "drbd-xen-8.4.4-0.27.4.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64"
},
"product_reference": "gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586"
},
"product_reference": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64"
},
"product_reference": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64"
},
"product_reference": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x"
},
"product_reference": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64"
},
"product_reference": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586"
},
"product_reference": "gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64"
},
"product_reference": "gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586"
},
"product_reference": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64"
},
"product_reference": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64"
},
"product_reference": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x"
},
"product_reference": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64"
},
"product_reference": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586"
},
"product_reference": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64"
},
"product_reference": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64"
},
"product_reference": "ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586"
},
"product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64"
},
"product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64"
},
"product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x"
},
"product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64"
},
"product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586"
},
"product_reference": "ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64"
},
"product_reference": "ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586"
},
"product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64"
},
"product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64"
},
"product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x"
},
"product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64"
},
"product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586"
},
"product_reference": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64"
},
"product_reference": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64"
},
"product_reference": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64"
},
"product_reference": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64"
},
"product_reference": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64"
},
"product_reference": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64"
},
"product_reference": "gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64"
},
"product_reference": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64"
},
"product_reference": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64"
},
"product_reference": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-bigmem-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-default-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-default-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-default-base-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-default-devel-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-pae-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-source-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-source-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-syms-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-syms-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-trace-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-trace-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-trace-base-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-xen-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-bigmem-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-default-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-default-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-default-base-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-default-devel-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-pae-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-source-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-source-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-syms-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-syms-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-trace-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-trace-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-trace-base-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.35.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.35.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-xen-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-108.35.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-1142857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1142857"
}
],
"notes": [
{
"category": "general",
"text": "On multiple SR-IOV cars it is possible for VF\u0027s assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1142857",
"url": "https://www.suse.com/security/cve/CVE-2015-1142857"
},
{
"category": "external",
"summary": "SUSE Bug 1077355 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1077355"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1105108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-27T16:16:04Z",
"details": "moderate"
}
],
"title": "CVE-2015-1142857"
},
{
"cve": "CVE-2017-13215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13215"
}
],
"notes": [
{
"category": "general",
"text": "A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13215",
"url": "https://www.suse.com/security/cve/CVE-2017-13215"
},
{
"category": "external",
"summary": "SUSE Bug 1075908 for CVE-2017-13215",
"url": "https://bugzilla.suse.com/1075908"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-13215",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-27T16:16:04Z",
"details": "moderate"
}
],
"title": "CVE-2017-13215"
},
{
"cve": "CVE-2017-17741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17741"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17741",
"url": "https://www.suse.com/security/cve/CVE-2017-17741"
},
{
"category": "external",
"summary": "SUSE Bug 1073311 for CVE-2017-17741",
"url": "https://bugzilla.suse.com/1073311"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-17741",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-27T16:16:04Z",
"details": "important"
}
],
"title": "CVE-2017-17741"
},
{
"cve": "CVE-2017-18017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18017"
}
],
"notes": [
{
"category": "general",
"text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18017",
"url": "https://www.suse.com/security/cve/CVE-2017-18017"
},
{
"category": "external",
"summary": "SUSE Bug 1074488 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1074488"
},
{
"category": "external",
"summary": "SUSE Bug 1080255 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1080255"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 971126 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/971126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-27T16:16:04Z",
"details": "important"
}
],
"title": "CVE-2017-18017"
},
{
"cve": "CVE-2017-18079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18079"
}
],
"notes": [
{
"category": "general",
"text": "drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-\u003eexists value can change after it is validated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18079",
"url": "https://www.suse.com/security/cve/CVE-2017-18079"
},
{
"category": "external",
"summary": "SUSE Bug 1077922 for CVE-2017-18079",
"url": "https://bugzilla.suse.com/1077922"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18079",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-27T16:16:04Z",
"details": "low"
}
],
"title": "CVE-2017-18079"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-27T16:16:04Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-27T16:16:04Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-5332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5332"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5332",
"url": "https://www.suse.com/security/cve/CVE-2018-5332"
},
{
"category": "external",
"summary": "SUSE Bug 1075621 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-27T16:16:04Z",
"details": "low"
}
],
"title": "CVE-2018-5332"
},
{
"cve": "CVE-2018-5333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5333"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5333",
"url": "https://www.suse.com/security/cve/CVE-2018-5333"
},
{
"category": "external",
"summary": "SUSE Bug 1075617 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-27T16:16:04Z",
"details": "low"
}
],
"title": "CVE-2018-5333"
}
]
}
SUSE-SU-2018:0841-1
Vulnerability from csaf_suse - Published: 2018-03-29 09:58 - Updated: 2018-03-29 09:58Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).\n\n The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2015-1142857: On multiple SR-IOV cars it is possible for VF\u0027s assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver, i40e/i40evf driver and the DPDK, additionally multiple vendor NIC firmware is affected (bnc#1077355).\n- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream kernel skcipher. (bnc#1075908).\n- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).\n- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).\n- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-\u003eexists value can change after it is validated (bnc#1077922).\n- CVE-2018-1000004: In the Linux kernel a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).\n- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).\n- CVE-2018-5333: In the Linux kernel rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).\n\nThe following non-security bugs were fixed:\n\n- Add proper NX hadnling for !NX-capable systems also to kaiser_add_user_map(). (bsc#1076278).\n- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1045538).\n- alsa: aloop: Fix racy hw constraints adjustment (bsc#1045538).\n- alsa: aloop: Release cable upon open error path (bsc#1045538).\n- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1045538).\n- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1045538).\n- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1045538).\n- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1045538).\n- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1045538).\n- btrfs: cleanup unnecessary assignment when cleaning up all the residual transaction (FATE#325056).\n- btrfs: copy fsid to super_block s_uuid (bsc#1080774).\n- btrfs: do not wait for all the writers circularly during the transaction commit (FATE#325056).\n- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1080363).\n- btrfs: fix two use-after-free bugs with transaction cleanup (FATE#325056).\n- btrfs: make the state of the transaction more readable (FATE#325056).\n- btrfs: qgroup: exit the rescan worker during umount (bsc#1080685).\n- btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#1080685).\n- btrfs: reset intwrite on transaction abort (FATE#325056).\n- btrfs: set qgroup_ulist to be null after calling ulist_free() (bsc#1080359).\n- btrfs: stop waiting on current trans if we aborted (FATE#325056).\n- cdc-acm: apply quirk for card reader (bsc#1060279).\n- cdrom: factor out common open_for_* code (bsc#1048585).\n- cdrom: wait for tray to close (bsc#1048585).\n- delay: add poll_event_interruptible (bsc#1048585).\n- dm flakey: add corrupt_bio_byte feature (bsc#1080372).\n- dm flakey: add drop_writes (bsc#1080372).\n- dm flakey: error READ bios during the down_interval (bsc#1080372).\n- dm flakey: fix crash on read when corrupt_bio_byte not set (bsc#1080372).\n- dm flakey: fix reads to be issued if drop_writes configured (bsc#1080372).\n- dm flakey: introduce \u0027error_writes\u0027 feature (bsc#1080372).\n- dm flakey: support feature args (bsc#1080372).\n- dm flakey: use dm_target_offset and support discards (bsc#1080372).\n- ext2: free memory allocated and forget buffer head when io error happens (bnc#1069508).\n- ext2: use unlikely to improve the efficiency of the kernel (bnc#1069508).\n- ext3: add necessary check in case IO error happens (bnc#1069508).\n- ext3: use unlikely to improve the efficiency of the kernel (bnc#1069508).\n- fork: clear thread stack upon allocation (bsc#1077560).\n- kabi/severities ignore Cell-specific symbols\n- kaiser: do not clobber ZF by calling ENABLE_IBRS after test and before jz\n- kaiser: fix ia32 compat sysexit (bsc#1080579) sysexit_from_sys_call cannot make assumption of accessible stack after CR3 switch, and therefore should use the SWITCH_USER_CR3_NO_STACK method to flip the pagetable hierarchy.\n- kaiser: Fix trampoline stack loading issue on XEN PV\n- kaiser: handle non-accessible stack in sysretl_from_sys_call properly (bsc#bsc#1080579)\n- kaiser: make sure not to touch stack after CR3 switch in compat syscall return\n- kaiser: really do switch away from trampoline stack to kernel stack in ia32_syscall entry (bsc#1080579)\n- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).\n- keys: trusted: fix writing past end of buffer in trusted_read() (bsc#1074880).\n- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).\n- mISDN: fix a loop count (bsc#1077191).\n- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).\n- nfsd: do not share group_info among threads (bsc@1070623).\n- ocfs2: avoid blocking in ocfs2_mark_lockres_freeing() in downconvert thread (bsc#1076437).\n- ocfs2: do not set OCFS2_LOCK_UPCONVERT_FINISHING if nonblocking lock can not be granted at once (bsc#1076437).\n- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).\n- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075088).\n- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).\n- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).\n- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075088).\n- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032, bsc#1075088).\n- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075088).\n- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).\n- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075088).\n- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075088).\n- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).\n- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075088).\n- powerpc: Fix register clobbering when accumulating stolen time (bsc#1059174).\n- powerpc: Fix up the kdump base cap to 128M (bsc#1079917, bsc#1077487).\n- powerpc: Mark CONFIG_PPC_DEBUG_RFI as BROKEN (bsc#1075088).\n- powerpc/perf: Dereference BHRB entries safely (bsc#1064861, FATE#317619, git-fixes).\n- powerpc/perf: Fix book3s kernel to userspace backtraces (bsc#1080133).\n- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags \u0026 wrapper (bsc#1068032, bsc#1075088).\n- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075088).\n- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075088).\n- powerpc/pseries: Kill all prefetch streams on context switch (bsc#1068032, bsc#1075088).\n- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032, bsc#1075088).\n- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088).\n- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1075088).\n- powerpc/pseries/rfi-flush: Drop PVR-based selection (bsc#1075088).\n- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075088).\n- powerpc/rfi-flush: Factor out init_fallback_flush() (bsc#1075088).\n- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1075088).\n- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075088).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075088).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1075088).\n- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).\n- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075088).\n- rfi-flush: Move rfi_flush_fallback_area to end of paca (bsc#1075088).\n- rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1075088).\n- rfi-flush: Switch to new linear fallback flush (bsc#1068032, bsc#1075088).\n- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).\n- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).\n- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1078875).\n- scsi: sr: wait for the medium to become ready (bsc#1048585).\n- scsi: virtio_scsi: let host do exception handling (bsc#936530,bsc#1060682).\n- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- Update config files: enable CPU vulnerabilities reporting via sysfs\n- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).\n- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).\n- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).\n- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).\n- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).\n- x86/kaiser: use trampoline stack for kernel entry.\n- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).\n- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).\n- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slertesp4-kernel-rt-20180209-13539",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0841-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0841-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180841-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0841-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003854.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1045538",
"url": "https://bugzilla.suse.com/1045538"
},
{
"category": "self",
"summary": "SUSE Bug 1048585",
"url": "https://bugzilla.suse.com/1048585"
},
{
"category": "self",
"summary": "SUSE Bug 1049128",
"url": "https://bugzilla.suse.com/1049128"
},
{
"category": "self",
"summary": "SUSE Bug 1050431",
"url": "https://bugzilla.suse.com/1050431"
},
{
"category": "self",
"summary": "SUSE Bug 1054305",
"url": "https://bugzilla.suse.com/1054305"
},
{
"category": "self",
"summary": "SUSE Bug 1059174",
"url": "https://bugzilla.suse.com/1059174"
},
{
"category": "self",
"summary": "SUSE Bug 1060279",
"url": "https://bugzilla.suse.com/1060279"
},
{
"category": "self",
"summary": "SUSE Bug 1060682",
"url": "https://bugzilla.suse.com/1060682"
},
{
"category": "self",
"summary": "SUSE Bug 1063544",
"url": "https://bugzilla.suse.com/1063544"
},
{
"category": "self",
"summary": "SUSE Bug 1064861",
"url": "https://bugzilla.suse.com/1064861"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068984",
"url": "https://bugzilla.suse.com/1068984"
},
{
"category": "self",
"summary": "SUSE Bug 1069508",
"url": "https://bugzilla.suse.com/1069508"
},
{
"category": "self",
"summary": "SUSE Bug 1070623",
"url": "https://bugzilla.suse.com/1070623"
},
{
"category": "self",
"summary": "SUSE Bug 1070781",
"url": "https://bugzilla.suse.com/1070781"
},
{
"category": "self",
"summary": "SUSE Bug 1073311",
"url": "https://bugzilla.suse.com/1073311"
},
{
"category": "self",
"summary": "SUSE Bug 1074488",
"url": "https://bugzilla.suse.com/1074488"
},
{
"category": "self",
"summary": "SUSE Bug 1074621",
"url": "https://bugzilla.suse.com/1074621"
},
{
"category": "self",
"summary": "SUSE Bug 1074880",
"url": "https://bugzilla.suse.com/1074880"
},
{
"category": "self",
"summary": "SUSE Bug 1075088",
"url": "https://bugzilla.suse.com/1075088"
},
{
"category": "self",
"summary": "SUSE Bug 1075091",
"url": "https://bugzilla.suse.com/1075091"
},
{
"category": "self",
"summary": "SUSE Bug 1075410",
"url": "https://bugzilla.suse.com/1075410"
},
{
"category": "self",
"summary": "SUSE Bug 1075617",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "self",
"summary": "SUSE Bug 1075621",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "self",
"summary": "SUSE Bug 1075908",
"url": "https://bugzilla.suse.com/1075908"
},
{
"category": "self",
"summary": "SUSE Bug 1075994",
"url": "https://bugzilla.suse.com/1075994"
},
{
"category": "self",
"summary": "SUSE Bug 1076017",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "self",
"summary": "SUSE Bug 1076154",
"url": "https://bugzilla.suse.com/1076154"
},
{
"category": "self",
"summary": "SUSE Bug 1076278",
"url": "https://bugzilla.suse.com/1076278"
},
{
"category": "self",
"summary": "SUSE Bug 1076437",
"url": "https://bugzilla.suse.com/1076437"
},
{
"category": "self",
"summary": "SUSE Bug 1076849",
"url": "https://bugzilla.suse.com/1076849"
},
{
"category": "self",
"summary": "SUSE Bug 1077191",
"url": "https://bugzilla.suse.com/1077191"
},
{
"category": "self",
"summary": "SUSE Bug 1077355",
"url": "https://bugzilla.suse.com/1077355"
},
{
"category": "self",
"summary": "SUSE Bug 1077406",
"url": "https://bugzilla.suse.com/1077406"
},
{
"category": "self",
"summary": "SUSE Bug 1077487",
"url": "https://bugzilla.suse.com/1077487"
},
{
"category": "self",
"summary": "SUSE Bug 1077560",
"url": "https://bugzilla.suse.com/1077560"
},
{
"category": "self",
"summary": "SUSE Bug 1077922",
"url": "https://bugzilla.suse.com/1077922"
},
{
"category": "self",
"summary": "SUSE Bug 1078875",
"url": "https://bugzilla.suse.com/1078875"
},
{
"category": "self",
"summary": "SUSE Bug 1079917",
"url": "https://bugzilla.suse.com/1079917"
},
{
"category": "self",
"summary": "SUSE Bug 1080133",
"url": "https://bugzilla.suse.com/1080133"
},
{
"category": "self",
"summary": "SUSE Bug 1080359",
"url": "https://bugzilla.suse.com/1080359"
},
{
"category": "self",
"summary": "SUSE Bug 1080363",
"url": "https://bugzilla.suse.com/1080363"
},
{
"category": "self",
"summary": "SUSE Bug 1080372",
"url": "https://bugzilla.suse.com/1080372"
},
{
"category": "self",
"summary": "SUSE Bug 1080579",
"url": "https://bugzilla.suse.com/1080579"
},
{
"category": "self",
"summary": "SUSE Bug 1080685",
"url": "https://bugzilla.suse.com/1080685"
},
{
"category": "self",
"summary": "SUSE Bug 1080774",
"url": "https://bugzilla.suse.com/1080774"
},
{
"category": "self",
"summary": "SUSE Bug 1081500",
"url": "https://bugzilla.suse.com/1081500"
},
{
"category": "self",
"summary": "SUSE Bug 936530",
"url": "https://bugzilla.suse.com/936530"
},
{
"category": "self",
"summary": "SUSE Bug 962257",
"url": "https://bugzilla.suse.com/962257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1142857 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1142857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13215 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17741 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18017 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18079 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5332 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5333 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5333/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-03-29T09:58:40Z",
"generator": {
"date": "2018-03-29T09:58:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0841-1",
"initial_release_date": "2018-03-29T09:58:40Z",
"revision_history": [
{
"date": "2018-03-29T09:58:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"product": {
"name": "kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"product_id": "kernel-rt-3.0.101.rt130-69.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"product": {
"name": "kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"product_id": "kernel-rt-base-3.0.101.rt130-69.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"product": {
"name": "kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"product_id": "kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"product": {
"name": "kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"product_id": "kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"product": {
"name": "kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"product_id": "kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"product": {
"name": "kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"product_id": "kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"product": {
"name": "kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"product_id": "kernel-source-rt-3.0.101.rt130-69.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64",
"product": {
"name": "kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64",
"product_id": "kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64"
},
"product_reference": "kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64"
},
"product_reference": "kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64"
},
"product_reference": "kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64"
},
"product_reference": "kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64"
},
"product_reference": "kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64"
},
"product_reference": "kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64"
},
"product_reference": "kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
},
"product_reference": "kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-1142857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1142857"
}
],
"notes": [
{
"category": "general",
"text": "On multiple SR-IOV cars it is possible for VF\u0027s assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1142857",
"url": "https://www.suse.com/security/cve/CVE-2015-1142857"
},
{
"category": "external",
"summary": "SUSE Bug 1077355 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1077355"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1105108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-29T09:58:40Z",
"details": "moderate"
}
],
"title": "CVE-2015-1142857"
},
{
"cve": "CVE-2017-13215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13215"
}
],
"notes": [
{
"category": "general",
"text": "A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13215",
"url": "https://www.suse.com/security/cve/CVE-2017-13215"
},
{
"category": "external",
"summary": "SUSE Bug 1075908 for CVE-2017-13215",
"url": "https://bugzilla.suse.com/1075908"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-13215",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-29T09:58:40Z",
"details": "moderate"
}
],
"title": "CVE-2017-13215"
},
{
"cve": "CVE-2017-17741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17741"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17741",
"url": "https://www.suse.com/security/cve/CVE-2017-17741"
},
{
"category": "external",
"summary": "SUSE Bug 1073311 for CVE-2017-17741",
"url": "https://bugzilla.suse.com/1073311"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-17741",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-29T09:58:40Z",
"details": "important"
}
],
"title": "CVE-2017-17741"
},
{
"cve": "CVE-2017-18017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18017"
}
],
"notes": [
{
"category": "general",
"text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18017",
"url": "https://www.suse.com/security/cve/CVE-2017-18017"
},
{
"category": "external",
"summary": "SUSE Bug 1074488 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1074488"
},
{
"category": "external",
"summary": "SUSE Bug 1080255 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1080255"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 971126 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/971126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-29T09:58:40Z",
"details": "important"
}
],
"title": "CVE-2017-18017"
},
{
"cve": "CVE-2017-18079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18079"
}
],
"notes": [
{
"category": "general",
"text": "drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-\u003eexists value can change after it is validated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18079",
"url": "https://www.suse.com/security/cve/CVE-2017-18079"
},
{
"category": "external",
"summary": "SUSE Bug 1077922 for CVE-2017-18079",
"url": "https://bugzilla.suse.com/1077922"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18079",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-29T09:58:40Z",
"details": "low"
}
],
"title": "CVE-2017-18079"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-29T09:58:40Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-29T09:58:40Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-5332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5332"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5332",
"url": "https://www.suse.com/security/cve/CVE-2018-5332"
},
{
"category": "external",
"summary": "SUSE Bug 1075621 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-29T09:58:40Z",
"details": "low"
}
],
"title": "CVE-2018-5332"
},
{
"cve": "CVE-2018-5333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5333"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5333",
"url": "https://www.suse.com/security/cve/CVE-2018-5333"
},
{
"category": "external",
"summary": "SUSE Bug 1075617 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-29T09:58:40Z",
"details": "low"
}
],
"title": "CVE-2018-5333"
}
]
}
SUSE-SU-2018:0678-1
Vulnerability from csaf_suse - Published: 2018-03-14 17:37 - Updated: 2018-03-14 17:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via\n side effects of speculative execution, aka \u0027Spectre\u0027 and \u0027Meltdown\u0027 attacks\n (bsc#1074562, bsc#1068032)\n- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged\n users to cause a denial of service (out-of-bounds read and QEMU process crash)\n by leveraging improper memory address validation (bsc#1076116).\n- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest\n privileged users to cause a denial of service (out-of-bounds array access and\n QEMU process crash) via vectors related to negative pitch (bsc#1076180).\n- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded\n recursion, stack consumption, and hypervisor crash) or possibly gain privileges\n via crafted page-table stacking (bsc#1061081)\n- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host\n OS crash) or gain host OS privileges in shadow mode by mapping a certain\n auxiliary page (bsc#1070158).\n- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS\n crash) or gain host OS privileges by leveraging an incorrect mask for\n reference-count overflow checking in shadow mode (bsc#1070159).\n- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS\n crash) or gain host OS privileges by leveraging incorrect error handling for\n reference counting in shadow mode (bsc#1070160).\n- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host\n OS crash) if shadow mode and log-dirty mode are in place, because of an\n incorrect assertion related to M2P (bsc#1070163).\n- Added missing intermediate preemption checks for guest requesting removal of\n memory. This allowed malicious guest administrator to cause denial of service\n due to the high cost of this operation (bsc#1080635).\n- Because of XEN not returning the proper error messages when transitioning\n grant tables from v2 to v1 a malicious guest was able to cause DoS or\n potentially allowed for privilege escalation as well as information leaks\n (bsc#1080662).\n- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an\n integer overflow flaw allowing a privileged user to crash the Qemu process on\n the host resulting in DoS (bsc#1024307)\n- Unprivileged domains could have issued well-timed writes to xenstore which\n conflict with transactions to stall progress of the control domain or driver\n domain, possibly leading to DoS (bsc#1030144, XSA-206).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-xen-13511,slessp3-xen-13511",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0678-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0678-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180678-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0678-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html"
},
{
"category": "self",
"summary": "SUSE Bug 1024307",
"url": "https://bugzilla.suse.com/1024307"
},
{
"category": "self",
"summary": "SUSE Bug 1030144",
"url": "https://bugzilla.suse.com/1030144"
},
{
"category": "self",
"summary": "SUSE Bug 1061081",
"url": "https://bugzilla.suse.com/1061081"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1070158",
"url": "https://bugzilla.suse.com/1070158"
},
{
"category": "self",
"summary": "SUSE Bug 1070159",
"url": "https://bugzilla.suse.com/1070159"
},
{
"category": "self",
"summary": "SUSE Bug 1070160",
"url": "https://bugzilla.suse.com/1070160"
},
{
"category": "self",
"summary": "SUSE Bug 1070163",
"url": "https://bugzilla.suse.com/1070163"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1076116",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "self",
"summary": "SUSE Bug 1076180",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "self",
"summary": "SUSE Bug 1080635",
"url": "https://bugzilla.suse.com/1080635"
},
{
"category": "self",
"summary": "SUSE Bug 1080662",
"url": "https://bugzilla.suse.com/1080662"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11334 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11334/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15595 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17563 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17563/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17564 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17565 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17566 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18030 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5898 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5898/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5683 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5683/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7540 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7540/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7541 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7541/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-03-14T17:37:06Z",
"generator": {
"date": "2018-03-14T17:37:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0678-1",
"initial_release_date": "2018-03-14T17:37:06Z",
"revision_history": [
{
"date": "2018-03-14T17:37:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"product": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586"
}
},
{
"category": "product_version",
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"product": {
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"product_id": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.2.5_21-45.19.1.i586",
"product": {
"name": "xen-libs-4.2.5_21-45.19.1.i586",
"product_id": "xen-libs-4.2.5_21-45.19.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.2.5_21-45.19.1.i586",
"product": {
"name": "xen-tools-domU-4.2.5_21-45.19.1.i586",
"product_id": "xen-tools-domU-4.2.5_21-45.19.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.2.5_21-45.19.1.x86_64",
"product": {
"name": "xen-4.2.5_21-45.19.1.x86_64",
"product_id": "xen-4.2.5_21-45.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.2.5_21-45.19.1.x86_64",
"product": {
"name": "xen-doc-html-4.2.5_21-45.19.1.x86_64",
"product_id": "xen-doc-html-4.2.5_21-45.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"product": {
"name": "xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"product_id": "xen-doc-pdf-4.2.5_21-45.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"product": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.2.5_21-45.19.1.x86_64",
"product": {
"name": "xen-libs-4.2.5_21-45.19.1.x86_64",
"product_id": "xen-libs-4.2.5_21-45.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"product_id": "xen-libs-32bit-4.2.5_21-45.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.2.5_21-45.19.1.x86_64",
"product": {
"name": "xen-tools-4.2.5_21-45.19.1.x86_64",
"product_id": "xen-tools-4.2.5_21-45.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.2.5_21-45.19.1.x86_64",
"product": {
"name": "xen-tools-domU-4.2.5_21-45.19.1.x86_64",
"product_id": "xen-tools-domU-4.2.5_21-45.19.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586"
},
"product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-45.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586"
},
"product_reference": "xen-libs-4.2.5_21-45.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-45.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586"
},
"product_reference": "xen-tools-domU-4.2.5_21-45.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.2.5_21-45.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64"
},
"product_reference": "xen-4.2.5_21-45.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.2.5_21-45.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64"
},
"product_reference": "xen-doc-html-4.2.5_21-45.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-pdf-4.2.5_21-45.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64"
},
"product_reference": "xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586"
},
"product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-45.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586"
},
"product_reference": "xen-libs-4.2.5_21-45.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-45.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64"
},
"product_reference": "xen-libs-4.2.5_21-45.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.2.5_21-45.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.2.5_21-45.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64"
},
"product_reference": "xen-tools-4.2.5_21-45.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-45.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586"
},
"product_reference": "xen-tools-domU-4.2.5_21-45.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-45.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
},
"product_reference": "xen-tools-domU-4.2.5_21-45.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-11334",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11334"
}
],
"notes": [
{
"category": "general",
"text": "The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11334",
"url": "https://www.suse.com/security/cve/CVE-2017-11334"
},
{
"category": "external",
"summary": "SUSE Bug 1048902 for CVE-2017-11334",
"url": "https://bugzilla.suse.com/1048902"
},
{
"category": "external",
"summary": "SUSE Bug 1048920 for CVE-2017-11334",
"url": "https://bugzilla.suse.com/1048920"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-14T17:37:06Z",
"details": "moderate"
}
],
"title": "CVE-2017-11334"
},
{
"cve": "CVE-2017-15595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15595"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15595",
"url": "https://www.suse.com/security/cve/CVE-2017-15595"
},
{
"category": "external",
"summary": "SUSE Bug 1061081 for CVE-2017-15595",
"url": "https://bugzilla.suse.com/1061081"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-15595",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-14T17:37:06Z",
"details": "important"
}
],
"title": "CVE-2017-15595"
},
{
"cve": "CVE-2017-17563",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17563"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17563",
"url": "https://www.suse.com/security/cve/CVE-2017-17563"
},
{
"category": "external",
"summary": "SUSE Bug 1070159 for CVE-2017-17563",
"url": "https://bugzilla.suse.com/1070159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-14T17:37:06Z",
"details": "moderate"
}
],
"title": "CVE-2017-17563"
},
{
"cve": "CVE-2017-17564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17564"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17564",
"url": "https://www.suse.com/security/cve/CVE-2017-17564"
},
{
"category": "external",
"summary": "SUSE Bug 1070160 for CVE-2017-17564",
"url": "https://bugzilla.suse.com/1070160"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17564",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-14T17:37:06Z",
"details": "moderate"
}
],
"title": "CVE-2017-17564"
},
{
"cve": "CVE-2017-17565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17565"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) if shadow mode and log-dirty mode are in place, because of an incorrect assertion related to M2P.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17565",
"url": "https://www.suse.com/security/cve/CVE-2017-17565"
},
{
"category": "external",
"summary": "SUSE Bug 1070163 for CVE-2017-17565",
"url": "https://bugzilla.suse.com/1070163"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17565",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-14T17:37:06Z",
"details": "moderate"
}
],
"title": "CVE-2017-17565"
},
{
"cve": "CVE-2017-17566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17566"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) or gain host OS privileges in shadow mode by mapping a certain auxiliary page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17566",
"url": "https://www.suse.com/security/cve/CVE-2017-17566"
},
{
"category": "external",
"summary": "SUSE Bug 1070158 for CVE-2017-17566",
"url": "https://bugzilla.suse.com/1070158"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17566",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-14T17:37:06Z",
"details": "moderate"
}
],
"title": "CVE-2017-17566"
},
{
"cve": "CVE-2017-18030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18030"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18030",
"url": "https://www.suse.com/security/cve/CVE-2017-18030"
},
{
"category": "external",
"summary": "SUSE Bug 1076179 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076179"
},
{
"category": "external",
"summary": "SUSE Bug 1076180 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-14T17:37:06Z",
"details": "low"
}
],
"title": "CVE-2017-18030"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-14T17:37:06Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-14T17:37:06Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-14T17:37:06Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-5898",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5898"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5898",
"url": "https://www.suse.com/security/cve/CVE-2017-5898"
},
{
"category": "external",
"summary": "SUSE Bug 1023907 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1023907"
},
{
"category": "external",
"summary": "SUSE Bug 1024307 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1024307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-14T17:37:06Z",
"details": "moderate"
}
],
"title": "CVE-2017-5898"
},
{
"cve": "CVE-2018-5683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5683"
}
],
"notes": [
{
"category": "general",
"text": "The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5683",
"url": "https://www.suse.com/security/cve/CVE-2018-5683"
},
{
"category": "external",
"summary": "SUSE Bug 1076114 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076114"
},
{
"category": "external",
"summary": "SUSE Bug 1076116 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-14T17:37:06Z",
"details": "moderate"
}
],
"title": "CVE-2018-5683"
},
{
"cve": "CVE-2018-7540",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7540"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7540",
"url": "https://www.suse.com/security/cve/CVE-2018-7540"
},
{
"category": "external",
"summary": "SUSE Bug 1080635 for CVE-2018-7540",
"url": "https://bugzilla.suse.com/1080635"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-7540",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-14T17:37:06Z",
"details": "moderate"
}
],
"title": "CVE-2018-7540"
},
{
"cve": "CVE-2018-7541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7541"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing guest OS users to cause a denial of service (hypervisor crash) or gain privileges by triggering a grant-table transition from v2 to v1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7541",
"url": "https://www.suse.com/security/cve/CVE-2018-7541"
},
{
"category": "external",
"summary": "SUSE Bug 1080662 for CVE-2018-7541",
"url": "https://bugzilla.suse.com/1080662"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-7541",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-14T17:37:06Z",
"details": "important"
}
],
"title": "CVE-2018-7541"
}
]
}
SUSE-SU-2018:0008-1
Vulnerability from csaf_suse - Published: 2018-01-03 23:03 - Updated: 2018-01-03 23:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-firmware",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-firmware fixes the following issues:\n\n- Add microcode_amd_fam17h.bin (bsc#1068032 CVE-2017-5715)\n\nThis new firmware disables branch prediction on AMD family 17h\nprocessor to mitigate a attack on the branch predictor that could\nlead to information disclosure from e.g. kernel memory (bsc#1068032\nCVE-2017-5715).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-CAASP-ALL-2018-8,SUSE-SLE-DESKTOP-12-SP2-2018-8,SUSE-SLE-DESKTOP-12-SP3-2018-8,SUSE-SLE-RPI-12-SP2-2018-8,SUSE-SLE-SERVER-12-SP2-2018-8,SUSE-SLE-SERVER-12-SP3-2018-8",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0008-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0008-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180008-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0008-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003562.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for kernel-firmware",
"tracking": {
"current_release_date": "2018-01-03T23:03:13Z",
"generator": {
"date": "2018-01-03T23:03:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0008-1",
"initial_release_date": "2018-01-03T23:03:13Z",
"revision_history": [
{
"date": "2018-01-03T23:03:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-20170530-21.16.1.noarch",
"product": {
"name": "kernel-firmware-20170530-21.16.1.noarch",
"product_id": "kernel-firmware-20170530-21.16.1.noarch"
}
},
{
"category": "product_version",
"name": "ucode-amd-20170530-21.16.1.noarch",
"product": {
"name": "ucode-amd-20170530-21.16.1.noarch",
"product_id": "ucode-amd-20170530-21.16.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.16.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-firmware-20170530-21.16.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20170530-21.16.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:ucode-amd-20170530-21.16.1.noarch"
},
"product_reference": "ucode-amd-20170530-21.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.16.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-firmware-20170530-21.16.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20170530-21.16.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:ucode-amd-20170530-21.16.1.noarch"
},
"product_reference": "ucode-amd-20170530-21.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.16.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-firmware-20170530-21.16.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-firmware-20170530-21.16.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20170530-21.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:ucode-amd-20170530-21.16.1.noarch"
},
"product_reference": "ucode-amd-20170530-21.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-firmware-20170530-21.16.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20170530-21.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-amd-20170530-21.16.1.noarch"
},
"product_reference": "ucode-amd-20170530-21.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-firmware-20170530-21.16.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20170530-21.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:ucode-amd-20170530-21.16.1.noarch"
},
"product_reference": "ucode-amd-20170530-21.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-firmware-20170530-21.16.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20170530-21.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-amd-20170530-21.16.1.noarch"
},
"product_reference": "ucode-amd-20170530-21.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-amd-20170530-21.16.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-amd-20170530-21.16.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-amd-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-firmware-20170530-21.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-amd-20170530-21.16.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-03T23:03:13Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:0219-1
Vulnerability from csaf_suse - Published: 2018-01-25 16:38 - Updated: 2018-01-25 16:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for webkit2gtk3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThis update for webkit2gtk3 fixes the following issues:\n\nUpdate to version 2.18.5:\n\n + Disable SharedArrayBuffers from Web API.\n + Reduce the precision of \u0027high\u0027 resolution time to 1ms.\n + bsc#1075419 - Security fixes: includes improvements to mitigate\n the effects of Spectre and Meltdown (CVE-2017-5753 and CVE-2017-5715).\n\nUpdate to version 2.18.4:\n\n + Make WebDriver implementation more spec compliant.\n + Fix a bug when trying to remove cookies before a web process is\n spawned.\n + WebKitWebDriver process no longer links to\n libjavascriptcoregtk.\n + Fix several memory leaks in GStreamer media backend.\n + bsc#1073654 - Security fixes: CVE-2017-13866, CVE-2017-13870,\n CVE-2017-7156, CVE-2017-13856.\n\nUpdate to version 2.18.3:\n\n + Improve calculation of font metrics to prevent scrollbars from\n being shown unnecessarily in some cases.\n + Fix handling of null capabilities in WebDriver implementation.\n + Security fixes: CVE-2017-13798, CVE-2017-13788, CVE-2017-13803.\n\nUpdate to version 2.18.2:\n\n + Fix rendering of arabic text.\n + Fix a crash in the web process when decoding GIF images.\n + Fix rendering of wind in Windy.com.\n + Fix several crashes and rendering issues.\n\nUpdate to version 2.18.1:\n\n + Improve performance of GIF animations.\n + Fix garbled display in GMail.\n + Fix rendering of several material design icons when using the\n web font.\n + Fix flickering when resizing the window in Wayland.\n + Prevent default kerberos authentication credentials from being\n used in ephemeral sessions.\n + Fix a crash when webkit_web_resource_get_data() is cancelled.\n + Correctly handle touchmove and touchend events in\n WebKitWebView.\n + Fix the build with enchant 2.1.1.\n + Fix the build in HPPA and Alpha.\n + Fix several crashes and rendering issues.\n + Security fixes: CVE-2017-7081, CVE-2017-7087, CVE-2017-7089,\n CVE-2017-7090, CVE-2017-7091, CVE-2017-7092, CVE-2017-7093,\n CVE-2017-7094, CVE-2017-7095, CVE-2017-7096, CVE-2017-7098,\n CVE-2017-7099, CVE-2017-7100, CVE-2017-7102, CVE-2017-7104,\n CVE-2017-7107, CVE-2017-7109, CVE-2017-7111, CVE-2017-7117,\n CVE-2017-7120, CVE-2017-7142.\n\n- Enable gold linker on s390/s390x on SLE15/Tumbleweed.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP2-2018-150,SUSE-SLE-DESKTOP-12-SP3-2018-150,SUSE-SLE-RPI-12-SP2-2018-150,SUSE-SLE-SDK-12-SP2-2018-150,SUSE-SLE-SDK-12-SP3-2018-150,SUSE-SLE-SERVER-12-SP2-2018-150,SUSE-SLE-SERVER-12-SP3-2018-150,SUSE-SLE-WE-12-SP2-2018-150,SUSE-SLE-WE-12-SP3-2018-150",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0219-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0219-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180219-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0219-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003633.html"
},
{
"category": "self",
"summary": "SUSE Bug 1020950",
"url": "https://bugzilla.suse.com/1020950"
},
{
"category": "self",
"summary": "SUSE Bug 1024749",
"url": "https://bugzilla.suse.com/1024749"
},
{
"category": "self",
"summary": "SUSE Bug 1050469",
"url": "https://bugzilla.suse.com/1050469"
},
{
"category": "self",
"summary": "SUSE Bug 1066892",
"url": "https://bugzilla.suse.com/1066892"
},
{
"category": "self",
"summary": "SUSE Bug 1069925",
"url": "https://bugzilla.suse.com/1069925"
},
{
"category": "self",
"summary": "SUSE Bug 1073654",
"url": "https://bugzilla.suse.com/1073654"
},
{
"category": "self",
"summary": "SUSE Bug 1075419",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4692 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4692/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4743 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7586 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7587 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7589 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7598 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7599 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7610 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7610/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7623 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7632 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7632/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7635 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7639 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7641 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7641/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7645 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7652 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7652/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7654 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7654/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7656 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13788 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13798 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13798/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13803 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13856 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13866 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13866/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13870 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13870/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2350 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2350/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2354 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2354/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2355 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2355/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2356 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2362 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2363 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2364 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2365 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2366 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2369 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2371 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2371/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2373 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2496 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2496/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2510 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2510/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2539 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2539/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7006 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7011 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7012 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7018 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7018/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7019 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7019/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7020 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7020/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7030 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7034 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7037 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7038 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7039 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7040 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7041 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7041/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7042 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7042/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7043 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7046 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7046/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7048 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7049 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7052 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7052/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7055 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7056 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7059 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7061 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7064 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7081 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7087 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7089 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7090 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7091 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7092 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7092/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7093 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7094 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7095 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7096 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7098 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7099 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7100 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7100/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7102 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7104 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7107 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7109 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7111 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7117 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7117/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7120 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7142 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7156 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7157 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7157/"
}
],
"title": "Security update for webkit2gtk3",
"tracking": {
"current_release_date": "2018-01-25T16:38:07Z",
"generator": {
"date": "2018-01-25T16:38:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0219-1",
"initial_release_date": "2018-01-25T16:38:07Z",
"revision_history": [
{
"date": "2018-01-25T16:38:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"product_id": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"product": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"product_id": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"product_id": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"product_id": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"product": {
"name": "webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"product_id": "webkit2gtk3-devel-2.18.5-2.18.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"product": {
"name": "libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"product_id": "libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"product": {
"name": "webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"product_id": "webkit2gtk3-devel-2.18.5-2.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"product_id": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"product": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"product_id": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"product_id": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"product_id": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"product": {
"name": "webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"product_id": "webkit2gtk3-devel-2.18.5-2.18.1.s390x"
}
},
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"product_id": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"product": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"product_id": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"product_id": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"product_id": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"product_id": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"product": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"product_id": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"product_id": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"product_id": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"product": {
"name": "webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"product_id": "webkit2gtk3-devel-2.18.5-2.18.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk3-lang-2.18.5-2.18.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
},
"product_reference": "libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk3-lang-2.18.5-2.18.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
},
"product_reference": "libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64"
},
"product_reference": "webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le"
},
"product_reference": "webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x"
},
"product_reference": "webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64"
},
"product_reference": "webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64"
},
"product_reference": "webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le"
},
"product_reference": "webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x"
},
"product_reference": "webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64"
},
"product_reference": "webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk3-lang-2.18.5-2.18.1.noarch as component of SUSE Linux Enterprise Workstation Extension 12 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
},
"product_reference": "libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk3-lang-2.18.5-2.18.1.noarch as component of SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
},
"product_reference": "libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-4692",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4692"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4692",
"url": "https://www.suse.com/security/cve/CVE-2016-4692"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-4692",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-4692"
},
{
"cve": "CVE-2016-4743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4743"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4743",
"url": "https://www.suse.com/security/cve/CVE-2016-4743"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-4743",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-4743"
},
{
"cve": "CVE-2016-7586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7586"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to obtain sensitive information via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7586",
"url": "https://www.suse.com/security/cve/CVE-2016-7586"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7586",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7586"
},
{
"cve": "CVE-2016-7587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7587"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7587",
"url": "https://www.suse.com/security/cve/CVE-2016-7587"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7587",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7587"
},
{
"cve": "CVE-2016-7589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7589"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. watchOS before 3.1.3 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7589",
"url": "https://www.suse.com/security/cve/CVE-2016-7589"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7589",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7589"
},
{
"cve": "CVE-2016-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7592"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component, which allows remote attackers to obtain sensitive information via crafted JavaScript prompts on a web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7592",
"url": "https://www.suse.com/security/cve/CVE-2016-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7592",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7592"
},
{
"cve": "CVE-2016-7598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7598"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to obtain sensitive information from process memory via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7598",
"url": "https://www.suse.com/security/cve/CVE-2016-7598"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7598",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7598"
},
{
"cve": "CVE-2016-7599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7599"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site that uses HTTP redirects.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7599",
"url": "https://www.suse.com/security/cve/CVE-2016-7599"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7599",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7599"
},
{
"cve": "CVE-2016-7610",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7610"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7610",
"url": "https://www.suse.com/security/cve/CVE-2016-7610"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7610",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "important"
}
],
"title": "CVE-2016-7610"
},
{
"cve": "CVE-2016-7623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7623"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to obtain sensitive information via a blob URL on a web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7623",
"url": "https://www.suse.com/security/cve/CVE-2016-7623"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7623",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7623"
},
{
"cve": "CVE-2016-7632",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7632"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7632",
"url": "https://www.suse.com/security/cve/CVE-2016-7632"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7632",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7632"
},
{
"cve": "CVE-2016-7635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7635"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7635",
"url": "https://www.suse.com/security/cve/CVE-2016-7635"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7635",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7635"
},
{
"cve": "CVE-2016-7639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7639"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7639",
"url": "https://www.suse.com/security/cve/CVE-2016-7639"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7639",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7639"
},
{
"cve": "CVE-2016-7641",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7641"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7641",
"url": "https://www.suse.com/security/cve/CVE-2016-7641"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7641",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7641"
},
{
"cve": "CVE-2016-7645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7645"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7645",
"url": "https://www.suse.com/security/cve/CVE-2016-7645"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7645",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7645"
},
{
"cve": "CVE-2016-7652",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7652"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7652",
"url": "https://www.suse.com/security/cve/CVE-2016-7652"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7652",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7652"
},
{
"cve": "CVE-2016-7654",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7654"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7654",
"url": "https://www.suse.com/security/cve/CVE-2016-7654"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7654",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7654"
},
{
"cve": "CVE-2016-7656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7656"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7656",
"url": "https://www.suse.com/security/cve/CVE-2016-7656"
},
{
"category": "external",
"summary": "SUSE Bug 1020950 for CVE-2016-7656",
"url": "https://bugzilla.suse.com/1020950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2016-7656"
},
{
"cve": "CVE-2017-13788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13788"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13788",
"url": "https://www.suse.com/security/cve/CVE-2017-13788"
},
{
"category": "external",
"summary": "SUSE Bug 1069925 for CVE-2017-13788",
"url": "https://bugzilla.suse.com/1069925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "important"
}
],
"title": "CVE-2017-13788"
},
{
"cve": "CVE-2017-13798",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13798"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13798",
"url": "https://www.suse.com/security/cve/CVE-2017-13798"
},
{
"category": "external",
"summary": "SUSE Bug 1069925 for CVE-2017-13798",
"url": "https://bugzilla.suse.com/1069925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "important"
}
],
"title": "CVE-2017-13798"
},
{
"cve": "CVE-2017-13803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13803"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13803",
"url": "https://www.suse.com/security/cve/CVE-2017-13803"
},
{
"category": "external",
"summary": "SUSE Bug 1069925 for CVE-2017-13803",
"url": "https://bugzilla.suse.com/1069925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "important"
}
],
"title": "CVE-2017-13803"
},
{
"cve": "CVE-2017-13856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13856"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13856",
"url": "https://www.suse.com/security/cve/CVE-2017-13856"
},
{
"category": "external",
"summary": "SUSE Bug 1073654 for CVE-2017-13856",
"url": "https://bugzilla.suse.com/1073654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-13856"
},
{
"cve": "CVE-2017-13866",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13866"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13866",
"url": "https://www.suse.com/security/cve/CVE-2017-13866"
},
{
"category": "external",
"summary": "SUSE Bug 1073654 for CVE-2017-13866",
"url": "https://bugzilla.suse.com/1073654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-13866"
},
{
"cve": "CVE-2017-13870",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13870"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13870",
"url": "https://www.suse.com/security/cve/CVE-2017-13870"
},
{
"category": "external",
"summary": "SUSE Bug 1073654 for CVE-2017-13870",
"url": "https://bugzilla.suse.com/1073654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-13870"
},
{
"cve": "CVE-2017-2350",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2350"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2350",
"url": "https://www.suse.com/security/cve/CVE-2017-2350"
},
{
"category": "external",
"summary": "SUSE Bug 1024749 for CVE-2017-2350",
"url": "https://bugzilla.suse.com/1024749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-2350"
},
{
"cve": "CVE-2017-2354",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2354"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2354",
"url": "https://www.suse.com/security/cve/CVE-2017-2354"
},
{
"category": "external",
"summary": "SUSE Bug 1024749 for CVE-2017-2354",
"url": "https://bugzilla.suse.com/1024749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-2354"
},
{
"cve": "CVE-2017-2355",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2355"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2355",
"url": "https://www.suse.com/security/cve/CVE-2017-2355"
},
{
"category": "external",
"summary": "SUSE Bug 1024749 for CVE-2017-2355",
"url": "https://bugzilla.suse.com/1024749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-2355"
},
{
"cve": "CVE-2017-2356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2356"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2356",
"url": "https://www.suse.com/security/cve/CVE-2017-2356"
},
{
"category": "external",
"summary": "SUSE Bug 1024749 for CVE-2017-2356",
"url": "https://bugzilla.suse.com/1024749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-2356"
},
{
"cve": "CVE-2017-2362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2362"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2362",
"url": "https://www.suse.com/security/cve/CVE-2017-2362"
},
{
"category": "external",
"summary": "SUSE Bug 1024749 for CVE-2017-2362",
"url": "https://bugzilla.suse.com/1024749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-2362"
},
{
"cve": "CVE-2017-2363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2363"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2363",
"url": "https://www.suse.com/security/cve/CVE-2017-2363"
},
{
"category": "external",
"summary": "SUSE Bug 1024749 for CVE-2017-2363",
"url": "https://bugzilla.suse.com/1024749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-2363"
},
{
"cve": "CVE-2017-2364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2364"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2364",
"url": "https://www.suse.com/security/cve/CVE-2017-2364"
},
{
"category": "external",
"summary": "SUSE Bug 1024749 for CVE-2017-2364",
"url": "https://bugzilla.suse.com/1024749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-2364"
},
{
"cve": "CVE-2017-2365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2365"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2365",
"url": "https://www.suse.com/security/cve/CVE-2017-2365"
},
{
"category": "external",
"summary": "SUSE Bug 1024749 for CVE-2017-2365",
"url": "https://bugzilla.suse.com/1024749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-2365"
},
{
"cve": "CVE-2017-2366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2366"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2366",
"url": "https://www.suse.com/security/cve/CVE-2017-2366"
},
{
"category": "external",
"summary": "SUSE Bug 1024749 for CVE-2017-2366",
"url": "https://bugzilla.suse.com/1024749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-2366"
},
{
"cve": "CVE-2017-2369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2369"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2369",
"url": "https://www.suse.com/security/cve/CVE-2017-2369"
},
{
"category": "external",
"summary": "SUSE Bug 1024749 for CVE-2017-2369",
"url": "https://bugzilla.suse.com/1024749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-2369"
},
{
"cve": "CVE-2017-2371",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2371"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. The issue involves the \"WebKit\" component, which allows remote attackers to launch popups via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2371",
"url": "https://www.suse.com/security/cve/CVE-2017-2371"
},
{
"category": "external",
"summary": "SUSE Bug 1024749 for CVE-2017-2371",
"url": "https://bugzilla.suse.com/1024749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-2371"
},
{
"cve": "CVE-2017-2373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2373"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2373",
"url": "https://www.suse.com/security/cve/CVE-2017-2373"
},
{
"category": "external",
"summary": "SUSE Bug 1024749 for CVE-2017-2373",
"url": "https://bugzilla.suse.com/1024749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-2373"
},
{
"cve": "CVE-2017-2496",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2496"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2496",
"url": "https://www.suse.com/security/cve/CVE-2017-2496"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-2496",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "important"
}
],
"title": "CVE-2017-2496"
},
{
"cve": "CVE-2017-2510",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2510"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that improperly interacts with pageshow events.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2510",
"url": "https://www.suse.com/security/cve/CVE-2017-2510"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-2510",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-2510"
},
{
"cve": "CVE-2017-2539",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2539"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2539",
"url": "https://www.suse.com/security/cve/CVE-2017-2539"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-2539",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "important"
}
],
"title": "CVE-2017-2539"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-7006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7006"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to conduct a timing side-channel attack to bypass the Same Origin Policy and obtain sensitive information via a crafted web site that uses SVG filters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7006",
"url": "https://www.suse.com/security/cve/CVE-2017-7006"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7006",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7006"
},
{
"cve": "CVE-2017-7011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7011"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to spoof the address bar via a crafted web site that uses FRAME elements.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7011",
"url": "https://www.suse.com/security/cve/CVE-2017-7011"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7011",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7011"
},
{
"cve": "CVE-2017-7012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7012"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. The issue involves the \"WebKit Web Inspector\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7012",
"url": "https://www.suse.com/security/cve/CVE-2017-7012"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7012",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7012"
},
{
"cve": "CVE-2017-7018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7018"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7018",
"url": "https://www.suse.com/security/cve/CVE-2017-7018"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7018",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7018"
},
{
"cve": "CVE-2017-7019",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7019"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit Page Loading\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7019",
"url": "https://www.suse.com/security/cve/CVE-2017-7019"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7019",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7019"
},
{
"cve": "CVE-2017-7020",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7020"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7020",
"url": "https://www.suse.com/security/cve/CVE-2017-7020"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7020",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7020"
},
{
"cve": "CVE-2017-7030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7030"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7030",
"url": "https://www.suse.com/security/cve/CVE-2017-7030"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7030",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7030"
},
{
"cve": "CVE-2017-7034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7034"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7034",
"url": "https://www.suse.com/security/cve/CVE-2017-7034"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7034",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7034"
},
{
"cve": "CVE-2017-7037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7037"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7037",
"url": "https://www.suse.com/security/cve/CVE-2017-7037"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7037",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7037"
},
{
"cve": "CVE-2017-7038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7038"
}
],
"notes": [
{
"category": "general",
"text": "A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7038",
"url": "https://www.suse.com/security/cve/CVE-2017-7038"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7038",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7038"
},
{
"cve": "CVE-2017-7039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7039"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7039",
"url": "https://www.suse.com/security/cve/CVE-2017-7039"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7039",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7039"
},
{
"cve": "CVE-2017-7040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7040"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7040",
"url": "https://www.suse.com/security/cve/CVE-2017-7040"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7040",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7040"
},
{
"cve": "CVE-2017-7041",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7041"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7041",
"url": "https://www.suse.com/security/cve/CVE-2017-7041"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7041",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7041"
},
{
"cve": "CVE-2017-7042",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7042"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7042",
"url": "https://www.suse.com/security/cve/CVE-2017-7042"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7042",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7042"
},
{
"cve": "CVE-2017-7043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7043"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7043",
"url": "https://www.suse.com/security/cve/CVE-2017-7043"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7043",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7043"
},
{
"cve": "CVE-2017-7046",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7046"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7046",
"url": "https://www.suse.com/security/cve/CVE-2017-7046"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7046",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7046"
},
{
"cve": "CVE-2017-7048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7048"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7048",
"url": "https://www.suse.com/security/cve/CVE-2017-7048"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7048",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7048"
},
{
"cve": "CVE-2017-7049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7049"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7049",
"url": "https://www.suse.com/security/cve/CVE-2017-7049"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7049",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7049"
},
{
"cve": "CVE-2017-7052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7052"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7052",
"url": "https://www.suse.com/security/cve/CVE-2017-7052"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7052",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7052"
},
{
"cve": "CVE-2017-7055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7055"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7055",
"url": "https://www.suse.com/security/cve/CVE-2017-7055"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7055",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7055"
},
{
"cve": "CVE-2017-7056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7056"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7056",
"url": "https://www.suse.com/security/cve/CVE-2017-7056"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7056",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7056"
},
{
"cve": "CVE-2017-7059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7059"
}
],
"notes": [
{
"category": "general",
"text": "A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7059",
"url": "https://www.suse.com/security/cve/CVE-2017-7059"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7059",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7059"
},
{
"cve": "CVE-2017-7061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7061"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7061",
"url": "https://www.suse.com/security/cve/CVE-2017-7061"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7061",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7061"
},
{
"cve": "CVE-2017-7064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7064"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. The issue involves the \"WebKit\" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7064",
"url": "https://www.suse.com/security/cve/CVE-2017-7064"
},
{
"category": "external",
"summary": "SUSE Bug 1050469 for CVE-2017-7064",
"url": "https://bugzilla.suse.com/1050469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7064"
},
{
"cve": "CVE-2017-7081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7081"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7081",
"url": "https://www.suse.com/security/cve/CVE-2017-7081"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7081",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7081"
},
{
"cve": "CVE-2017-7087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7087"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7087",
"url": "https://www.suse.com/security/cve/CVE-2017-7087"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7087",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7087"
},
{
"cve": "CVE-2017-7089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7089"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. The issue involves the \"WebKit\" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that is mishandled during parent-tab processing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7089",
"url": "https://www.suse.com/security/cve/CVE-2017-7089"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7089",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7089"
},
{
"cve": "CVE-2017-7090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7090"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive cookie information via a custom URL scheme.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7090",
"url": "https://www.suse.com/security/cve/CVE-2017-7090"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7090",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7090"
},
{
"cve": "CVE-2017-7091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7091"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7091",
"url": "https://www.suse.com/security/cve/CVE-2017-7091"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7091",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "important"
}
],
"title": "CVE-2017-7091"
},
{
"cve": "CVE-2017-7092",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7092"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7092",
"url": "https://www.suse.com/security/cve/CVE-2017-7092"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7092",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "important"
}
],
"title": "CVE-2017-7092"
},
{
"cve": "CVE-2017-7093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7093"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7093",
"url": "https://www.suse.com/security/cve/CVE-2017-7093"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7093",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "important"
}
],
"title": "CVE-2017-7093"
},
{
"cve": "CVE-2017-7094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7094"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7094",
"url": "https://www.suse.com/security/cve/CVE-2017-7094"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7094",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7094"
},
{
"cve": "CVE-2017-7095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7095"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7095",
"url": "https://www.suse.com/security/cve/CVE-2017-7095"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7095",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "important"
}
],
"title": "CVE-2017-7095"
},
{
"cve": "CVE-2017-7096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7096"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7096",
"url": "https://www.suse.com/security/cve/CVE-2017-7096"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7096",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7096"
},
{
"cve": "CVE-2017-7098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7098"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7098",
"url": "https://www.suse.com/security/cve/CVE-2017-7098"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7098",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7098"
},
{
"cve": "CVE-2017-7099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7099"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7099",
"url": "https://www.suse.com/security/cve/CVE-2017-7099"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7099",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7099"
},
{
"cve": "CVE-2017-7100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7100"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7100",
"url": "https://www.suse.com/security/cve/CVE-2017-7100"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7100",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7100"
},
{
"cve": "CVE-2017-7102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7102"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7102",
"url": "https://www.suse.com/security/cve/CVE-2017-7102"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7102",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7102"
},
{
"cve": "CVE-2017-7104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7104"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7104",
"url": "https://www.suse.com/security/cve/CVE-2017-7104"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7104",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7104"
},
{
"cve": "CVE-2017-7107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7107"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7107",
"url": "https://www.suse.com/security/cve/CVE-2017-7107"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7107",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7107"
},
{
"cve": "CVE-2017-7109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7109"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via crafted web content that incorrectly interacts with the Application Cache policy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7109",
"url": "https://www.suse.com/security/cve/CVE-2017-7109"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7109",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7109"
},
{
"cve": "CVE-2017-7111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7111"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7111",
"url": "https://www.suse.com/security/cve/CVE-2017-7111"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7111",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "important"
}
],
"title": "CVE-2017-7111"
},
{
"cve": "CVE-2017-7117",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7117"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7117",
"url": "https://www.suse.com/security/cve/CVE-2017-7117"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7117",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7117"
},
{
"cve": "CVE-2017-7120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7120"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7120",
"url": "https://www.suse.com/security/cve/CVE-2017-7120"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7120",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7120"
},
{
"cve": "CVE-2017-7142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7142"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. Safari before 11 is affected. The issue involves the \"WebKit Storage\" component. It allows attackers to bypass the Safari Private Browsing protection mechanism, and consequently obtain sensitive information about visited web sites.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7142",
"url": "https://www.suse.com/security/cve/CVE-2017-7142"
},
{
"category": "external",
"summary": "SUSE Bug 1066892 for CVE-2017-7142",
"url": "https://bugzilla.suse.com/1066892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "critical"
}
],
"title": "CVE-2017-7142"
},
{
"cve": "CVE-2017-7156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7156"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7156",
"url": "https://www.suse.com/security/cve/CVE-2017-7156"
},
{
"category": "external",
"summary": "SUSE Bug 1073654 for CVE-2017-7156",
"url": "https://bugzilla.suse.com/1073654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-7156"
},
{
"cve": "CVE-2017-7157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7157"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7157",
"url": "https://www.suse.com/security/cve/CVE-2017-7157"
},
{
"category": "external",
"summary": "SUSE Bug 1073654 for CVE-2017-7157",
"url": "https://bugzilla.suse.com/1073654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:webkit2gtk3-devel-2.18.5-2.18.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libwebkit2gtk3-lang-2.18.5-2.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T16:38:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-7157"
}
]
}
SUSE-SU-2018:0601-1
Vulnerability from csaf_suse - Published: 2018-03-05 09:40 - Updated: 2018-03-05 09:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via\n side effects of speculative execution, aka \u0027Spectre\u0027 and \u0027Meltdown\u0027 attacks\n (bsc#1074562, bsc#1068032)\n- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged\n users to cause a denial of service (out-of-bounds read and QEMU process crash)\n by leveraging improper memory address validation (bsc#1076116).\n- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest\n privileged users to cause a denial of service (out-of-bounds array access and\n QEMU process crash) via vectors related to negative pitch (bsc#1076180).\n- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded\n recursion, stack consumption, and hypervisor crash) or possibly gain privileges\n via crafted page-table stacking (bsc#1061081)\n- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host\n OS crash) or gain host OS privileges in shadow mode by mapping a certain\n auxiliary page (bsc#1070158).\n- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS\n crash) or gain host OS privileges by leveraging an incorrect mask for\n reference-count overflow checking in shadow mode (bsc#1070159).\n- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS\n crash) or gain host OS privileges by leveraging incorrect error handling for\n reference counting in shadow mode (bsc#1070160).\n- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host\n OS crash) if shadow mode and log-dirty mode are in place, because of an\n incorrect assertion related to M2P (bsc#1070163).\n- Added missing intermediate preemption checks for guest requesting removal of\n memory. This allowed malicious guest administrator to cause denial of service\n due to the high cost of this operation (bsc#1080635).\n- Because of XEN not returning the proper error messages when transitioning\n grant tables from v2 to v1 a malicious guest was able to cause DoS or\n potentially allowed for privilege escalation as well as information leaks\n (bsc#1080662).\n\nThis non-security issue was fixed:\n\n- bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100\n seconds. If many domUs shutdown in parallel the backends couldn\u0027t keep up\n\n- Upstream patches from Jan (bsc#1027519)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-2018-408",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0601-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0601-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180601-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0601-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003784.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1035442",
"url": "https://bugzilla.suse.com/1035442"
},
{
"category": "self",
"summary": "SUSE Bug 1061081",
"url": "https://bugzilla.suse.com/1061081"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1070158",
"url": "https://bugzilla.suse.com/1070158"
},
{
"category": "self",
"summary": "SUSE Bug 1070159",
"url": "https://bugzilla.suse.com/1070159"
},
{
"category": "self",
"summary": "SUSE Bug 1070160",
"url": "https://bugzilla.suse.com/1070160"
},
{
"category": "self",
"summary": "SUSE Bug 1070163",
"url": "https://bugzilla.suse.com/1070163"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1076116",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "self",
"summary": "SUSE Bug 1076180",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "self",
"summary": "SUSE Bug 1080635",
"url": "https://bugzilla.suse.com/1080635"
},
{
"category": "self",
"summary": "SUSE Bug 1080662",
"url": "https://bugzilla.suse.com/1080662"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15595 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17563 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17563/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17564 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17565 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17566 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18030 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5683 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5683/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-03-05T09:40:56Z",
"generator": {
"date": "2018-03-05T09:40:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0601-1",
"initial_release_date": "2018-03-05T09:40:56Z",
"revision_history": [
{
"date": "2018-03-05T09:40:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.4.4_28-22.62.1.x86_64",
"product": {
"name": "xen-4.4.4_28-22.62.1.x86_64",
"product_id": "xen-4.4.4_28-22.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.4.4_28-22.62.1.x86_64",
"product": {
"name": "xen-doc-html-4.4.4_28-22.62.1.x86_64",
"product_id": "xen-doc-html-4.4.4_28-22.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"product": {
"name": "xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"product_id": "xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_28-22.62.1.x86_64",
"product": {
"name": "xen-libs-4.4.4_28-22.62.1.x86_64",
"product_id": "xen-libs-4.4.4_28-22.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"product_id": "xen-libs-32bit-4.4.4_28-22.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.4.4_28-22.62.1.x86_64",
"product": {
"name": "xen-tools-4.4.4_28-22.62.1.x86_64",
"product_id": "xen-tools-4.4.4_28-22.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_28-22.62.1.x86_64",
"product": {
"name": "xen-tools-domU-4.4.4_28-22.62.1.x86_64",
"product_id": "xen-tools-domU-4.4.4_28-22.62.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_28-22.62.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64"
},
"product_reference": "xen-4.4.4_28-22.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_28-22.62.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_28-22.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_28-22.62.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64"
},
"product_reference": "xen-libs-4.4.4_28-22.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_28-22.62.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_28-22.62.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64"
},
"product_reference": "xen-tools-4.4.4_28-22.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_28-22.62.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_28-22.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15595"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15595",
"url": "https://www.suse.com/security/cve/CVE-2017-15595"
},
{
"category": "external",
"summary": "SUSE Bug 1061081 for CVE-2017-15595",
"url": "https://bugzilla.suse.com/1061081"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-15595",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T09:40:56Z",
"details": "important"
}
],
"title": "CVE-2017-15595"
},
{
"cve": "CVE-2017-17563",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17563"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17563",
"url": "https://www.suse.com/security/cve/CVE-2017-17563"
},
{
"category": "external",
"summary": "SUSE Bug 1070159 for CVE-2017-17563",
"url": "https://bugzilla.suse.com/1070159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T09:40:56Z",
"details": "moderate"
}
],
"title": "CVE-2017-17563"
},
{
"cve": "CVE-2017-17564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17564"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17564",
"url": "https://www.suse.com/security/cve/CVE-2017-17564"
},
{
"category": "external",
"summary": "SUSE Bug 1070160 for CVE-2017-17564",
"url": "https://bugzilla.suse.com/1070160"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17564",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T09:40:56Z",
"details": "moderate"
}
],
"title": "CVE-2017-17564"
},
{
"cve": "CVE-2017-17565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17565"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) if shadow mode and log-dirty mode are in place, because of an incorrect assertion related to M2P.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17565",
"url": "https://www.suse.com/security/cve/CVE-2017-17565"
},
{
"category": "external",
"summary": "SUSE Bug 1070163 for CVE-2017-17565",
"url": "https://bugzilla.suse.com/1070163"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17565",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T09:40:56Z",
"details": "moderate"
}
],
"title": "CVE-2017-17565"
},
{
"cve": "CVE-2017-17566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17566"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) or gain host OS privileges in shadow mode by mapping a certain auxiliary page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17566",
"url": "https://www.suse.com/security/cve/CVE-2017-17566"
},
{
"category": "external",
"summary": "SUSE Bug 1070158 for CVE-2017-17566",
"url": "https://bugzilla.suse.com/1070158"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17566",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T09:40:56Z",
"details": "moderate"
}
],
"title": "CVE-2017-17566"
},
{
"cve": "CVE-2017-18030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18030"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18030",
"url": "https://www.suse.com/security/cve/CVE-2017-18030"
},
{
"category": "external",
"summary": "SUSE Bug 1076179 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076179"
},
{
"category": "external",
"summary": "SUSE Bug 1076180 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T09:40:56Z",
"details": "low"
}
],
"title": "CVE-2017-18030"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T09:40:56Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T09:40:56Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T09:40:56Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-5683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5683"
}
],
"notes": [
{
"category": "general",
"text": "The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5683",
"url": "https://www.suse.com/security/cve/CVE-2018-5683"
},
{
"category": "external",
"summary": "SUSE Bug 1076114 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076114"
},
{
"category": "external",
"summary": "SUSE Bug 1076116 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_28_k3.12.61_52.119-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_28-22.62.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_28-22.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T09:40:56Z",
"details": "moderate"
}
],
"title": "CVE-2018-5683"
}
]
}
SUSE-SU-2018:1368-1
Vulnerability from csaf_suse - Published: 2018-05-22 16:00 - Updated: 2018-05-22 16:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3639: Information leaks using \u0027Memory Disambiguation\u0027 feature\n in modern CPUs were mitigated, aka \u0027Spectre Variant 4\u0027 (bnc#1087082).\n\n A new boot commandline option was introduced,\n \u0027spec_store_bypass_disable\u0027, which can have following values:\n\n - auto: Kernel detects whether your CPU model contains an implementation\n of Speculative Store Bypass and picks the most appropriate mitigation.\n - on: disable Speculative Store Bypass\n - off: enable Speculative Store Bypass\n - prctl: Control Speculative Store Bypass per thread via\n prctl. Speculative Store Bypass is enabled for a process by default. The\n state of the control is inherited on fork.\n - seccomp: Same as \u0027prctl\u0027 above, but all seccomp threads will disable\n SSB unless they explicitly opt out.\n\n The default is \u0027seccomp\u0027, meaning programs need explicit opt-in into the mitigation.\n\n Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:\n\n - \u0027Vulnerable\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl and seccomp\u0027\n\n- CVE-2018-1000199: An address corruption flaw was discovered while\n modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an\n unprivileged user/process could use this flaw to crash the system kernel\n resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)\n- CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy.c allowed\n local users to cause a denial of service (use-after-free) or possibly\n have unspecified other impact via crafted system calls (bnc#1091755).\n- CVE-2017-5715: The retpoline mitigation for Spectre v2 has been enabled also for 32bit x86.\n- CVE-2017-5753: Spectre v1 mitigations have been improved by the versions\n merged from the upstream kernel.\n\nThe following non-security bugs were fixed:\n\n- Avoid quadratic search when freeing delegations (bsc#1084760).\n- cifs: fix crash due to race in hmac(md5) handling (bsc#1091671).\n- hid: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bsc#1087092).\n- mmc: jz4740: Fix race condition in IRQ mask update (bsc#1090888).\n- powerpc/64: Disable gmb() on powerpc\n- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).\n- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Improve RFI L1-D cache flush fallback (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).\n- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).\n- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc: Move default security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc: Move local setup.h declarations to arch includes (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).\n- series.conf: fix the header It was corrupted back in 2015.\n- tracing: Create seq_buf layer in trace_seq (bsc#1091815).\n- Update config files. Enable retpolines for i386 build.\n- usb: Accept bulk endpoints with 1024-byte maxpacket (bsc#1090888).\n- usb: hub: fix SS hub-descriptor handling (bsc#1092372).\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).\n- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1090630)\n- x86/xen: disable IBRS around CPU stopper function invocation\n- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).\n- xfs: fix buffer use after free on IO error (bsc#1052943).\n- xfs: prevent recursion in xfs_buf_iorequest (bsc#1052943).\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-kernel-20180512-13618,slessp4-kernel-20180512-13618,slexsp3-kernel-20180512-13618",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1368-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1368-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181368-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1368-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046610",
"url": "https://bugzilla.suse.com/1046610"
},
{
"category": "self",
"summary": "SUSE Bug 1052943",
"url": "https://bugzilla.suse.com/1052943"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1075087",
"url": "https://bugzilla.suse.com/1075087"
},
{
"category": "self",
"summary": "SUSE Bug 1075088",
"url": "https://bugzilla.suse.com/1075088"
},
{
"category": "self",
"summary": "SUSE Bug 1080157",
"url": "https://bugzilla.suse.com/1080157"
},
{
"category": "self",
"summary": "SUSE Bug 1084760",
"url": "https://bugzilla.suse.com/1084760"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1089895",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "self",
"summary": "SUSE Bug 1090630",
"url": "https://bugzilla.suse.com/1090630"
},
{
"category": "self",
"summary": "SUSE Bug 1090888",
"url": "https://bugzilla.suse.com/1090888"
},
{
"category": "self",
"summary": "SUSE Bug 1091041",
"url": "https://bugzilla.suse.com/1091041"
},
{
"category": "self",
"summary": "SUSE Bug 1091671",
"url": "https://bugzilla.suse.com/1091671"
},
{
"category": "self",
"summary": "SUSE Bug 1091755",
"url": "https://bugzilla.suse.com/1091755"
},
{
"category": "self",
"summary": "SUSE Bug 1091815",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "self",
"summary": "SUSE Bug 1092372",
"url": "https://bugzilla.suse.com/1092372"
},
{
"category": "self",
"summary": "SUSE Bug 1092497",
"url": "https://bugzilla.suse.com/1092497"
},
{
"category": "self",
"summary": "SUSE Bug 1094019",
"url": "https://bugzilla.suse.com/1094019"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000199 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10675 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10675/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-05-22T16:00:19Z",
"generator": {
"date": "2018-05-22T16:00:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1368-1",
"initial_release_date": "2018-05-22T16:00:19Z",
"revision_history": [
{
"date": "2018-05-22T16:00:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-default-3.0.101-108.48.1.i586",
"product_id": "kernel-default-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-108.48.1.i586",
"product_id": "kernel-default-base-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-108.48.1.i586",
"product_id": "kernel-default-devel-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-108.48.1.i586",
"product_id": "kernel-ec2-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-108.48.1.i586",
"product_id": "kernel-ec2-base-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.48.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-pae-3.0.101-108.48.1.i586",
"product_id": "kernel-pae-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-108.48.1.i586",
"product_id": "kernel-pae-base-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-108.48.1.i586",
"product_id": "kernel-pae-devel-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-source-3.0.101-108.48.1.i586",
"product_id": "kernel-source-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-syms-3.0.101-108.48.1.i586",
"product_id": "kernel-syms-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-trace-3.0.101-108.48.1.i586",
"product_id": "kernel-trace-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-108.48.1.i586",
"product_id": "kernel-trace-base-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-108.48.1.i586",
"product_id": "kernel-trace-devel-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-xen-3.0.101-108.48.1.i586",
"product_id": "kernel-xen-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-108.48.1.i586",
"product_id": "kernel-xen-base-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-108.48.1.i586",
"product_id": "kernel-xen-devel-3.0.101-108.48.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-default-3.0.101-108.48.1.ia64",
"product_id": "kernel-default-3.0.101-108.48.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-default-base-3.0.101-108.48.1.ia64",
"product_id": "kernel-default-base-3.0.101-108.48.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-default-devel-3.0.101-108.48.1.ia64",
"product_id": "kernel-default-devel-3.0.101-108.48.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-source-3.0.101-108.48.1.ia64",
"product_id": "kernel-source-3.0.101-108.48.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-syms-3.0.101-108.48.1.ia64",
"product_id": "kernel-syms-3.0.101-108.48.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-trace-3.0.101-108.48.1.ia64",
"product_id": "kernel-trace-3.0.101-108.48.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-trace-base-3.0.101-108.48.1.ia64",
"product_id": "kernel-trace-base-3.0.101-108.48.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.48.1.ia64",
"product_id": "kernel-trace-devel-3.0.101-108.48.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-docs-3.0.101-108.48.1.noarch",
"product": {
"name": "kernel-docs-3.0.101-108.48.1.noarch",
"product_id": "kernel-docs-3.0.101-108.48.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-bigmem-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-bigmem-3.0.101-108.48.1.ppc64",
"product_id": "kernel-bigmem-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"product_id": "kernel-bigmem-base-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"product_id": "kernel-bigmem-devel-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-default-3.0.101-108.48.1.ppc64",
"product_id": "kernel-default-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-default-base-3.0.101-108.48.1.ppc64",
"product_id": "kernel-default-base-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-default-devel-3.0.101-108.48.1.ppc64",
"product_id": "kernel-default-devel-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-ppc64-3.0.101-108.48.1.ppc64",
"product_id": "kernel-ppc64-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"product_id": "kernel-ppc64-base-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"product_id": "kernel-ppc64-devel-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-source-3.0.101-108.48.1.ppc64",
"product_id": "kernel-source-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-syms-3.0.101-108.48.1.ppc64",
"product_id": "kernel-syms-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-trace-3.0.101-108.48.1.ppc64",
"product_id": "kernel-trace-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-trace-base-3.0.101-108.48.1.ppc64",
"product_id": "kernel-trace-base-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.48.1.ppc64",
"product_id": "kernel-trace-devel-3.0.101-108.48.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-default-3.0.101-108.48.1.s390x",
"product_id": "kernel-default-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-108.48.1.s390x",
"product_id": "kernel-default-base-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-108.48.1.s390x",
"product_id": "kernel-default-devel-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-108.48.1.s390x",
"product_id": "kernel-default-man-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-source-3.0.101-108.48.1.s390x",
"product_id": "kernel-source-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-108.48.1.s390x",
"product_id": "kernel-syms-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-108.48.1.s390x",
"product_id": "kernel-trace-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-108.48.1.s390x",
"product_id": "kernel-trace-base-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-108.48.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-108.48.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-108.48.1.x86_64",
"product_id": "kernel-default-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-108.48.1.x86_64",
"product_id": "kernel-default-base-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-108.48.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-108.48.1.x86_64",
"product_id": "kernel-ec2-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-108.48.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-108.48.1.x86_64",
"product_id": "kernel-source-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-108.48.1.x86_64",
"product_id": "kernel-syms-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-108.48.1.x86_64",
"product_id": "kernel-trace-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-108.48.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.48.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-108.48.1.x86_64",
"product_id": "kernel-xen-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-108.48.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-108.48.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-108.48.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-3.0.101-108.48.1.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
},
"product_reference": "kernel-docs-3.0.101-108.48.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-bigmem-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-default-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-default-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-pae-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-source-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-source-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-xen-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-bigmem-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-default-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-default-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-pae-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-source-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-source-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-xen-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T16:00:19Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T16:00:19Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2018-1000199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000199"
}
],
"notes": [
{
"category": "general",
"text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000199",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199"
},
{
"category": "external",
"summary": "SUSE Bug 1089895 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "external",
"summary": "SUSE Bug 1090036 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1090036"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T16:00:19Z",
"details": "important"
}
],
"title": "CVE-2018-1000199"
},
{
"cve": "CVE-2018-10675",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10675"
}
],
"notes": [
{
"category": "general",
"text": "The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10675",
"url": "https://www.suse.com/security/cve/CVE-2018-10675"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091755 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1091755"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T16:00:19Z",
"details": "moderate"
}
],
"title": "CVE-2018-10675"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T16:00:19Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:0031-1
Vulnerability from csaf_suse - Published: 2018-01-05 15:16 - Updated: 2018-01-05 15:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\nThis update adds mitigations for various side channel attacks against\nmodern CPUs that could disclose content of otherwise unreadable memory\n(bnc#1068032).\n\n- CVE-2017-5753 / \u0027SpectreAttack\u0027: Local attackers on systems with modern\n CPUs featuring deep instruction pipelining could use attacker\n controllable speculative execution over code patterns in the Linux\n Kernel to leak content from otherwise not readable memory in the same\n address space, allowing retrieval of passwords, cryptographic keys\n and other secrets.\n\n This problem is mitigated by adding speculative fencing on affected\n code paths throughout the Linux kernel.\n\n This issue is addressed for the x86_64, IBM Power and IBM zSeries\n architecture.\n\n- CVE-2017-5715 / \u0027SpectreAttack\u0027: Local attackers on systems with modern\n CPUs featuring branch prediction could use mispredicted branches to\n speculatively execute code patterns that in turn could be made to\n leak other non-readable content in the same address space, an attack\n similar to CVE-2017-5753.\n\n This problem is mitigated by disabling predictive branches, depending\n on CPU architecture either by firmware updates and/or fixes in the\n user-kernel privilege boundaries.\n\n This is done with help of Linux Kernel fixes on the Intel/AMD x86_64\n and IBM zSeries architectures. On x86_64, this requires also updates\n of the CPU microcode packages, delivered in seperate updates.\n\n For IBM Power and zSeries the required firmware updates are supplied\n over regular channels by IBM.\n\n As this feature can have a performance impact, it can be disabled\n using the \u0027nospec\u0027 kernel commandline option.\n\n- CVE-2017-5754 / \u0027MeltdownAttack\u0027: Local attackers on systems with\n modern CPUs featuring deep instruction pipelining could use code\n patterns in userspace to speculative executive code that would read\n otherwise read protected memory, an attack similar to CVE-2017-5753.\n\n This problem is mitigated by unmapping the Linux Kernel from the user\n address space during user code execution, following a approach called\n \u0027KAISER\u0027. The terms used here are \u0027KAISER\u0027 / \u0027Kernel Address Isolation\u0027\n and \u0027PTI\u0027 / \u0027Page Table Isolation\u0027.\n\n This update does this on the x86_64 architecture, it is not required\n on the IBM zSeries architecture.\n\n This feature can be enabled / disabled by the \u0027pti=[on|off|auto]\u0027 or\n \u0027nopti\u0027 commandline options.\n\nThe following security bugs were fixed:\n\n- CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel did not ensure that an l2cap socket is available, which allowed local users to gain privileges via a crafted application (bnc#1071470).\n- CVE-2017-13167: An elevation of privilege vulnerability in the kernel sound timer. (bnc#1072876).\n- CVE-2017-16538: drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel allowed local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner) (bnc#1066569).\n- CVE-2017-17558: The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel did not consider the maximum number of configurations and interfaces before attempting to release resources, which allowed local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device (bnc#1072561).\n- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695).\n- CVE-2017-17449: The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, did not restrict observations of Netlink messages to a single net namespace, which allowed local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system (bnc#1071694).\n- CVE-2017-17448: net/netfilter/nfnetlink_cthelper.c in the Linux kernel did not require the CAP_NET_ADMIN capability for new, get, and del operations, which allowed local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces (bnc#1071693).\n- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).\n- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).\n- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).\n- CVE-2017-16534: The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066693).\n\nThe following non-security bugs were fixed:\n\n- alsa: timer: Fix ioctl_lock mutex deadlock (bsc#1067678).\n- audit: Fix use after free in audit_remove_watch_rule() (bsc#1045205).\n- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).\n- carl9170: prevent speculative execution (bnc#1068032).\n- fs: prevent speculative execution (bnc#1068032).\n- kaiser: make kernel_stack user-mapped\n- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)\n- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).\n- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).\n- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).\n- p54: prevent speculative execution (bnc#1068032).\n- powerpc/barrier: add gmb.\n- powerpc: Convert cmp to cmpd in idle enter sequence (bsc#1070781).\n- powerpc/powernv: Remove OPAL v1 takeover (bsc#1070781).\n- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).\n- ptrace: Add a new thread access check (bsc#1068032).\n- s390: introduce CPU alternatives (bsc#1068032).\n- s390/spinlock: add gmb memory barrier.\n- s390/spinlock: add ppa to system call path.\n- uas: Only complain about missing sg if all other checks succeed (bsc#1071074).\n- udf: prevent speculative execution (bnc#1068032).\n- usb: uas: fix bug in handling of alternate settings (bsc#1071074).\n- uvcvideo: prevent speculative execution (bnc#1068032).\n- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).\n- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).\n- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).\n- x86/CPU: Check speculation control CPUID bit (bsc#1068032).\n- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).\n- x86/entry: Add a function to overwrite the RSB (bsc#1068032).\n- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).\n- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).\n- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).\n- x86/idle: Toggle IBRS when going idle (bsc#1068032).\n- x86/kaiser: Move feature detection up (bsc#1068032).\n- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).\n- x86/kvm: Flush IBP when switching VMs (bsc#1068032).\n- x86/kvm: Pad RSB on VM transition (bsc#1068032).\n- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).\n- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).\n- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).\n- x86/mm: Set IBPB upon context switch (bsc#1068032).\n- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).\n- x86/spec: Add IBRS control functions (bsc#1068032).\n- x86/spec: Add \u0027nospec\u0027 chicken bit (bsc#1068032).\n- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).\n- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).\n- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).\n- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).\n- x86/svm: Add code to clear registers on VM exit (bsc#1068032).\n- x86/svm: Clobber the RSB on VM exit (bsc#1068032).\n- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).\n- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-6-2018-24,SUSE-SLE-Module-Public-Cloud-12-2018-24,SUSE-SLE-SAP-12-SP1-2018-24,SUSE-SLE-SERVER-12-SP1-2018-24",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0031-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0031-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180031-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0031-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012422",
"url": "https://bugzilla.suse.com/1012422"
},
{
"category": "self",
"summary": "SUSE Bug 1045205",
"url": "https://bugzilla.suse.com/1045205"
},
{
"category": "self",
"summary": "SUSE Bug 1050231",
"url": "https://bugzilla.suse.com/1050231"
},
{
"category": "self",
"summary": "SUSE Bug 1066569",
"url": "https://bugzilla.suse.com/1066569"
},
{
"category": "self",
"summary": "SUSE Bug 1066693",
"url": "https://bugzilla.suse.com/1066693"
},
{
"category": "self",
"summary": "SUSE Bug 1067678",
"url": "https://bugzilla.suse.com/1067678"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068671",
"url": "https://bugzilla.suse.com/1068671"
},
{
"category": "self",
"summary": "SUSE Bug 1070771",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "self",
"summary": "SUSE Bug 1070781",
"url": "https://bugzilla.suse.com/1070781"
},
{
"category": "self",
"summary": "SUSE Bug 1071074",
"url": "https://bugzilla.suse.com/1071074"
},
{
"category": "self",
"summary": "SUSE Bug 1071470",
"url": "https://bugzilla.suse.com/1071470"
},
{
"category": "self",
"summary": "SUSE Bug 1071693",
"url": "https://bugzilla.suse.com/1071693"
},
{
"category": "self",
"summary": "SUSE Bug 1071694",
"url": "https://bugzilla.suse.com/1071694"
},
{
"category": "self",
"summary": "SUSE Bug 1071695",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "self",
"summary": "SUSE Bug 1072561",
"url": "https://bugzilla.suse.com/1072561"
},
{
"category": "self",
"summary": "SUSE Bug 1072876",
"url": "https://bugzilla.suse.com/1072876"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11600 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13167 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15115 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15868 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16534 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16534/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16538 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16538/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17448 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17449 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17558 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8824 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8824/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-01-05T15:16:16Z",
"generator": {
"date": "2018-01-05T15:16:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0031-1",
"initial_release_date": "2018-01-05T15:16:16Z",
"revision_history": [
{
"date": "2018-01-05T15:16:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.74-60.64.69.1.noarch",
"product": {
"name": "kernel-devel-3.12.74-60.64.69.1.noarch",
"product_id": "kernel-devel-3.12.74-60.64.69.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.74-60.64.69.1.noarch",
"product": {
"name": "kernel-macros-3.12.74-60.64.69.1.noarch",
"product_id": "kernel-macros-3.12.74-60.64.69.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.74-60.64.69.1.noarch",
"product": {
"name": "kernel-source-3.12.74-60.64.69.1.noarch",
"product_id": "kernel-source-3.12.74-60.64.69.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.69.1.ppc64le",
"product": {
"name": "kernel-default-3.12.74-60.64.69.1.ppc64le",
"product_id": "kernel-default-3.12.74-60.64.69.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"product_id": "kernel-default-base-3.12.74-60.64.69.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"product_id": "kernel-default-devel-3.12.74-60.64.69.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.69.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.74-60.64.69.1.ppc64le",
"product_id": "kernel-syms-3.12.74-60.64.69.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.69.1.s390x",
"product": {
"name": "kernel-default-3.12.74-60.64.69.1.s390x",
"product_id": "kernel-default-3.12.74-60.64.69.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.69.1.s390x",
"product": {
"name": "kernel-default-base-3.12.74-60.64.69.1.s390x",
"product_id": "kernel-default-base-3.12.74-60.64.69.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.69.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.69.1.s390x",
"product_id": "kernel-default-devel-3.12.74-60.64.69.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.74-60.64.69.1.s390x",
"product": {
"name": "kernel-default-man-3.12.74-60.64.69.1.s390x",
"product_id": "kernel-default-man-3.12.74-60.64.69.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.69.1.s390x",
"product": {
"name": "kernel-syms-3.12.74-60.64.69.1.s390x",
"product_id": "kernel-syms-3.12.74-60.64.69.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.69.1.x86_64",
"product": {
"name": "kernel-default-3.12.74-60.64.69.1.x86_64",
"product_id": "kernel-default-3.12.74-60.64.69.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.69.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.74-60.64.69.1.x86_64",
"product_id": "kernel-default-base-3.12.74-60.64.69.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"product_id": "kernel-default-devel-3.12.74-60.64.69.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.69.1.x86_64",
"product": {
"name": "kernel-syms-3.12.74-60.64.69.1.x86_64",
"product_id": "kernel-syms-3.12.74-60.64.69.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.74-60.64.69.1.x86_64",
"product": {
"name": "kernel-xen-3.12.74-60.64.69.1.x86_64",
"product_id": "kernel-xen-3.12.74-60.64.69.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"product_id": "kernel-xen-base-3.12.74-60.64.69.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"product_id": "kernel-xen-devel-3.12.74-60.64.69.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.12.74-60.64.69.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.74-60.64.69.1.x86_64",
"product_id": "kernel-ec2-3.12.74-60.64.69.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.74-60.64.69.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.74-60.64.69.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 6",
"product": {
"name": "SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.69.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.69.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.69.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.69.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.69.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.69.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.69.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.69.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.69.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.69.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.69.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.69.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.69.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le"
},
"product_reference": "kernel-default-3.12.74-60.64.69.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.69.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.69.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.69.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.69.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.69.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.69.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.74-60.64.69.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.69.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le"
},
"product_reference": "kernel-default-3.12.74-60.64.69.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.69.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x"
},
"product_reference": "kernel-default-3.12.74-60.64.69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.69.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.69.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x"
},
"product_reference": "kernel-default-base-3.12.74-60.64.69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.69.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.69.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.74-60.64.69.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x"
},
"product_reference": "kernel-default-man-3.12.74-60.64.69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.69.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.69.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.69.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.69.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.69.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.69.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.69.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.74-60.64.69.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.69.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x"
},
"product_reference": "kernel-syms-3.12.74-60.64.69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.69.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-11600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11600"
}
],
"notes": [
{
"category": "general",
"text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11600",
"url": "https://www.suse.com/security/cve/CVE-2017-11600"
},
{
"category": "external",
"summary": "SUSE Bug 1050231 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1050231"
},
{
"category": "external",
"summary": "SUSE Bug 1096564 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1096564"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-05T15:16:16Z",
"details": "important"
}
],
"title": "CVE-2017-11600"
},
{
"cve": "CVE-2017-13167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13167"
}
],
"notes": [
{
"category": "general",
"text": "An elevation of privilege vulnerability in the kernel sound timer. Product: Android. Versions: Android kernel. Android ID A-37240993.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13167",
"url": "https://www.suse.com/security/cve/CVE-2017-13167"
},
{
"category": "external",
"summary": "SUSE Bug 1072876 for CVE-2017-13167",
"url": "https://bugzilla.suse.com/1072876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-05T15:16:16Z",
"details": "low"
}
],
"title": "CVE-2017-13167"
},
{
"cve": "CVE-2017-15115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15115"
}
],
"notes": [
{
"category": "general",
"text": "The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15115",
"url": "https://www.suse.com/security/cve/CVE-2017-15115"
},
{
"category": "external",
"summary": "SUSE Bug 1068671 for CVE-2017-15115",
"url": "https://bugzilla.suse.com/1068671"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15115",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-05T15:16:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-15115"
},
{
"cve": "CVE-2017-15868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15868"
}
],
"notes": [
{
"category": "general",
"text": "The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel before 3.19 does not ensure that an l2cap socket is available, which allows local users to gain privileges via a crafted application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15868",
"url": "https://www.suse.com/security/cve/CVE-2017-15868"
},
{
"category": "external",
"summary": "SUSE Bug 1071470 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1071470"
},
{
"category": "external",
"summary": "SUSE Bug 1071471 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1071471"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-05T15:16:16Z",
"details": "important"
}
],
"title": "CVE-2017-15868"
},
{
"cve": "CVE-2017-16534",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16534"
}
],
"notes": [
{
"category": "general",
"text": "The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16534",
"url": "https://www.suse.com/security/cve/CVE-2017-16534"
},
{
"category": "external",
"summary": "SUSE Bug 1066693 for CVE-2017-16534",
"url": "https://bugzilla.suse.com/1066693"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16534",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-05T15:16:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-16534"
},
{
"cve": "CVE-2017-16538",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16538"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16538",
"url": "https://www.suse.com/security/cve/CVE-2017-16538"
},
{
"category": "external",
"summary": "SUSE Bug 1066569 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1066569"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-05T15:16:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-16538"
},
{
"cve": "CVE-2017-17448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17448"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17448",
"url": "https://www.suse.com/security/cve/CVE-2017-17448"
},
{
"category": "external",
"summary": "SUSE Bug 1071693 for CVE-2017-17448",
"url": "https://bugzilla.suse.com/1071693"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-05T15:16:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-17448"
},
{
"cve": "CVE-2017-17449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17449"
}
],
"notes": [
{
"category": "general",
"text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17449",
"url": "https://www.suse.com/security/cve/CVE-2017-17449"
},
{
"category": "external",
"summary": "SUSE Bug 1071694 for CVE-2017-17449",
"url": "https://bugzilla.suse.com/1071694"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-05T15:16:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-17449"
},
{
"cve": "CVE-2017-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17450"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17450",
"url": "https://www.suse.com/security/cve/CVE-2017-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1071695 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "external",
"summary": "SUSE Bug 1074033 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1074033"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-05T15:16:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-17450"
},
{
"cve": "CVE-2017-17558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17558"
}
],
"notes": [
{
"category": "general",
"text": "The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17558",
"url": "https://www.suse.com/security/cve/CVE-2017-17558"
},
{
"category": "external",
"summary": "SUSE Bug 1072561 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1072561"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-05T15:16:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-17558"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-05T15:16:16Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-05T15:16:16Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-05T15:16:16Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-8824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8824"
}
],
"notes": [
{
"category": "general",
"text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8824",
"url": "https://www.suse.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "SUSE Bug 1070771 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "external",
"summary": "SUSE Bug 1076734 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1076734"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.69.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.69.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-default-1-2.3.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_69-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-05T15:16:16Z",
"details": "important"
}
],
"title": "CVE-2017-8824"
}
]
}
SUSE-SU-2018:0285-1
Vulnerability from csaf_suse - Published: 2018-01-30 09:21 - Updated: 2018-01-30 09:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for SUSE Manager Server 3.0",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update fixes the following issues:\n\n!!!NOTE: For PostgreSQL, schema migrations could take a long time (hours), depending on the number of synced !!!\n!!!packages and number of rows which requires cleanup. Please refer to the release notes for more information.!!!\n\nnutch:\n\n- Fix log hadoop into proper directory. (bsc#1061574)\n\nosad:\n\n- Fixed TypeError for force flag in setup_config that could happen when jabberd restart was needed. (bsc#1064393)\n\npxe-default-image:\n\n- Spectre and Meltdown mitigation. (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754, bsc#1068032)\n\nspacecmd:\n\n- Added custom JSON encoder in order to parse date fields correctly. (bsc#1070372)\n\nspacewalk-backend:\n\n- Fix restore hostname and ip*addr in templated documents. (bsc#1075044)\n- Fix directory name in spacewalk-data-fsck.\n- RhnServerNetwork refactoring. (bsc#1063419)\n\nspacewalk-branding:\n\n- Fix message about package profile synchronization. (bsc#1073739)\n- Fix naming of the Tools channel. (bsc#979633)\n\nspacewalk-client-tools:\n\n- Fix package sources.\n\nspacewalk-java:\n\n- Fix message about package profile synchronization. (bsc#1073739)\n- Add VM state as info gathered from VMware. (bsc#1063759)\n- Improve performance of token checking, when RPMs or metadata are downloaded from minions. (bsc#1061273)\n- Fix action names and date formatting in system event history. (bsc#1073713)\n- Fix incorrect \u0027os-release\u0027 report after SP migration. (bsc#1071553)\n- Fix failed package installation when in RES 32 and 64 bit packages are installed together. (bsc#1071314)\n- Add user preferences in order to change items-per-page. (bsc#1055296)\n- Display messages about wrong input more end-user friendly. (bsc#1015956)\n- Fix content refresh when product keys change. (bsc#1069943)\n- Allow \u0027Package List Refresh\u0027 when package architecture has changed. (bsc#1065259)\n- Support Open Enterprise Server 2018. (bsc#1060182)\n- Do not remove virtual instances for registered systems. (bsc#1063759)\n- Process right configfile on \u0027scheduleFileComparisons\u0027 API calls. (bsc#1066663)\n- Fix reported UUIDs for guests instances within a virtual host. (bsc#1063759)\n- Generate Order Items for OEM subscriptions. (bsc#1045141)\n- Enable \u0027Power Management\u0027 features on Salt minions.\n- Fail gracefully when GPG files are requested. (bsc#1065676)\n- Improve messaging for \u0027Compare Packages\u0027. (bsc#1065844)\n- RhnServerNetwork refactoring. (bsc#1063419)\n- Add Adelaide timezone to selectable timezones. (bsc#1063891)\n\nspacewalk-reports:\n\n- More rhnServerNetwork refactoring. (bsc#1063419)\n\nspacewalk-search:\n\n- RhnServerNetwork refactoring. (bsc#1063419)\n\nspacewalk-web:\n\n- Add user preferences in order to change items-per-page. (bsc#1055296)\n\nsusemanager:\n\n- Support Open Enterprise Server 2018. (bsc#1060182)\n- Fixed bootstrap repository path for SLES4SAP version 12 and 12.1. (bsc#1062936)\n- Fix error message for database upgrade failure.\n- Check for sufficient diskspace in /var/lib/pgsql.\n- Notify admin that database backups need reconfiguration after db upgrade.\n\nsusemanager-docs_en:\n\n- Update text and image files:\n - List Open Enterprise Server 2015, 2015 SP1, 2018 as supported clients.\n\nsusemanager-schema:\n\n- Fix hostname schema upgrade. (bsc#1076622)\n- Fix duplicate entries in channel listings.\n- Handle nevra not found case while fixing duplicate evr ids. (bsc#1074508)\n- Enable \u0027Power Management\u0027 features on Salt minions.\n- Fix unique index for evr and capability and remove duplicates during migration. (bsc#1058110)\n- RhnServerNetwork refactoring. (bsc#1063419)\n- Add Adelaide timezone to selectable timezones. (bsc#1063891)\n\nsusemanager-sls:\n\n- Python3 compatibility fixes in modules and states.\n- Fix failing certs state for Tumbleweed. (bsc#970630)\n- Fix deprecated SLS files to avoid deprecation warnings during highstate. (bsc#1041993)\n\nsusemanager-sync-data:\n\n- Support Open Enterprise Server 2018. (bsc#1060182)\n- Fix description for HA channel. (bsc#1063588)\n- Add support for CAASP. (bsc#1052283)\n- Add IBM DLPAR channels to SLES for SAP SPx ppc64le. (bsc#1068057)\n- Remove Certification Module 12 from SP2 and SP3. (bsc#1066819)\n- Add SUSE Manager Server 3.0 and 3.1 channels for mirroring.\n- Support SLE-RT 12 SP3. (bsc#1063940)\n- Add SLE12 LTSS as extension to SLES for SAP 12. (bsc#1069615)\n- Remove OES2018 Debuginfo channels. (bsc#1071367)\n\nvirtual-host-gatherer:\n\n- Add VM state as info gathered from VMware. (bsc#1063759)\n- Explore the entire tree of nodes from VMware. (bsc#1070597)\n- Skip safely VMs which have no config attribute on VMware. (bsc#1066923)\n\nHow to apply this update:\n1. Log in as root user to the SUSE Manager server.\n2. Stop the Spacewalk service:\nspacewalk-service stop\n3. Apply the patch using either zypper patch or YaST Online Update.\n4. Upgrade the database schema:\nspacewalk-schema-upgrade\n5. Start the Spacewalk service:\nspacewalk-service start\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SUSE-Manager-Server-3.0-2018-204",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0285-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0285-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180285-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0285-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html"
},
{
"category": "self",
"summary": "SUSE Bug 1015956",
"url": "https://bugzilla.suse.com/1015956"
},
{
"category": "self",
"summary": "SUSE Bug 1041993",
"url": "https://bugzilla.suse.com/1041993"
},
{
"category": "self",
"summary": "SUSE Bug 1045141",
"url": "https://bugzilla.suse.com/1045141"
},
{
"category": "self",
"summary": "SUSE Bug 1052283",
"url": "https://bugzilla.suse.com/1052283"
},
{
"category": "self",
"summary": "SUSE Bug 1055296",
"url": "https://bugzilla.suse.com/1055296"
},
{
"category": "self",
"summary": "SUSE Bug 1058110",
"url": "https://bugzilla.suse.com/1058110"
},
{
"category": "self",
"summary": "SUSE Bug 1060182",
"url": "https://bugzilla.suse.com/1060182"
},
{
"category": "self",
"summary": "SUSE Bug 1061273",
"url": "https://bugzilla.suse.com/1061273"
},
{
"category": "self",
"summary": "SUSE Bug 1061574",
"url": "https://bugzilla.suse.com/1061574"
},
{
"category": "self",
"summary": "SUSE Bug 1062936",
"url": "https://bugzilla.suse.com/1062936"
},
{
"category": "self",
"summary": "SUSE Bug 1063419",
"url": "https://bugzilla.suse.com/1063419"
},
{
"category": "self",
"summary": "SUSE Bug 1063588",
"url": "https://bugzilla.suse.com/1063588"
},
{
"category": "self",
"summary": "SUSE Bug 1063759",
"url": "https://bugzilla.suse.com/1063759"
},
{
"category": "self",
"summary": "SUSE Bug 1063891",
"url": "https://bugzilla.suse.com/1063891"
},
{
"category": "self",
"summary": "SUSE Bug 1063940",
"url": "https://bugzilla.suse.com/1063940"
},
{
"category": "self",
"summary": "SUSE Bug 1064393",
"url": "https://bugzilla.suse.com/1064393"
},
{
"category": "self",
"summary": "SUSE Bug 1065259",
"url": "https://bugzilla.suse.com/1065259"
},
{
"category": "self",
"summary": "SUSE Bug 1065676",
"url": "https://bugzilla.suse.com/1065676"
},
{
"category": "self",
"summary": "SUSE Bug 1065844",
"url": "https://bugzilla.suse.com/1065844"
},
{
"category": "self",
"summary": "SUSE Bug 1066404",
"url": "https://bugzilla.suse.com/1066404"
},
{
"category": "self",
"summary": "SUSE Bug 1066663",
"url": "https://bugzilla.suse.com/1066663"
},
{
"category": "self",
"summary": "SUSE Bug 1066819",
"url": "https://bugzilla.suse.com/1066819"
},
{
"category": "self",
"summary": "SUSE Bug 1066923",
"url": "https://bugzilla.suse.com/1066923"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068057",
"url": "https://bugzilla.suse.com/1068057"
},
{
"category": "self",
"summary": "SUSE Bug 1069615",
"url": "https://bugzilla.suse.com/1069615"
},
{
"category": "self",
"summary": "SUSE Bug 1069943",
"url": "https://bugzilla.suse.com/1069943"
},
{
"category": "self",
"summary": "SUSE Bug 1070372",
"url": "https://bugzilla.suse.com/1070372"
},
{
"category": "self",
"summary": "SUSE Bug 1070597",
"url": "https://bugzilla.suse.com/1070597"
},
{
"category": "self",
"summary": "SUSE Bug 1071314",
"url": "https://bugzilla.suse.com/1071314"
},
{
"category": "self",
"summary": "SUSE Bug 1071367",
"url": "https://bugzilla.suse.com/1071367"
},
{
"category": "self",
"summary": "SUSE Bug 1071553",
"url": "https://bugzilla.suse.com/1071553"
},
{
"category": "self",
"summary": "SUSE Bug 1073713",
"url": "https://bugzilla.suse.com/1073713"
},
{
"category": "self",
"summary": "SUSE Bug 1073739",
"url": "https://bugzilla.suse.com/1073739"
},
{
"category": "self",
"summary": "SUSE Bug 1074508",
"url": "https://bugzilla.suse.com/1074508"
},
{
"category": "self",
"summary": "SUSE Bug 1075044",
"url": "https://bugzilla.suse.com/1075044"
},
{
"category": "self",
"summary": "SUSE Bug 1076622",
"url": "https://bugzilla.suse.com/1076622"
},
{
"category": "self",
"summary": "SUSE Bug 970630",
"url": "https://bugzilla.suse.com/970630"
},
{
"category": "self",
"summary": "SUSE Bug 979633",
"url": "https://bugzilla.suse.com/979633"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
}
],
"title": "Security update for SUSE Manager Server 3.0",
"tracking": {
"current_release_date": "2018-01-30T09:21:10Z",
"generator": {
"date": "2018-01-30T09:21:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0285-1",
"initial_release_date": "2018-01-30T09:21:10Z",
"revision_history": [
{
"date": "2018-01-30T09:21:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nutch-1.0-0.9.8.1.noarch",
"product": {
"name": "nutch-1.0-0.9.8.1.noarch",
"product_id": "nutch-1.0-0.9.8.1.noarch"
}
},
{
"category": "product_version",
"name": "osa-common-5.11.64.4-4.3.1.noarch",
"product": {
"name": "osa-common-5.11.64.4-4.3.1.noarch",
"product_id": "osa-common-5.11.64.4-4.3.1.noarch"
}
},
{
"category": "product_version",
"name": "osa-dispatcher-5.11.64.4-4.3.1.noarch",
"product": {
"name": "osa-dispatcher-5.11.64.4-4.3.1.noarch",
"product_id": "osa-dispatcher-5.11.64.4-4.3.1.noarch"
}
},
{
"category": "product_version",
"name": "pxe-default-image-3.0-0.14.3.6.noarch",
"product": {
"name": "pxe-default-image-3.0-0.14.3.6.noarch",
"product_id": "pxe-default-image-3.0-0.14.3.6.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-2.5.5.10-16.12.1.noarch",
"product": {
"name": "spacecmd-2.5.5.10-16.12.1.noarch",
"product_id": "spacecmd-2.5.5.10-16.12.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-app-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-app-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-app-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-applet-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-applet-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-applet-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-iss-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-iss-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-iss-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-libs-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-libs-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-libs-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-server-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-server-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-server-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-sql-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-sql-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-sql-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-tools-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-tools-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-tools-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch",
"product": {
"name": "spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch",
"product_id": "spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-base-2.5.7.20-25.12.1.noarch",
"product": {
"name": "spacewalk-base-2.5.7.20-25.12.1.noarch",
"product_id": "spacewalk-base-2.5.7.20-25.12.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-base-minimal-2.5.7.20-25.12.1.noarch",
"product": {
"name": "spacewalk-base-minimal-2.5.7.20-25.12.1.noarch",
"product_id": "spacewalk-base-minimal-2.5.7.20-25.12.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch",
"product": {
"name": "spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch",
"product_id": "spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-client-tools-2.5.13.9-18.3.3.noarch",
"product": {
"name": "spacewalk-client-tools-2.5.13.9-18.3.3.noarch",
"product_id": "spacewalk-client-tools-2.5.13.9-18.3.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-html-2.5.7.20-25.12.1.noarch",
"product": {
"name": "spacewalk-html-2.5.7.20-25.12.1.noarch",
"product_id": "spacewalk-html-2.5.7.20-25.12.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-2.5.59.19-27.12.3.noarch",
"product": {
"name": "spacewalk-java-2.5.59.19-27.12.3.noarch",
"product_id": "spacewalk-java-2.5.59.19-27.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-config-2.5.59.19-27.12.3.noarch",
"product": {
"name": "spacewalk-java-config-2.5.59.19-27.12.3.noarch",
"product_id": "spacewalk-java-config-2.5.59.19-27.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-lib-2.5.59.19-27.12.3.noarch",
"product": {
"name": "spacewalk-java-lib-2.5.59.19-27.12.3.noarch",
"product_id": "spacewalk-java-lib-2.5.59.19-27.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-oracle-2.5.59.19-27.12.3.noarch",
"product": {
"name": "spacewalk-java-oracle-2.5.59.19-27.12.3.noarch",
"product_id": "spacewalk-java-oracle-2.5.59.19-27.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch",
"product": {
"name": "spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch",
"product_id": "spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-reports-2.5.1.4-4.6.1.noarch",
"product": {
"name": "spacewalk-reports-2.5.1.4-4.6.1.noarch",
"product_id": "spacewalk-reports-2.5.1.4-4.6.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-search-2.5.2.4-4.6.1.noarch",
"product": {
"name": "spacewalk-search-2.5.2.4-4.6.1.noarch",
"product_id": "spacewalk-search-2.5.2.4-4.6.1.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-taskomatic-2.5.59.19-27.12.3.noarch",
"product": {
"name": "spacewalk-taskomatic-2.5.59.19-27.12.3.noarch",
"product_id": "spacewalk-taskomatic-2.5.59.19-27.12.3.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-advanced-topics_en-pdf-3-25.11.3.noarch",
"product": {
"name": "susemanager-advanced-topics_en-pdf-3-25.11.3.noarch",
"product_id": "susemanager-advanced-topics_en-pdf-3-25.11.3.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-best-practices_en-pdf-3-25.11.3.noarch",
"product": {
"name": "susemanager-best-practices_en-pdf-3-25.11.3.noarch",
"product_id": "susemanager-best-practices_en-pdf-3-25.11.3.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-docs_en-3-25.11.3.noarch",
"product": {
"name": "susemanager-docs_en-3-25.11.3.noarch",
"product_id": "susemanager-docs_en-3-25.11.3.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-getting-started_en-pdf-3-25.11.3.noarch",
"product": {
"name": "susemanager-getting-started_en-pdf-3-25.11.3.noarch",
"product_id": "susemanager-getting-started_en-pdf-3-25.11.3.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-jsp_en-3-25.11.3.noarch",
"product": {
"name": "susemanager-jsp_en-3-25.11.3.noarch",
"product_id": "susemanager-jsp_en-3-25.11.3.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-reference_en-pdf-3-25.11.3.noarch",
"product": {
"name": "susemanager-reference_en-pdf-3-25.11.3.noarch",
"product_id": "susemanager-reference_en-pdf-3-25.11.3.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-schema-3.0.24-25.11.1.noarch",
"product": {
"name": "susemanager-schema-3.0.24-25.11.1.noarch",
"product_id": "susemanager-schema-3.0.24-25.11.1.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-sls-0.1.25-27.12.1.noarch",
"product": {
"name": "susemanager-sls-0.1.25-27.12.1.noarch",
"product_id": "susemanager-sls-0.1.25-27.12.1.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-sync-data-3.0.19-28.6.1.noarch",
"product": {
"name": "susemanager-sync-data-3.0.19-28.6.1.noarch",
"product_id": "susemanager-sync-data-3.0.19-28.6.1.noarch"
}
},
{
"category": "product_version",
"name": "virtual-host-gatherer-1.0.16-7.6.1.noarch",
"product": {
"name": "virtual-host-gatherer-1.0.16-7.6.1.noarch",
"product_id": "virtual-host-gatherer-1.0.16-7.6.1.noarch"
}
},
{
"category": "product_version",
"name": "virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch",
"product": {
"name": "virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch",
"product_id": "virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "spacewalk-branding-2.5.2.16-16.9.1.s390x",
"product": {
"name": "spacewalk-branding-2.5.2.16-16.9.1.s390x",
"product_id": "spacewalk-branding-2.5.2.16-16.9.1.s390x"
}
},
{
"category": "product_version",
"name": "susemanager-3.0.25-25.9.1.s390x",
"product": {
"name": "susemanager-3.0.25-25.9.1.s390x",
"product_id": "susemanager-3.0.25-25.9.1.s390x"
}
},
{
"category": "product_version",
"name": "susemanager-tools-3.0.25-25.9.1.s390x",
"product": {
"name": "susemanager-tools-3.0.25-25.9.1.s390x",
"product_id": "susemanager-tools-3.0.25-25.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "spacewalk-branding-2.5.2.16-16.9.1.x86_64",
"product": {
"name": "spacewalk-branding-2.5.2.16-16.9.1.x86_64",
"product_id": "spacewalk-branding-2.5.2.16-16.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "susemanager-3.0.25-25.9.1.x86_64",
"product": {
"name": "susemanager-3.0.25-25.9.1.x86_64",
"product_id": "susemanager-3.0.25-25.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "susemanager-tools-3.0.25-25.9.1.x86_64",
"product": {
"name": "susemanager-tools-3.0.25-25.9.1.x86_64",
"product_id": "susemanager-tools-3.0.25-25.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Server 3.0",
"product": {
"name": "SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:3.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nutch-1.0-0.9.8.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:nutch-1.0-0.9.8.1.noarch"
},
"product_reference": "nutch-1.0-0.9.8.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osa-common-5.11.64.4-4.3.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:osa-common-5.11.64.4-4.3.1.noarch"
},
"product_reference": "osa-common-5.11.64.4-4.3.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osa-dispatcher-5.11.64.4-4.3.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:osa-dispatcher-5.11.64.4-4.3.1.noarch"
},
"product_reference": "osa-dispatcher-5.11.64.4-4.3.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pxe-default-image-3.0-0.14.3.6.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:pxe-default-image-3.0-0.14.3.6.noarch"
},
"product_reference": "pxe-default-image-3.0-0.14.3.6.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-2.5.5.10-16.12.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacecmd-2.5.5.10-16.12.1.noarch"
},
"product_reference": "spacecmd-2.5.5.10-16.12.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-app-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-app-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-app-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-applet-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-applet-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-applet-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-iss-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-iss-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-iss-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-libs-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-libs-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-libs-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-server-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-server-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-server-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-sql-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-sql-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-sql-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-tools-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-tools-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-tools-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch"
},
"product_reference": "spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-2.5.7.20-25.12.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-base-2.5.7.20-25.12.1.noarch"
},
"product_reference": "spacewalk-base-2.5.7.20-25.12.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-minimal-2.5.7.20-25.12.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-base-minimal-2.5.7.20-25.12.1.noarch"
},
"product_reference": "spacewalk-base-minimal-2.5.7.20-25.12.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch"
},
"product_reference": "spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-branding-2.5.2.16-16.9.1.s390x as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.s390x"
},
"product_reference": "spacewalk-branding-2.5.2.16-16.9.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-branding-2.5.2.16-16.9.1.x86_64 as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.x86_64"
},
"product_reference": "spacewalk-branding-2.5.2.16-16.9.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-client-tools-2.5.13.9-18.3.3.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-client-tools-2.5.13.9-18.3.3.noarch"
},
"product_reference": "spacewalk-client-tools-2.5.13.9-18.3.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-html-2.5.7.20-25.12.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-html-2.5.7.20-25.12.1.noarch"
},
"product_reference": "spacewalk-html-2.5.7.20-25.12.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-2.5.59.19-27.12.3.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-java-2.5.59.19-27.12.3.noarch"
},
"product_reference": "spacewalk-java-2.5.59.19-27.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-config-2.5.59.19-27.12.3.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-java-config-2.5.59.19-27.12.3.noarch"
},
"product_reference": "spacewalk-java-config-2.5.59.19-27.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-lib-2.5.59.19-27.12.3.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-java-lib-2.5.59.19-27.12.3.noarch"
},
"product_reference": "spacewalk-java-lib-2.5.59.19-27.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-oracle-2.5.59.19-27.12.3.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-java-oracle-2.5.59.19-27.12.3.noarch"
},
"product_reference": "spacewalk-java-oracle-2.5.59.19-27.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch"
},
"product_reference": "spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-reports-2.5.1.4-4.6.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-reports-2.5.1.4-4.6.1.noarch"
},
"product_reference": "spacewalk-reports-2.5.1.4-4.6.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-search-2.5.2.4-4.6.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-search-2.5.2.4-4.6.1.noarch"
},
"product_reference": "spacewalk-search-2.5.2.4-4.6.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-taskomatic-2.5.59.19-27.12.3.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:spacewalk-taskomatic-2.5.59.19-27.12.3.noarch"
},
"product_reference": "spacewalk-taskomatic-2.5.59.19-27.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-3.0.25-25.9.1.s390x as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.s390x"
},
"product_reference": "susemanager-3.0.25-25.9.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-3.0.25-25.9.1.x86_64 as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.x86_64"
},
"product_reference": "susemanager-3.0.25-25.9.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-advanced-topics_en-pdf-3-25.11.3.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:susemanager-advanced-topics_en-pdf-3-25.11.3.noarch"
},
"product_reference": "susemanager-advanced-topics_en-pdf-3-25.11.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-best-practices_en-pdf-3-25.11.3.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:susemanager-best-practices_en-pdf-3-25.11.3.noarch"
},
"product_reference": "susemanager-best-practices_en-pdf-3-25.11.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-docs_en-3-25.11.3.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:susemanager-docs_en-3-25.11.3.noarch"
},
"product_reference": "susemanager-docs_en-3-25.11.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-getting-started_en-pdf-3-25.11.3.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:susemanager-getting-started_en-pdf-3-25.11.3.noarch"
},
"product_reference": "susemanager-getting-started_en-pdf-3-25.11.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-jsp_en-3-25.11.3.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:susemanager-jsp_en-3-25.11.3.noarch"
},
"product_reference": "susemanager-jsp_en-3-25.11.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-reference_en-pdf-3-25.11.3.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:susemanager-reference_en-pdf-3-25.11.3.noarch"
},
"product_reference": "susemanager-reference_en-pdf-3-25.11.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-schema-3.0.24-25.11.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:susemanager-schema-3.0.24-25.11.1.noarch"
},
"product_reference": "susemanager-schema-3.0.24-25.11.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-sls-0.1.25-27.12.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:susemanager-sls-0.1.25-27.12.1.noarch"
},
"product_reference": "susemanager-sls-0.1.25-27.12.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-sync-data-3.0.19-28.6.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:susemanager-sync-data-3.0.19-28.6.1.noarch"
},
"product_reference": "susemanager-sync-data-3.0.19-28.6.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-tools-3.0.25-25.9.1.s390x as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.s390x"
},
"product_reference": "susemanager-tools-3.0.25-25.9.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-tools-3.0.25-25.9.1.x86_64 as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.x86_64"
},
"product_reference": "susemanager-tools-3.0.25-25.9.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtual-host-gatherer-1.0.16-7.6.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:virtual-host-gatherer-1.0.16-7.6.1.noarch"
},
"product_reference": "virtual-host-gatherer-1.0.16-7.6.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch as component of SUSE Manager Server 3.0",
"product_id": "SUSE Manager Server 3.0:virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch"
},
"product_reference": "virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Server 3.0:nutch-1.0-0.9.8.1.noarch",
"SUSE Manager Server 3.0:osa-common-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:osa-dispatcher-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:pxe-default-image-3.0-0.14.3.6.noarch",
"SUSE Manager Server 3.0:spacecmd-2.5.5.10-16.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-app-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-applet-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-tools-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.s390x",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.x86_64",
"SUSE Manager Server 3.0:spacewalk-client-tools-2.5.13.9-18.3.3.noarch",
"SUSE Manager Server 3.0:spacewalk-html-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-java-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-config-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-lib-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-oracle-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-reports-2.5.1.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-search-2.5.2.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-taskomatic-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:susemanager-advanced-topics_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-best-practices_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-docs_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-getting-started_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-jsp_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-reference_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-schema-3.0.24-25.11.1.noarch",
"SUSE Manager Server 3.0:susemanager-sls-0.1.25-27.12.1.noarch",
"SUSE Manager Server 3.0:susemanager-sync-data-3.0.19-28.6.1.noarch",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:virtual-host-gatherer-1.0.16-7.6.1.noarch",
"SUSE Manager Server 3.0:virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Server 3.0:nutch-1.0-0.9.8.1.noarch",
"SUSE Manager Server 3.0:osa-common-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:osa-dispatcher-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:pxe-default-image-3.0-0.14.3.6.noarch",
"SUSE Manager Server 3.0:spacecmd-2.5.5.10-16.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-app-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-applet-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-tools-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.s390x",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.x86_64",
"SUSE Manager Server 3.0:spacewalk-client-tools-2.5.13.9-18.3.3.noarch",
"SUSE Manager Server 3.0:spacewalk-html-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-java-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-config-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-lib-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-oracle-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-reports-2.5.1.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-search-2.5.2.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-taskomatic-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:susemanager-advanced-topics_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-best-practices_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-docs_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-getting-started_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-jsp_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-reference_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-schema-3.0.24-25.11.1.noarch",
"SUSE Manager Server 3.0:susemanager-sls-0.1.25-27.12.1.noarch",
"SUSE Manager Server 3.0:susemanager-sync-data-3.0.19-28.6.1.noarch",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:virtual-host-gatherer-1.0.16-7.6.1.noarch",
"SUSE Manager Server 3.0:virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Manager Server 3.0:nutch-1.0-0.9.8.1.noarch",
"SUSE Manager Server 3.0:osa-common-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:osa-dispatcher-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:pxe-default-image-3.0-0.14.3.6.noarch",
"SUSE Manager Server 3.0:spacecmd-2.5.5.10-16.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-app-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-applet-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-tools-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.s390x",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.x86_64",
"SUSE Manager Server 3.0:spacewalk-client-tools-2.5.13.9-18.3.3.noarch",
"SUSE Manager Server 3.0:spacewalk-html-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-java-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-config-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-lib-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-oracle-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-reports-2.5.1.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-search-2.5.2.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-taskomatic-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:susemanager-advanced-topics_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-best-practices_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-docs_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-getting-started_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-jsp_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-reference_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-schema-3.0.24-25.11.1.noarch",
"SUSE Manager Server 3.0:susemanager-sls-0.1.25-27.12.1.noarch",
"SUSE Manager Server 3.0:susemanager-sync-data-3.0.19-28.6.1.noarch",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:virtual-host-gatherer-1.0.16-7.6.1.noarch",
"SUSE Manager Server 3.0:virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-30T09:21:10Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Server 3.0:nutch-1.0-0.9.8.1.noarch",
"SUSE Manager Server 3.0:osa-common-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:osa-dispatcher-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:pxe-default-image-3.0-0.14.3.6.noarch",
"SUSE Manager Server 3.0:spacecmd-2.5.5.10-16.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-app-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-applet-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-tools-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.s390x",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.x86_64",
"SUSE Manager Server 3.0:spacewalk-client-tools-2.5.13.9-18.3.3.noarch",
"SUSE Manager Server 3.0:spacewalk-html-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-java-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-config-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-lib-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-oracle-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-reports-2.5.1.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-search-2.5.2.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-taskomatic-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:susemanager-advanced-topics_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-best-practices_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-docs_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-getting-started_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-jsp_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-reference_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-schema-3.0.24-25.11.1.noarch",
"SUSE Manager Server 3.0:susemanager-sls-0.1.25-27.12.1.noarch",
"SUSE Manager Server 3.0:susemanager-sync-data-3.0.19-28.6.1.noarch",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:virtual-host-gatherer-1.0.16-7.6.1.noarch",
"SUSE Manager Server 3.0:virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Server 3.0:nutch-1.0-0.9.8.1.noarch",
"SUSE Manager Server 3.0:osa-common-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:osa-dispatcher-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:pxe-default-image-3.0-0.14.3.6.noarch",
"SUSE Manager Server 3.0:spacecmd-2.5.5.10-16.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-app-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-applet-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-tools-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.s390x",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.x86_64",
"SUSE Manager Server 3.0:spacewalk-client-tools-2.5.13.9-18.3.3.noarch",
"SUSE Manager Server 3.0:spacewalk-html-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-java-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-config-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-lib-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-oracle-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-reports-2.5.1.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-search-2.5.2.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-taskomatic-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:susemanager-advanced-topics_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-best-practices_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-docs_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-getting-started_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-jsp_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-reference_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-schema-3.0.24-25.11.1.noarch",
"SUSE Manager Server 3.0:susemanager-sls-0.1.25-27.12.1.noarch",
"SUSE Manager Server 3.0:susemanager-sync-data-3.0.19-28.6.1.noarch",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:virtual-host-gatherer-1.0.16-7.6.1.noarch",
"SUSE Manager Server 3.0:virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Server 3.0:nutch-1.0-0.9.8.1.noarch",
"SUSE Manager Server 3.0:osa-common-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:osa-dispatcher-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:pxe-default-image-3.0-0.14.3.6.noarch",
"SUSE Manager Server 3.0:spacecmd-2.5.5.10-16.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-app-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-applet-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-tools-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.s390x",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.x86_64",
"SUSE Manager Server 3.0:spacewalk-client-tools-2.5.13.9-18.3.3.noarch",
"SUSE Manager Server 3.0:spacewalk-html-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-java-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-config-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-lib-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-oracle-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-reports-2.5.1.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-search-2.5.2.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-taskomatic-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:susemanager-advanced-topics_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-best-practices_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-docs_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-getting-started_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-jsp_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-reference_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-schema-3.0.24-25.11.1.noarch",
"SUSE Manager Server 3.0:susemanager-sls-0.1.25-27.12.1.noarch",
"SUSE Manager Server 3.0:susemanager-sync-data-3.0.19-28.6.1.noarch",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:virtual-host-gatherer-1.0.16-7.6.1.noarch",
"SUSE Manager Server 3.0:virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-30T09:21:10Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Server 3.0:nutch-1.0-0.9.8.1.noarch",
"SUSE Manager Server 3.0:osa-common-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:osa-dispatcher-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:pxe-default-image-3.0-0.14.3.6.noarch",
"SUSE Manager Server 3.0:spacecmd-2.5.5.10-16.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-app-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-applet-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-tools-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.s390x",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.x86_64",
"SUSE Manager Server 3.0:spacewalk-client-tools-2.5.13.9-18.3.3.noarch",
"SUSE Manager Server 3.0:spacewalk-html-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-java-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-config-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-lib-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-oracle-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-reports-2.5.1.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-search-2.5.2.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-taskomatic-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:susemanager-advanced-topics_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-best-practices_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-docs_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-getting-started_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-jsp_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-reference_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-schema-3.0.24-25.11.1.noarch",
"SUSE Manager Server 3.0:susemanager-sls-0.1.25-27.12.1.noarch",
"SUSE Manager Server 3.0:susemanager-sync-data-3.0.19-28.6.1.noarch",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:virtual-host-gatherer-1.0.16-7.6.1.noarch",
"SUSE Manager Server 3.0:virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Server 3.0:nutch-1.0-0.9.8.1.noarch",
"SUSE Manager Server 3.0:osa-common-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:osa-dispatcher-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:pxe-default-image-3.0-0.14.3.6.noarch",
"SUSE Manager Server 3.0:spacecmd-2.5.5.10-16.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-app-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-applet-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-tools-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.s390x",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.x86_64",
"SUSE Manager Server 3.0:spacewalk-client-tools-2.5.13.9-18.3.3.noarch",
"SUSE Manager Server 3.0:spacewalk-html-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-java-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-config-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-lib-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-oracle-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-reports-2.5.1.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-search-2.5.2.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-taskomatic-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:susemanager-advanced-topics_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-best-practices_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-docs_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-getting-started_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-jsp_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-reference_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-schema-3.0.24-25.11.1.noarch",
"SUSE Manager Server 3.0:susemanager-sls-0.1.25-27.12.1.noarch",
"SUSE Manager Server 3.0:susemanager-sync-data-3.0.19-28.6.1.noarch",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:virtual-host-gatherer-1.0.16-7.6.1.noarch",
"SUSE Manager Server 3.0:virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Server 3.0:nutch-1.0-0.9.8.1.noarch",
"SUSE Manager Server 3.0:osa-common-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:osa-dispatcher-5.11.64.4-4.3.1.noarch",
"SUSE Manager Server 3.0:pxe-default-image-3.0-0.14.3.6.noarch",
"SUSE Manager Server 3.0:spacecmd-2.5.5.10-16.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-app-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-applet-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-common-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-config-files-tool-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-iss-export-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-package-push-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-server-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-oracle-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-sql-postgresql-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-tools-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xml-export-libs-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-backend-xmlrpc-2.5.24.15-26.14.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-base-minimal-config-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.s390x",
"SUSE Manager Server 3.0:spacewalk-branding-2.5.2.16-16.9.1.x86_64",
"SUSE Manager Server 3.0:spacewalk-client-tools-2.5.13.9-18.3.3.noarch",
"SUSE Manager Server 3.0:spacewalk-html-2.5.7.20-25.12.1.noarch",
"SUSE Manager Server 3.0:spacewalk-java-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-config-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-lib-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-oracle-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-java-postgresql-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:spacewalk-reports-2.5.1.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-search-2.5.2.4-4.6.1.noarch",
"SUSE Manager Server 3.0:spacewalk-taskomatic-2.5.59.19-27.12.3.noarch",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:susemanager-advanced-topics_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-best-practices_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-docs_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-getting-started_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-jsp_en-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-reference_en-pdf-3-25.11.3.noarch",
"SUSE Manager Server 3.0:susemanager-schema-3.0.24-25.11.1.noarch",
"SUSE Manager Server 3.0:susemanager-sls-0.1.25-27.12.1.noarch",
"SUSE Manager Server 3.0:susemanager-sync-data-3.0.19-28.6.1.noarch",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.s390x",
"SUSE Manager Server 3.0:susemanager-tools-3.0.25-25.9.1.x86_64",
"SUSE Manager Server 3.0:virtual-host-gatherer-1.0.16-7.6.1.noarch",
"SUSE Manager Server 3.0:virtual-host-gatherer-VMware-1.0.16-7.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-30T09:21:10Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
}
]
}
SUSE-SU-2018:0383-1
Vulnerability from csaf_suse - Published: 2018-02-07 13:35 - Updated: 2018-02-07 13:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.114 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).\n\n The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2017-15129: A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel in the function get_net_ns_by_id() in net/core/net_namespace.c did not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely (bnc#1074839).\n- CVE-2017-17712: The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel has a race condition in inet-\u003ehdrincl that leads to uninitialized stack pointer usage; this allowed a local user to execute code and gain privileges (bnc#1073229).\n- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignored unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).\n- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a \u0027pointer leak (bnc#1073928).\n- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).\n- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).\n- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).\n- CVE-2018-1000004: In the Linux kernel a race condition vulnerability existed in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).\n\nThe following non-security bugs were fixed:\n\n- 8021q: fix a memory leak for VLAN 0 device (bnc#1012382).\n- acpi / scan: Prefer devices without _HID/_CID for _ADR matching (bnc#1012382).\n- af_key: fix buffer overread in parse_exthdrs() (bnc#1012382).\n- af_key: fix buffer overread in verify_address_len() (bnc#1012382).\n- afs: Adjust mode bits processing (bnc#1012382).\n- afs: Connect up the CB.ProbeUuid (bnc#1012382).\n- afs: Fix afs_kill_pages() (bnc#1012382).\n- afs: Fix missing put_page() (bnc#1012382).\n- afs: Fix page leak in afs_write_begin() (bnc#1012382).\n- afs: Fix the maths in afs_fs_store_data() (bnc#1012382).\n- afs: Flush outstanding writes when an fd is closed (bnc#1012382).\n- afs: Migrate vlocation fields to 64-bit (bnc#1012382).\n- afs: Populate and use client modification time (bnc#1012382).\n- afs: Populate group ID from vnode status (bnc#1012382).\n- afs: Prevent callback expiry timer overflow (bnc#1012382).\n- alpha: fix build failures (bnc#1012382).\n- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1031717).\n- alsa: aloop: Fix racy hw constraints adjustment (bsc#1031717).\n- alsa: aloop: Release cable upon open error path (bsc#1031717).\n- alsa: hda - Add HP ZBook 15u G3 Conexant CX20724 GPIO mute leds (bsc#1031717).\n- alsa: hda - Add MIC_NO_PRESENCE fixup for 2 HP machines (bsc#1031717).\n- alsa: hda - Add mute led support for HP EliteBook 840 G3 (bsc#1031717).\n- alsa: hda - Add mute led support for HP ProBook 440 G4 (bsc#1031717).\n- alsa: hda - add support for docking station for HP 820 G2 (bsc#1031717).\n- alsa: hda - add support for docking station for HP 840 G3 (bsc#1031717).\n- alsa: hda - Apply headphone noise quirk for another Dell XPS 13 variant (bsc#1031717).\n- alsa: hda - Apply the existing quirk to iMac 14,1 (bsc#1031717).\n- alsa: hda - change the location for one mic on a Lenovo machine (bsc#1031717).\n- alsa: hda: Drop useless WARN_ON() (bsc#1031717).\n- alsa: hda - Fix click noises on Samsung Ativ Book 8 (bsc#1031717).\n- alsa: hda - fix headset mic detection issue on a Dell machine (bsc#1031717).\n- alsa: hda - fix headset mic problem for Dell machines with alc274 (bsc#1031717).\n- alsa: hda - Fix headset microphone detection for ASUS N551 and N751 (bsc#1031717).\n- alsa: hda - Fix mic regression by ASRock mobo fixup (bsc#1031717).\n- alsa: hda - Fix missing COEF init for ALC225/295/299 (bsc#1031717).\n- alsa: hda - Fix surround output pins for ASRock B150M mobo (bsc#1031717).\n- alsa: hda - On-board speaker fixup on ACER Veriton (bsc#1031717).\n- alsa: hda/realtek - Add ALC256 HP depop function (bsc#1031717).\n- alsa: hda/realtek - Add default procedure for suspend and resume state (bsc#1031717).\n- alsa: hda/realtek - Add support for Acer Aspire E5-475 headset mic (bsc#1031717).\n- alsa: hda/realtek - Add support for ALC1220 (bsc#1031717).\n- alsa: hda/realtek - Add support for headset MIC for ALC622 (bsc#1031717).\n- alsa: hda/realtek - ALC891 headset mode for Dell (bsc#1031717).\n- alsa: hda/realtek - change the location for one of two front microphones (bsc#1031717).\n- alsa: hda/realtek - Enable jack detection function for Intel ALC700 (bsc#1031717).\n- alsa: hda/realtek - Fix ALC275 no sound issue (bsc#1031717).\n- alsa: hda/realtek - Fix Dell AIO LineOut issue (bsc#1031717).\n- alsa: hda/realtek - Fix headset and mic on several Asus laptops with ALC256 (bsc#1031717).\n- alsa: hda/realtek - Fix headset mic and speaker on Asus X441SA/X441UV (bsc#1031717).\n- alsa: hda/realtek - fix headset mic detection for MSI MS-B120 (bsc#1031717).\n- alsa: hda/realtek - Fix headset mic on several Asus laptops with ALC255 (bsc#1031717).\n- alsa: hda/realtek - Fix pincfg for Dell XPS 13 9370 (bsc#1031717).\n- alsa: hda/realtek - Fix speaker support for Asus AiO ZN270IE (bsc#1031717).\n- alsa: hda/realtek - Fix typo of pincfg for Dell quirk (bsc#1031717).\n- alsa: hda/realtek - New codec device ID for ALC1220 (bsc#1031717).\n- alsa: hda/realtek - New codecs support for ALC215/ALC285/ALC289 (bsc#1031717).\n- alsa: hda/realtek - New codec support for ALC257 (bsc#1031717).\n- alsa: hda/realtek - New codec support of ALC1220 (bsc#1031717).\n- alsa: hda/realtek - No loopback on ALC225/ALC295 codec (bsc#1031717).\n- alsa: hda/realtek - Remove ALC285 device ID (bsc#1031717).\n- alsa: hda/realtek - Support Dell headset mode for ALC3271 (bsc#1031717).\n- alsa: hda/realtek - Support headset mode for ALC234/ALC274/ALC294 (bsc#1031717).\n- alsa: hda/realtek - There is no loopback mixer in the ALC234/274/294 (bsc#1031717).\n- alsa: hda/realtek - Update headset mode for ALC225 (bsc#1031717).\n- alsa: hda/realtek - Update headset mode for ALC298 (bsc#1031717).\n- alsa: hda - Skip Realtek SKU check for Lenovo machines (bsc#1031717).\n- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1031717).\n- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1031717).\n- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1031717).\n- alsa: pcm: prevent UAF in snd_pcm_info (bsc#1031717).\n- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1031717).\n- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1031717).\n- alsa: rawmidi: Avoid racy info ioctl via ctl device (bsc#1031717).\n- alsa: seq: Remove spurious WARN_ON() at timer check (bsc#1031717).\n- alsa: usb-audio: Add check return value for usb_string() (bsc#1031717).\n- alsa: usb-audio: Fix out-of-bound error (bsc#1031717).\n- alsa: usb-audio: Fix the missing ctl name suffix at parsing SU (bsc#1031717).\n- arc: uaccess: dont use \u0027l\u0027 gcc inline asm constraint modifier (bnc#1012382).\n- arm64: Add skeleton to harden the branch predictor against aliasing attacks (bsc#1068032).\n- arm64: Add trace_hardirqs_off annotation in ret_to_user (bsc#1068032).\n- arm64: Branch predictor hardening for Cavium ThunderX2 (bsc#1068032).\n- arm64/cpufeature: do not use mutex in bringup path (bsc#1068032).\n- arm64: cpufeature: Pass capability structure to -\u003eenable callback (bsc#1068032).\n- arm64: cputype: Add MIDR values for Cavium ThunderX2 CPUs (bsc#1068032).\n- arm64: cputype: Add missing MIDR values for Cortex-A72 and Cortex-A75 (bsc#1068032).\n- arm64: debug: remove unused local_dbg_{enable, disable} macros (bsc#1068032).\n- arm64: Define cputype macros for Falkor CPU (bsc#1068032).\n- arm64: Disable TTBR0_EL1 during normal kernel execution (bsc#1068032).\n- arm64: Do not force KPTI for CPUs that are not vulnerable (bsc#1076187).\n- arm64: do not pull uaccess.h into *.S (bsc#1068032).\n- arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: entry: Add exception trampoline page for exceptions from EL0 (bsc#1068032).\n- arm64: entry: Add fake CPU feature for unmapping the kernel at EL0 (bsc#1068032).\n- arm64: entry: Explicitly pass exception level to kernel_ventry macro (bsc#1068032).\n- arm64: entry: Hook up entry trampoline to exception vectors (bsc#1068032).\n- arm64: entry: remove pointless SPSR mode check (bsc#1068032).\n- arm64: entry.S convert el0_sync (bsc#1068032).\n- arm64: entry.S: convert el1_sync (bsc#1068032).\n- arm64: entry.S: convert elX_irq (bsc#1068032).\n- arm64: entry.S: move SError handling into a C function for future expansion (bsc#1068032).\n- arm64: entry.S: Remove disable_dbg (bsc#1068032).\n- arm64: erratum: Work around Falkor erratum #E1003 in trampoline code (bsc#1068032).\n- arm64: explicitly mask all exceptions (bsc#1068032).\n- arm64: factor out entry stack manipulation (bsc#1068032).\n- arm64: factor out PAGE_* and CONT_* definitions (bsc#1068032).\n- arm64: Factor out PAN enabling/disabling into separate uaccess_* macros (bsc#1068032).\n- arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm macro (bsc#1068032).\n- arm64: factor work_pending state machine to C (bsc#1068032).\n- arm64: fpsimd: Prevent registers leaking from dead tasks (bnc#1012382).\n- arm64: Handle el1 synchronous instruction aborts cleanly (bsc#1068032).\n- arm64: Handle faults caused by inadvertent user access with PAN enabled (bsc#1068032).\n- arm64: head.S: get rid of x25 and x26 with \u0027global\u0027 scope (bsc#1068032).\n- arm64: Implement branch predictor hardening for affected Cortex-A CPUs (bsc#1068032).\n- arm64: Implement branch predictor hardening for Falkor (bsc#1068032).\n- arm64: Initialise high_memory global variable earlier (bnc#1012382).\n- arm64: introduce an order for exceptions (bsc#1068032).\n- arm64: introduce mov_q macro to move a constant into a 64-bit register (bsc#1068032).\n- arm64: Introduce uaccess_{disable,enable} functionality based on TTBR0_EL1 (bsc#1068032).\n- arm64: kaslr: Put kernel vectors address in separate data page (bsc#1068032).\n- arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 (bsc#1068032).\n- arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry (bsc#1068032).\n- arm64: kill ESR_LNX_EXEC (bsc#1068032).\n- arm64: kpti: Fix the interaction between ASID switching and software PAN (bsc#1068032).\n- arm64: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bsc#1076232).\n- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).\n- arm64: kvm: Make PSCI_VERSION a fast path (bsc#1068032).\n- arm64: kvm: Use per-CPU vector when BP hardening is enabled (bsc#1068032).\n- arm64: Mask all exceptions during kernel_exit (bsc#1068032).\n- arm64: mm: Add arm64_kernel_unmapped_at_el0 helper (bsc#1068032).\n- arm64: mm: Allocate ASIDs in pairs (bsc#1068032).\n- arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: mm: hardcode rodata=true (bsc#1068032).\n- arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR (bsc#1068032).\n- arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI (bsc#1068032).\n- arm64: mm: Map entry trampoline into trampoline and kernel page tables (bsc#1068032).\n- arm64: mm: Move ASID from TTBR0 to TTBR1 (bsc#1068032).\n- arm64: mm: Remove pre_ttbr0_update_workaround for Falkor erratum #E1003 (bsc#1068032).\n- arm64: mm: Rename post_ttbr0_update_workaround (bsc#1068032).\n- arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: mm: Use non-global mappings for kernel space (bsc#1068032).\n- arm64: Move BP hardening to check_and_switch_context (bsc#1068032).\n- arm64: Move post_ttbr_update_workaround to C code (bsc#1068032).\n- arm64: Move the async/fiq helpers to explicitly set process context flags (bsc#1068032).\n- arm64: SW PAN: Point saved ttbr0 at the zero page when switching to init_mm (bsc#1068032).\n- arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb (bsc#1068032).\n- arm64: swp emulation: bound LL/SC retries before rescheduling (bsc#1068032).\n- arm64: sysreg: Fix unprotected macro argmuent in write_sysreg (bsc#1068032).\n- arm64: Take into account ID_AA64PFR0_EL1.CSV3 (bsc#1068032).\n- arm64: thunderx2: remove branch predictor hardening References: bsc#1076232 This causes undefined instruction abort on the smc call from guest kernel. Disable until kvm is fixed.\n- arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks (bsc#1068032).\n- arm64: Turn on KPTI only on CPUs that need it (bsc#1076187).\n- arm64: use alternative auto-nop (bsc#1068032).\n- arm64: use RET instruction for exiting the trampoline (bsc#1068032).\n- arm64: xen: Enable user access before a privcmd hvc call (bsc#1068032).\n- arm/arm64: kvm: Make default HYP mappings non-excutable (bsc#1068032).\n- arm: avoid faulting on qemu (bnc#1012382).\n- arm: BUG if jumping to usermode address in kernel mode (bnc#1012382).\n- arm-ccn: perf: Prevent module unload while PMU is in use (bnc#1012382).\n- arm: dma-mapping: disallow dma_get_sgtable() for non-kernel managed memory (bnc#1012382).\n- arm: dts: am335x-evmsk: adjust mmc2 param to allow suspend (bnc#1012382).\n- arm: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7 (bnc#1012382).\n- arm: dts: omap3: logicpd-torpedo-37xx-devkit: Fix MMC1 cd-gpio (bnc#1012382).\n- arm: dts: ti: fix PCI bus dtc warnings (bnc#1012382).\n- arm: kprobes: Align stack to 8-bytes in test code (bnc#1012382).\n- arm: kprobes: Fix the return address of multiple kretprobes (bnc#1012382).\n- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).\n- arm: OMAP1: DMA: Correct the number of logical channels (bnc#1012382).\n- arm: OMAP2+: Fix device node reference counts (bnc#1012382).\n- arm: OMAP2+: gpmc-onenand: propagate error on initialization failure (bnc#1012382).\n- arm: OMAP2+: Release device node after it is no longer needed (bnc#1012382).\n- asm-prototypes: Clear any CPP defines before declaring the functions (git-fixes).\n- asn.1: check for error from ASN1_OP_END__ACT actions (bnc#1012382).\n- asn.1: fix out-of-bounds read when parsing indefinite length item (bnc#1012382).\n- asoc: fsl_ssi: AC\u002797 ops need regmap, clock and cleaning up on failure (bsc#1031717).\n- asoc: twl4030: fix child-node lookup (bsc#1031717).\n- asoc: wm_adsp: Fix validation of firmware and coeff lengths (bsc#1031717).\n- ath9k: fix tx99 potential info leak (bnc#1012382).\n- atm: horizon: Fix irq release error (bnc#1012382).\n- audit: ensure that \u0027audit=1\u0027 actually enables audit for PID 1 (bnc#1012382).\n- axonram: Fix gendisk handling (bnc#1012382).\n- backlight: pwm_bl: Fix overflow condition (bnc#1012382).\n- bcache: add a comment in journal bucket reading (bsc#1076110).\n- bcache: Avoid nested function definition (bsc#1076110).\n- bcache: bch_allocator_thread() is not freezable (bsc#1076110).\n- bcache: bch_writeback_thread() is not freezable (bsc#1076110).\n- bcache: check return value of register_shrinker (bsc#1076110).\n- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).\n- bcache: documentation updates and corrections (bsc#1076110).\n- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).\n- bcache: do not write back data if reading it failed (bsc#1076110).\n- bcache: explicitly destroy mutex while exiting (bnc#1012382).\n- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).\n- bcache: Fix building error on MIPS (bnc#1012382).\n- bcache: fix sequential large write IO bypass (bsc#1076110).\n- bcache: fix wrong cache_misses statistics (bnc#1012382).\n- bcache: gc does not work when triggering by manual command (bsc#1076110, bsc#1038078).\n- bcache: implement PI controller for writeback rate (bsc#1076110).\n- bcache: increase the number of open buckets (bsc#1076110).\n- bcache: only permit to recovery read error when cache device is clean (bnc#1012382 bsc#1043652).\n- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110, bsc#1019784).\n- bcache: rearrange writeback main thread ratelimit (bsc#1076110).\n- bcache: recover data from backing when data is clean (bnc#1012382 bsc#1043652).\n- bcache: Remove redundant set_capacity (bsc#1076110).\n- bcache: remove unused parameter (bsc#1076110).\n- bcache: rewrite multiple partitions support (bsc#1076110, bsc#1038085).\n- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).\n- bcache: silence static checker warning (bsc#1076110).\n- bcache: smooth writeback rate control (bsc#1076110).\n- bcache.txt: standardize document format (bsc#1076110).\n- bcache: update bio-\u003ebi_opf bypass/writeback REQ_ flag hints (bsc#1076110).\n- bcache: update bucket_in_use in real time (bsc#1076110).\n- bcache: Update continue_at() documentation (bsc#1076110).\n- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).\n- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).\n- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).\n- bcache: writeback rate shouldn\u0027t artifically clamp (bsc#1076110).\n- be2net: restore properly promisc mode after queues reconfiguration (bsc#963844 FATE#320192).\n- block: wake up all tasks blocked in get_request() (bnc#1012382).\n- bluetooth: btusb: driver to enable the usb-wakeup feature (bnc#1012382).\n- bnx2x: do not rollback VF MAC/VLAN filters we did not configure (bnc#1012382).\n- bnx2x: fix possible overrun of VFPF multicast addresses array (bnc#1012382).\n- bnx2x: prevent crash when accessing PTP with interface down (bnc#1012382).\n- btrfs: add missing memset while reading compressed inline extents (bnc#1012382).\n- btrfs: clear space cache inode generation always (bnc#1012382).\n- btrfs: embed extent_changeset::range_changed to the structure (dependent patch, bsc#1031395).\n- btrfs: qgroup: Fix qgroup reserved space underflow by only freeing reserved ranges (bsc#1031395).\n- btrfs: qgroup: Fix qgroup reserved space underflow caused by buffered write and quotas being enabled (bsc#1031395).\n- btrfs: qgroup: Introduce extent changeset for qgroup reserve functions (dependent patch, bsc#1031395).\n- btrfs: qgroup: Return actually freed bytes for qgroup release or free data (bsc#1031395).\n- btrfs: qgroup-test: Fix backport error in qgroup selftest (just to make CONFIG_BTRFS_FS_RUN_SANITY_TESTS pass compile).\n- btrfs: ulist: make the finalization function public (dependent patch, bsc#1031395).\n- btrfs: ulist: rename ulist_fini to ulist_release (dependent patch, bsc#1031395).\n- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).\n- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).\n- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: gs_usb: fix return value of the \u0027set_bittiming\u0027 callback (bnc#1012382).\n- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bnc#1012382).\n- can: kvaser_usb: free buf in error paths (bnc#1012382).\n- can: kvaser_usb: ratelimit errors if incomplete messages are received (bnc#1012382).\n- can: peak: fix potential bug in packet fragmentation (bnc#1012382).\n- can: ti_hecc: Fix napi poll return value for repoll (bnc#1012382).\n- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- cdc-acm: apply quirk for card reader (bsc#1060279).\n- cdrom: factor out common open_for_* code (bsc#1048585).\n- cdrom: wait for tray to close (bsc#1048585).\n- ceph: more accurate statfs (bsc#1077068).\n- clk: imx6: refine hdmi_isfr\u0027s parent to make HDMI work on i.MX6 SoCs w/o VPU (bnc#1012382).\n- clk: mediatek: add the option for determining PLL source clock (bnc#1012382).\n- clk: tegra: Fix cclk_lp divisor register (bnc#1012382).\n- config: arm64: enable HARDEN_BRANCH_PREDICTOR\n- config: arm64: enable UNMAP_KERNEL_AT_EL0\n- cpuidle: fix broadcast control when broadcast can not be entered (bnc#1012382).\n- cpuidle: powernv: Pass correct drv-\u003ecpumask for registration (bnc#1012382).\n- cpuidle: Validate cpu_dev in cpuidle_add_sysfs() (bnc#1012382).\n- crypto: algapi - fix NULL dereference in crypto_remove_spawns() (bnc#1012382).\n- crypto: chacha20poly1305 - validate the digest size (bnc#1012382).\n- crypto: chelsio - select CRYPTO_GF128MUL (bsc#1048325).\n- crypto: crypto4xx - increase context and scatter ring buffer elements (bnc#1012382).\n- crypto: deadlock between crypto_alg_sem/rtnl_mutex/genl_mutex (bnc#1012382).\n- crypto: mcryptd - protect the per-CPU queue with a lock (bnc#1012382).\n- crypto: n2 - cure use after free (bnc#1012382).\n- crypto: pcrypt - fix freeing pcrypt instances (bnc#1012382).\n- crypto: s5p-sss - Fix completing crypto request in IRQ handler (bnc#1012382).\n- crypto: tcrypt - fix buffer lengths in test_aead_speed() (bnc#1012382).\n- cxl: Check if vphb exists before iterating over AFU devices (bsc#1066223).\n- dax: Pass detailed error code from __dax_fault() (bsc#1072484).\n- dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state (bnc#1012382).\n- delay: add poll_event_interruptible (bsc#1048585).\n- dlm: fix malfunction of dlm_tool caused by debugfs changes (bsc#1077704).\n- dmaengine: dmatest: move callback wait queue to thread context (bnc#1012382).\n- dmaengine: Fix array index out of bounds warning in __get_unmap_pool() (bnc#1012382).\n- dmaengine: pl330: fix double lock (bnc#1012382).\n- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bnc#1012382).\n- dm btree: fix serious bug in btree_split_beneath() (bnc#1012382).\n- dm bufio: fix shrinker scans when (nr_to_scan \u003c retain_target) (bnc#1012382).\n- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bnc#1012382).\n- drivers/firmware: Expose psci_get_version through psci_ops structure (bsc#1068032).\n- drm/amd/amdgpu: fix console deadlock if late init failed (bnc#1012382).\n- drm: extra printk() wrapper macros (bnc#1012382).\n- drm/exynos/decon5433: set STANDALONE_UPDATE_F on output enablement (bnc#1012382).\n- drm/exynos: gem: Drop NONCONTIG flag for buffers allocated without IOMMU (bnc#1012382).\n- drm/omap: fix dmabuf mmap for dma_alloc\u0027ed buffers (bnc#1012382).\n- drm/radeon: fix atombios on big endian (bnc#1012382).\n- drm/radeon: reinstate oland workaround for sclk (bnc#1012382).\n- drm/radeon/si: add dpm quirk for Oland (bnc#1012382).\n- drm/vmwgfx: Potential off by one in vmw_view_add() (bnc#1012382).\n- dynamic-debug-howto: fix optional/omitted ending line number to be LARGE instead of 0 (bnc#1012382).\n- edac, i5000, i5400: Fix definition of NRECMEMB register (bnc#1012382).\n- edac, i5000, i5400: Fix use of MTR_DRAM_WIDTH macro (bnc#1012382).\n- edac, sb_edac: Fix missing break in switch (bnc#1012382).\n- eeprom: at24: check at24_read/write arguments (bnc#1012382).\n- efi/esrt: Cleanup bad memory map log messages (bnc#1012382).\n- efi: Move some sysfs files to be read-only by root (bnc#1012382).\n- eventpoll.h: add missing epoll event masks (bnc#1012382).\n- ext4: fix crash when a directory\u0027s i_size is too small (bnc#1012382).\n- ext4: Fix ENOSPC handling in DAX page fault handle (bsc#1072484).\n- ext4: fix fdatasync(2) after fallocate(2) operation (bnc#1012382).\n- fbdev: controlfb: Add missing modes to fix out of bounds access (bnc#1012382).\n- Fix EX_SIZE. We do not have the patches that shave off parts of the exception data.\n- Fix mishandling of cases with MSR not being present (writing to MSR even though _state == -1).\n- Fix return value from ib[rs|pb]_enabled()\n- Fixup hang when calling \u0027nvme list\u0027 on all paths down (bsc#1070052).\n- fjes: Fix wrong netdevice feature flags (bnc#1012382).\n- flow_dissector: properly cap thoff field (bnc#1012382).\n- fm10k: ensure we process SM mbx when processing VF mbx (bnc#1012382).\n- fork: clear thread stack upon allocation (bsc#1077560).\n- fscache: Fix the default for fscache_maybe_release_page() (bnc#1012382).\n- futex: Prevent overflow by strengthen input validation (bnc#1012382).\n- gcov: disable for COMPILE_TEST (bnc#1012382).\n- gfs2: Take inode off order_write list when setting jdata flag (bnc#1012382).\n- gpio: altera: Use handle_level_irq when configured as a level_high (bnc#1012382).\n- hid: chicony: Add support for another ASUS Zen AiO keyboard (bnc#1012382).\n- hid: xinmo: fix for out of range for THT 2P arcade controller (bnc#1012382).\n- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1012382).\n- hv: kvp: Avoid reading past allocated blocks from KVP file (bnc#1012382).\n- hwmon: (asus_atk0110) fix uninitialized data access (bnc#1012382).\n- i40iw: Account for IPv6 header when setting MSS (bsc#1024376 FATE#321249).\n- i40iw: Allocate a sdbuf per CQP WQE (bsc#1024376 FATE#321249).\n- i40iw: Cleanup AE processing (bsc#1024376 FATE#321249).\n- i40iw: Clear CQP Head/Tail during initialization (bsc#1024376 FATE#321249).\n- i40iw: Correct ARP index mask (bsc#1024376 FATE#321249).\n- i40iw: Do not allow posting WR after QP is flushed (bsc#1024376 FATE#321249).\n- i40iw: Do not free sqbuf when event is I40IW_TIMER_TYPE_CLOSE (bsc#1024376 FATE#321249).\n- i40iw: Do not generate CQE for RTR on QP flush (bsc#1024376 FATE#321249).\n- i40iw: Do not retransmit MPA request after it is ACKed (bsc#1024376 FATE#321249).\n- i40iw: Fixes for static checker warnings (bsc#1024376 FATE#321249).\n- i40iw: Ignore AE source field in AEQE for some AEs (bsc#1024376 FATE#321249).\n- i40iw: Move cqp_cmd_head init to CQP initialization (bsc#1024376 FATE#321249).\n- i40iw: Move exception_lan_queue to VSI structure (bsc#1024376 FATE#321249).\n- i40iw: Move MPA request event for loopback after connect (bsc#1024376 FATE#321249).\n- i40iw: Notify user of established connection after QP in RTS (bsc#1024376 FATE#321249).\n- i40iw: Reinitialize IEQ on MTU change (bsc#1024376 FATE#321249).\n- ib/hfi1: Fix misspelling in comment (bsc#973818, fate#319242).\n- ib/hfi1: Prevent kernel QP post send hard lockups (bsc#973818 FATE#319242).\n- ib/ipoib: Fix lockdep issue found on ipoib_ib_dev_heavy_flush (git-fixes).\n- ib/ipoib: Fix race condition in neigh creation (bsc#1022595 FATE#322350).\n- ib/ipoib: Grab rtnl lock on heavy flush when calling ndo_open/stop (bnc#1012382).\n- ib/mlx4: Increase maximal message size under UD QP (bnc#1012382).\n- ib/mlx5: Assign send CQ and recv CQ of UMR QP (bnc#1012382).\n- ib/mlx5: Serialize access to the VMA list (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- ibmvnic: Allocate and request vpd in init_resources (bsc#1076872).\n- ibmvnic: Do not handle RX interrupts when not up (bsc#1075066).\n- ibmvnic: Fix IP offload control buffer (bsc#1076899).\n- ibmvnic: Fix IPv6 packet descriptors (bsc#1076899).\n- ibmvnic: Fix pending MAC address changes (bsc#1075627).\n- ibmvnic: Modify buffer size and number of queues on failover (bsc#1076872).\n- ibmvnic: Revert to previous mtu when unsupported value requested (bsc#1076872).\n- ibmvnic: Wait for device response when changing MAC (bsc#1078681).\n- ib/rdmavt: restore IRQs on error path in rvt_create_ah() (bsc#973818, fate#319242).\n- ib/srpt: Disable RDMA access by the initiator (bnc#1012382).\n- ib/srpt: Fix ACL lookup during login (bsc#1024296 FATE#321265).\n- ib/uverbs: Fix command checking as part of ib_uverbs_ex_modify_qp() (FATE#321231 FATE#321473 FATE#322153 FATE#322149).\n- igb: check memory allocation failure (bnc#1012382).\n- ima: fix hash algorithm initialization (bnc#1012382).\n- inet: frag: release spinlock before calling icmp_send() (bnc#1012382).\n- input: 88pm860x-ts - fix child-node lookup (bnc#1012382).\n- input: elantech - add new icbody type 15 (bnc#1012382).\n- input: i8042 - add TUXEDO BU1406 (N24_25BU) to the nomux list (bnc#1012382).\n- input: trackpoint - force 3 buttons if 0 button is reported (bnc#1012382).\n- input: twl4030-vibra - fix sibling-node lookup (bnc#1012382).\n- input: twl6040-vibra - fix child-node lookup (bnc#1012382).\n- input: twl6040-vibra - fix DT node memory management (bnc#1012382).\n- intel_th: pci: Add Gemini Lake support (bnc#1012382).\n- iommu/arm-smmu-v3: Do not free page table ops twice (bnc#1012382).\n- iommu/vt-d: Fix scatterlist offset handling (bnc#1012382).\n- ip6_gre: remove the incorrect mtu limit for ipgre tap (bsc#1022912 FATE#321246).\n- ip6_tunnel: disable dst caching if tunnel is dual-stack (bnc#1012382).\n- ip_gre: remove the incorrect mtu limit for ipgre tap (bsc#1022912 FATE#321246).\n- ipmi: Stop timers before cleaning up the module (bnc#1012382).\n- ipv4: Fix use-after-free when flushing FIB tables (bnc#1012382).\n- ipv4: igmp: guard against silly MTU values (bnc#1012382).\n- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (bnc#1012382).\n- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (bnc#1012382).\n- ipv6: fix possible mem leaks in ipv6_make_skb() (bnc#1012382).\n- ipv6: fix udpv6 sendmsg crash caused by too small MTU (bnc#1012382).\n- ipv6: ip6_make_skb() needs to clear cork.base.dst (git-fixes).\n- ipv6: mcast: better catch silly mtu values (bnc#1012382).\n- ipv6: reorder icmpv6_init() and ip6_mr_init() (bnc#1012382).\n- ipvlan: fix ipv6 outbound device (bnc#1012382).\n- ipvlan: remove excessive packet scrubbing (bsc#1070799).\n- irda: vlsi_ir: fix check for DMA mapping errors (bnc#1012382).\n- irqchip/crossbar: Fix incorrect type of register size (bnc#1012382).\n- iscsi_iser: Re-enable \u0027iser_pi_guard\u0027 module parameter (bsc#1062129).\n- iscsi-target: fix memory leak in lio_target_tiqn_addtpg() (bnc#1012382).\n- iscsi-target: Make TASK_REASSIGN use proper se_cmd-\u003ecmd_kref (bnc#1012382).\n- isdn: kcapi: avoid uninitialized data (bnc#1012382).\n- iser-target: Fix possible use-after-free in connection establishment error (FATE#321732).\n- iw_cxgb4: Only validate the MSN for successful completions (bnc#1012382).\n- iw_cxgb4: reflect the original WR opcode in drain cqes (bsc#321658 FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).\n- iw_cxgb4: when flushing, complete all wrs in a chain (bsc#321658 FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).\n- ixgbe: fix use of uninitialized padding (bnc#1012382).\n- jump_label: Invoke jump_label_test() via early_initcall() (bnc#1012382).\n- kabi fix for new hash_cred function (bsc#1012917).\n- kabi: Keep KVM stable after enable s390 wire up bpb feature (bsc#1076805).\n- kABI: protect struct bpf_map (kabi).\n- kABI: protect struct ipv6_pinfo (kabi).\n- kABI: protect struct t10_alua_tg_pt_gp (kabi).\n- kABI: protect struct usbip_device (kabi).\n- kabi/severities: arm64: ignore cpu capability array\n- kabi/severities: do not care about stuff_RSB\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382).\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382).\n- kbuild: add \u0027-fno-stack-check\u0027 to kernel build options (bnc#1012382).\n- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).\n- kbuild: pkg: use --transform option to prefix paths in tar (bnc#1012382).\n- kdb: Fix handling of kallsyms_symbol_next() return value (bnc#1012382).\n- kernel/acct.c: fix the acct-\u003eneedcheck check in check_free_space() (bnc#1012382).\n- kernel: make groups_sort calling a responsibility group_info allocators (bnc#1012382).\n- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals (bnc#1012382).\n- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL (bnc#1012382).\n- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() (bnc#1012382).\n- keys: add missing permission check for request_key() destination (bnc#1012382).\n- kprobes/x86: Disable preemption in ftrace-based jprobes (bnc#1012382).\n- kpti: Rename to PAGE_TABLE_ISOLATION (bnc#1012382).\n- kpti: Report when enabled (bnc#1012382).\n- kvm: Fix stack-out-of-bounds read in write_mmio (bnc#1012382).\n- kvm: nVMX: reset nested_run_pending if the vCPU is going to be reset (bnc#1012382).\n- kvm: nVMX: VMCLEAR should not cause the vCPU to shut down (bnc#1012382).\n- kvm: pci-assign: do not map smm memory slot pages in vt-d page tables (bnc#1012382).\n- kvm: s390: Enable all facility bits that are known good for passthrough (bsc#1076805).\n- kvm: s390: wire up bpb feature (bsc#1076805).\n- kvm: VMX: Fix enable VPID conditions (bnc#1012382).\n- kvm: VMX: remove I/O port 0x80 bypass on Intel hosts (bnc#1012382).\n- kvm: vmx: Scrub hardware GPRs at VM-exit (bnc#1012382 bsc#1068032).\n- kvm: x86: Add memory barrier on vmcs field lookup (bnc#1012382).\n- kvm: x86: correct async page present tracepoint (bnc#1012382).\n- kvm: x86: Exit to user-mode on #UD intercept when emulator requires (bnc#1012382).\n- kvm: X86: Fix load RFLAGS w/o the fixed bit (bnc#1012382).\n- kvm: x86: fix RSM when PCID is non-zero (bnc#1012382).\n- kvm: x86: inject exceptions produced by x86_decode_insn (bnc#1012382).\n- kvm: x86: pvclock: Handle first-time write to pvclock-page contains random junk (bnc#1012382).\n- l2tp: cleanup l2tp_tunnel_delete calls (bnc#1012382).\n- lan78xx: Fix failure in USB Full Speed (bnc#1012382).\n- libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (bnc#1012382).\n- libata: drop WARN from protocol error in ata_sff_qc_issue() (bnc#1012382).\n- lib/genalloc.c: make the avail variable an atomic_long_t (bnc#1012382).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bnc#1012382).\n- md: more open-coded offset_in_page() (bsc#1076110).\n- media: dvb: i2c transfers over usb cannot be done from stack (bnc#1012382).\n- mfd: cros ec: spi: Do not send first message too soon (bnc#1012382).\n- mfd: twl4030-audio: Fix sibling-node lookup (bnc#1012382).\n- mfd: twl6040: Fix child-node lookup (bnc#1012382).\n- mlxsw: reg: Fix SPVMLR max record count (bnc#1012382).\n- mlxsw: reg: Fix SPVM max record count (bnc#1012382).\n- mm: avoid returning VM_FAULT_RETRY from -\u003epage_mkwrite handlers (bnc#1012382).\n- mmc: core: Do not leave the block driver in a suspended state (bnc#1012382).\n- mmc: mediatek: Fixed bug where clock frequency could be set wrong (bnc#1012382).\n- mm: drop unused pmdp_huge_get_and_clear_notify() (bnc#1012382).\n- mm: Handle 0 flags in _calc_vm_trans() macro (bnc#1012382).\n- mm/mprotect: add a cond_resched() inside change_pmd_range() (bnc#1077871, bnc#1078002).\n- mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP (bnc#1012382).\n- module: Add retpoline tag to VERMAGIC (bnc#1012382).\n- module: set __jump_table alignment to 8 (bnc#1012382).\n- more bio_map_user_iov() leak fixes (bnc#1012382).\n- mtd: nand: Fix writing mtdoops to nand flash (bnc#1012382).\n- net: Allow neigh contructor functions ability to modify the primary_key (bnc#1012382).\n- net/appletalk: Fix kernel memory disclosure (bnc#1012382).\n- net: bcmgenet: correct MIB access of UniMAC RUNT counters (bnc#1012382).\n- net: bcmgenet: correct the RBUF_OVFL_CNT and RBUF_ERR_CNT MIB values (bnc#1012382).\n- net: bcmgenet: power down internal phy if open or resume fails (bnc#1012382).\n- net: bcmgenet: Power up the internal PHY before probing the MII (bnc#1012382).\n- net: bcmgenet: reserved phy revisions must be checked first (bnc#1012382).\n- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks (bnc#1012382).\n- net: core: fix module type in sock_diag_bind (bnc#1012382).\n- net: Do not allow negative values for busy_read and busy_poll sysctl interfaces (bnc#1012382).\n- net: fec: fix multicast filtering hardware setup (bnc#1012382).\n- netfilter: bridge: honor frag_max_size when refragmenting (bnc#1012382).\n- netfilter: do not track fragmented packets (bnc#1012382).\n- netfilter: ipvs: Fix inappropriate output of procfs (bnc#1012382).\n- netfilter: nfnetlink_queue: fix secctx memory leak (bnc#1012382).\n- netfilter: nfnetlink_queue: fix timestamp attribute (bsc#1074134).\n- netfilter: nfnl_cthelper: fix a race when walk the nf_ct_helper_hash table (bnc#1012382).\n- netfilter: nfnl_cthelper: Fix memory leak (bnc#1012382).\n- netfilter: nfnl_cthelper: fix runtime expectation policy updates (bnc#1012382).\n- net: Fix double free and memory corruption in get_net_ns_by_id() (bnc#1012382).\n- net: igmp: fix source address check for IGMPv3 reports (bnc#1012382).\n- net: igmp: Use correct source address on IGMPv3 reports (bnc#1012382).\n- net: initialize msg.msg_flags in recvfrom (bnc#1012382).\n- net: ipv4: fix for a race condition in raw_sendmsg (bnc#1012382).\n- netlink: add a start callback for starting a netlink dump (bnc#1012382).\n- net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y (bnc#1012382).\n- net/mlx5: Avoid NULL pointer dereference on steering cleanup (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5: Cleanup IRQs in case of unload failure (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: Add refcount to VXLAN structure (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: Fix ETS BW check (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: Fix features check of IPv6 traffic (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: Fix fixpoint divide exception in mlx5e_am_stats_compare (bsc#1015342).\n- net/mlx5e: Fix possible deadlock of VXLAN lock (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: Prevent possible races in VXLAN control flow (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5: Fix error flow in CREATE_QP command (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5: Fix rate limit packet pacing naming and struct (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5: Stay in polling mode when command EQ destroy fails (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (bnc#1012382).\n- net: mvneta: clear interface link status on port disable (bnc#1012382).\n- net: mvneta: eliminate wrong call to handle rx descriptor error (fate#319899).\n- net: mvneta: use proper rxq_number in loop on rx queues (fate#319899).\n- net/packet: fix a race in packet_bind() and packet_notifier() (bnc#1012382).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bnc#1012382).\n- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround (bnc#1012382).\n- net: qdisc_pkt_len_init() should be more robust (bnc#1012382).\n- net: qmi_wwan: add Sierra EM7565 1199:9091 (bnc#1012382).\n- net: qmi_wwan: Add USB IDs for MDM6600 modem on Motorola Droid 4 (bnc#1012382).\n- net: reevalulate autoflowlabel setting after sysctl setting (bnc#1012382).\n- net: Resend IGMP memberships upon peer notification (bnc#1012382).\n- net: sctp: fix array overrun read on sctp_timer_tbl (bnc#1012382).\n- net: stmmac: enable EEE in MII, GMII or RGMII only (bnc#1012382).\n- net: systemport: Pad packet before inserting TSB (bnc#1012382).\n- net: systemport: Utilize skb_put_padto() (bnc#1012382).\n- net: tcp: close sock if net namespace is exiting (bnc#1012382).\n- net: wimax/i2400m: fix NULL-deref at probe (bnc#1012382).\n- nfsd: auth: Fix gid sorting when rootsquash enabled (bnc#1012382).\n- nfsd: Fix another OPEN stateid race (bnc#1012382).\n- nfsd: fix nfsd_minorversion(.., NFSD_AVAIL) (bnc#1012382).\n- nfsd: fix nfsd_reset_versions for NFSv4 (bnc#1012382).\n- nfsd: Fix stateid races between OPEN and CLOSE (bnc#1012382).\n- nfsd: Make init_open_stateid() a bit more whole (bnc#1012382).\n- nfs: Do not take a reference on fl-\u003efl_file for LOCK operation (bnc#1012382).\n- nfs: Fix a typo in nfs_rename() (bnc#1012382).\n- nfs: improve shinking of access cache (bsc#1012917).\n- nfsv4.1 respect server\u0027s max size in CREATE_SESSION (bnc#1012382).\n- nfsv4: Fix client recovery when server reboots multiple times (bnc#1012382).\n- nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick() (bnc#1012382).\n- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) (bnc#1012382).\n- nvme_fc: correct hang in nvme_ns_remove() (bsc#1075811).\n- nvme_fc: fix rogue admin cmds stalling teardown (bsc#1075811).\n- nvme-pci: Remove watchdog timer (bsc#1066163).\n- openrisc: fix issue handling 8 byte get_user calls (bnc#1012382).\n- packet: fix crash in fanout_demux_rollover() (bnc#1012382).\n- parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel (bnc#1012382).\n- parisc: Hide Diva-built-in serial aux and graphics card (bnc#1012382).\n- partially revert tipc improve link resiliency when rps is activated (bsc#1068038).\n- pci/AER: Report non-fatal errors only to the affected endpoint (bnc#1012382).\n- pci: Avoid bus reset if bridge itself is broken (bnc#1012382).\n- pci: Create SR-IOV virtfn/physfn links before attaching driver (bnc#1012382).\n- pci: Detach driver before procfs \u0026 sysfs teardown on device remove (bnc#1012382).\n- pci/PME: Handle invalid data when reading Root Status (bnc#1012382).\n- pci / PM: Force devices to D0 in pci_pm_thaw_noirq() (bnc#1012382).\n- perf symbols: Fix symbols__fixup_end heuristic for corner cases (bnc#1012382).\n- perf test attr: Fix ignored test case result (bnc#1012382).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bnc#1012382).\n- pinctrl: adi2: Fix Kconfig build problem (bnc#1012382).\n- pinctrl: st: add irq_request/release_resources callbacks (bnc#1012382).\n- pipe: avoid round_pipe_size() nr_pages overflow on 32-bit (bnc#1012382).\n- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075087).\n- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075087).\n- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032, bsc#1075087).\n- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075087).\n- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075087).\n- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075087).\n- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).\n- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075087).\n- powerpc/ipic: Fix status get and status clear (bnc#1012382).\n- powerpc/perf: Dereference BHRB entries safely (bsc#1066223).\n- powerpc/perf/hv-24x7: Fix incorrect comparison in memord (bnc#1012382).\n- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032, bsc#1075087).\n- powerpc/powernv/cpufreq: Fix the frequency read by /proc/cpuinfo (bnc#1012382).\n- powerpc/powernv/ioda2: Gracefully fail if too many TCE levels requested (bnc#1012382).\n- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075087).\n- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075087).\n- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032, bsc#1075087).\n- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: prevent crash when changing flush type to fallback after system boot (bsc#1068032, bsc#1075087).\n- ppp: Destroy the mutex when cleanup (bnc#1012382).\n- pppoe: take -\u003eneeded_headroom of lower device into account on xmit (bnc#1012382).\n- pti: unbreak EFI (bsc#1074709).\n- r8152: fix the list rx_done may be used without initialization (bnc#1012382).\n- r8152: prevent the driver from transmitting packets with carrier off (bnc#1012382).\n- r8169: fix memory corruption on retrieval of hardware statistics (bnc#1012382).\n- raid5: Set R5_Expanded on parity devices as well as data (bnc#1012382).\n- ravb: Remove Rx overflow log messages (bnc#1012382).\n- rbd: set max_segments to USHRT_MAX (bnc#1012382).\n- rdma/cma: Avoid triggering undefined behavior (bnc#1012382).\n- rdma/i40iw: Remove MSS change support (bsc#1024376 FATE#321249).\n- rds: Fix NULL pointer dereference in __rds_rdma_map (bnc#1012382).\n- rds: Heap OOB write in rds_message_alloc_sgs() (bnc#1012382).\n- rds: null pointer dereference in rds_atomic_free_op (bnc#1012382).\n- Re-enable fixup detection by CPU type in case hypervisor call fails.\n- regulator: core: Rely on regulator_dev_release to free constraints (bsc#1074847).\n- regulator: da9063: Return an error code on probe failure (bsc#1074847).\n- regulator: pwm: Fix regulator ramp delay for continuous mode (bsc#1074847).\n- regulator: Try to resolve regulators supplies on registration (bsc#1074847).\n- Revert \u0027Bluetooth: btusb: driver to enable the usb-wakeup feature\u0027 (bnc#1012382).\n- Revert \u0027drm/armada: Fix compile fail\u0027 (bnc#1012382).\n- Revert \u0027drm/radeon: dont switch vt on suspend\u0027 (bnc#1012382).\n- Revert \u0027ipsec: Fix aborted xfrm policy dump crash\u0027 (kabi).\n- Revert \u0027kaiser: vmstat show NR_KAISERTABLE as nr_overhead\u0027 (kabi).\n- Revert \u0027lib/genalloc.c: make the avail variable an atomic_long_t\u0027 (kabi).\n- Revert \u0027module: Add retpoline tag to VERMAGIC\u0027 (bnc#1012382 kabi).\n- Revert \u0027module: Add retpoline tag to VERMAGIC\u0027 (kabi).\n- Revert \u0027netlink: add a start callback for starting a netlink dump\u0027 (kabi).\n- Revert \u0027ocfs2: should wait dio before inode lock in ocfs2_setattr()\u0027 (bnc#1012382).\n- Revert \u0027Re-enable fixup detection by CPU type in case hypervisor call fails.\u0027 The firmware update is required for the existing instructions to also do the cache flush.\n- Revert \u0027s390/kbuild: enable modversions for symbols exported from asm\u0027 (bnc#1012382).\n- Revert \u0027sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks\u0027 (kabi).\n- Revert \u0027scsi: libsas: align sata_device\u0027s rps_resp on a cacheline\u0027 (kabi).\n- Revert \u0027spi: SPI_FSL_DSPI should depend on HAS_DMA\u0027 (bnc#1012382).\n- Revert \u0027userfaultfd: selftest: vm: allow to build in vm/ directory\u0027 (bnc#1012382).\n- Revert \u0027x86/efi: Build our own page table structures\u0027 (bnc#1012382).\n- Revert \u0027x86/efi: Hoist page table switching code into efi_call_virt()\u0027 (bnc#1012382).\n- Revert \u0027x86/mm/pat: Ensure cpa-\u003epfn only contains page frame numbers\u0027 (bnc#1012382).\n- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075087).\n- ring-buffer: Mask out the info bits when returning buffer page length (bnc#1012382).\n- route: also update fnhe_genid when updating a route cache (bnc#1012382).\n- route: update fnhe_expires for redirect when the fnhe exists (bnc#1012382).\n- rtc: cmos: Initialize hpet timer before irq is registered (bsc#1077592).\n- rtc: pcf8563: fix output clock rate (bnc#1012382).\n- rtc: pl031: make interrupt optional (bnc#1012382).\n- rtc: set the alarm to the next expiring timer (bnc#1012382).\n- s390: always save and restore all registers on context switch (bnc#1012382).\n- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847, LTC#163740).\n- s390: fix compat system call table (bnc#1012382).\n- s390/pci: do not require AIS facility (bnc#1012382).\n- s390/qeth: no ETH header for outbound AF_IUCV (LTC#156276 bnc#1012382 bnc#1053472).\n- s390/runtime instrumentation: simplify task exit handling (bnc#1012382).\n- sch_dsmark: fix invalid skb_cow() usage (bnc#1012382).\n- sched/deadline: Make sure the replenishment timer fires in the next period (bnc#1012382).\n- sched/deadline: Throttle a constrained deadline task activated after the deadline (bnc#1012382).\n- sched/deadline: Use deadline instead of period when calculating overflow (bnc#1012382).\n- sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks (bnc#1012382).\n- sched/deadline: Zero out positive runtime after throttling constrained tasks (git-fixes).\n- sched/rt: Do not pull from current CPU if only one CPU to pull (bnc#1022476).\n- scsi: bfa: integer overflow in debugfs (bnc#1012382).\n- scsi: cxgb4i: fix Tx skb leak (bnc#1012382).\n- scsi: handle ABORTED_COMMAND on Fujitsu ETERNUS (bsc#1069138).\n- scsi: hpsa: cleanup sas_phy structures in sysfs when unloading (bnc#1012382).\n- scsi: hpsa: destroy sas transport properties before scsi_host (bnc#1012382).\n- scsi: libsas: align sata_device\u0027s rps_resp on a cacheline (bnc#1012382).\n- scsi: lpfc: Use after free in lpfc_rq_buf_free() (bsc#1037838).\n- scsi: mpt3sas: Fix IO error occurs on pulling out a drive from RAID1 volume created on two SATA drive (bnc#1012382).\n- scsi: sd: change allow_restart to bool in sysfs interface (bnc#1012382).\n- scsi: sd: change manage_start_stop to bool in sysfs interface (bnc#1012382).\n- scsi: sg: disable SET_FORCE_LOW_DMA (bnc#1012382).\n- scsi: sr: wait for the medium to become ready (bsc#1048585).\n- sctp: do not allow the v4 socket to bind a v4mapped v6 address (bnc#1012382).\n- sctp: do not free asoc when it is already dead in sctp_sendmsg (bnc#1012382).\n- sctp: Replace use of sockets_allocated with specified macro (bnc#1012382).\n- sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf (bnc#1012382).\n- sctp: use the right sk after waking up from wait_buf sleep (bnc#1012382).\n- selftest/powerpc: Fix false failures for skipped tests (bnc#1012382).\n- selftests/x86: Add test_vsyscall (bnc#1012382).\n- selftests/x86/ldt_get: Add a few additional tests for limits (bnc#1012382).\n- serial: 8250_pci: Add Amazon PCI serial device ID (bnc#1012382).\n- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bnc#1012382).\n- series.conf: move core networking (including netfilter) into sorted section\n- series.conf: whitespace cleanup\n- Set supported_modules_check 1 (bsc#1072163).\n- sfc: do not warn on successful change of MAC (bnc#1012382).\n- sh_eth: fix SH7757 GEther initialization (bnc#1012382).\n- sh_eth: fix TSU resource handling (bnc#1012382).\n- sit: update frag_off info (bnc#1012382).\n- sock: free skb in skb_complete_tx_timestamp on error (bnc#1012382).\n- sparc64/mm: set fields in deferred pages (bnc#1012382).\n- spi_ks8995: fix \u0027BUG: key accdaa28 not in .data!\u0027 (bnc#1012382).\n- spi: sh-msiof: Fix DMA transfer size check (bnc#1012382).\n- spi: xilinx: Detect stall with Unknown commands (bnc#1012382).\n- staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl (bnc#1012382).\n- sunrpc: add auth_unix hash_cred() function (bsc#1012917).\n- sunrpc: add generic_auth hash_cred() function (bsc#1012917).\n- sunrpc: add hash_cred() function to rpc_authops struct (bsc#1012917).\n- sunrpc: add RPCSEC_GSS hash_cred() function (bsc#1012917).\n- sunrpc: Fix rpc_task_begin trace point (bnc#1012382).\n- sunrpc: replace generic auth_cred hash with auth-specific function (bsc#1012917).\n- sunrpc: use supplimental groups in auth hash (bsc#1012917).\n- sunxi-rsb: Include OF based modalias in device uevent (bnc#1012382).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- sysrq : fix Show Regs call trace on ARM (bnc#1012382).\n- target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK (bnc#1012382).\n- target/file: Do not return error for UNMAP if length is zero (bnc#1012382).\n- target: fix ALUA transition timeout handling (bnc#1012382).\n- target:fix condition return in core_pr_dump_initiator_port() (bnc#1012382).\n- target: fix race during implicit transition work flushes (bnc#1012382).\n- target/iscsi: Fix a race condition in iscsit_add_reject_from_cmd() (bnc#1012382).\n- target: Use system workqueue for ALUA transitions (bnc#1012382).\n- tcp: correct memory barrier usage in tcp_check_space() (bnc#1012382).\n- tcp: fix under-evaluated ssthresh in TCP Vegas (bnc#1012382).\n- tcp md5sig: Use skb\u0027s saddr when replying to an incoming segment (bnc#1012382).\n- tcp: __tcp_hdrlen() helper (bnc#1012382).\n- tg3: Fix rx hang on MTU change with 5717/5719 (bnc#1012382).\n- thermal/drivers/step_wise: Fix temperature regulation misbehavior (bnc#1012382).\n- thermal: hisilicon: Handle return value of clk_prepare_enable (bnc#1012382).\n- tipc: fix cleanup at module unload (bnc#1012382).\n- tipc: fix memory leak in tipc_accept_from_sock() (bnc#1012382).\n- tipc: improve link resiliency when rps is activated (bsc#1068038).\n- tracing: Allocate mask_str buffer dynamically (bnc#1012382).\n- tracing: Fix converting enum\u0027s from the map in trace_event_eval_update() (bnc#1012382).\n- tracing: Fix crash when it fails to alloc ring buffer (bnc#1012382).\n- tracing: Fix possible double free on failure of allocating trace buffer (bnc#1012382).\n- tracing: Remove extra zeroing out of the ring buffer page (bnc#1012382).\n- tty fix oops when rmmod 8250 (bnc#1012382).\n- uas: Always apply US_FL_NO_ATA_1X quirk to Seagate devices (bnc#1012382).\n- uas: ignore UAS for Norelsys NS1068(X) chips (bnc#1012382).\n- udf: Avoid overflow when session starts at large offset (bnc#1012382).\n- um: link vmlinux with -no-pie (bnc#1012382).\n- usb: Add device quirk for Logitech HD Pro Webcam C925e (bnc#1012382).\n- usb: add RESET_RESUME for ELSA MicroLink 56K (bnc#1012382).\n- usb: core: Add type-specific length check of BOS descriptors (bnc#1012382).\n- usb: core: prevent malicious bNumInterfaces overflow (bnc#1012382).\n- usb: devio: Prevent integer overflow in proc_do_submiturb() (bnc#1012382).\n- usb: Fix off by one in type-specific length check of BOS SSP capability (git-fixes).\n- usb: fix usbmon BUG trigger (bnc#1012382).\n- usb: gadget: configs: plug memory leak (bnc#1012382).\n- usb: gadget: ffs: Forbid usb_ep_alloc_request from sleeping (bnc#1012382).\n- usb: gadgetfs: Fix a potential memory leak in \u0027dev_config()\u0027 (bnc#1012382).\n- usb: gadget: f_uvc: Sanity check wMaxPacketSize for SuperSpeed (bnc#1012382).\n- usb: gadget: udc: remove pointer dereference after free (bnc#1012382).\n- usb: hub: Cycle HUB power when initialization fails (bnc#1012382).\n- usb: Increase usbfs transfer limit (bnc#1012382).\n- usbip: Fix implicit fallthrough warning (bnc#1012382).\n- usbip: Fix potential format overflow in userspace tools (bnc#1012382).\n- usbip: fix stub_rx: get_pipe() to validate endpoint number (bnc#1012382).\n- usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input (bnc#1012382).\n- usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer (bnc#1012382).\n- usbip: fix usbip bind writing random string after command in match_busid (bnc#1012382).\n- usbip: prevent leaking socket pointer address in messages (bnc#1012382).\n- usbip: prevent vhci_hcd driver from leaking a socket pointer address (bnc#1012382).\n- usbip: remove kernel addresses from usb device and urb debug msgs (bnc#1012382).\n- usbip: stub: stop printing kernel pointer addresses in messages (bnc#1012382).\n- usbip: vhci: stop printing kernel pointer addresses in messages (bnc#1012382).\n- usb: misc: usb3503: make sure reset is low for at least 100us (bnc#1012382).\n- usb: musb: da8xx: fix babble condition handling (bnc#1012382).\n- usb: phy: isp1301: Add OF device ID table (bnc#1012382).\n- usb: phy: isp1301: Fix build warning when CONFIG_OF is disabled (git-fixes).\n- usb: phy: tahvo: fix error handling in tahvo_usb_probe() (bnc#1012382).\n- usb: quirks: Add no-lpm quirk for KY-688 USB 3.1 Type-C Hub (bnc#1012382).\n- usb: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ (bnc#1012382).\n- usb: serial: cp210x: add new device ID ELV ALC 8xxx (bnc#1012382).\n- usb: serial: ftdi_sio: add id for Airbus DS P8GR (bnc#1012382).\n- usb: serial: option: adding support for YUGA CLM920-NC5 (bnc#1012382).\n- usb: serial: option: add Quectel BG96 id (bnc#1012382).\n- usb: serial: option: add support for Telit ME910 PID 0x1101 (bnc#1012382).\n- usb: serial: qcserial: add Sierra Wireless EM7565 (bnc#1012382).\n- usb: uas and storage: Add US_FL_BROKEN_FUA for another JMicron JMS567 ID (bnc#1012382).\n- usb: usbfs: Filter flags passed in from user space (bnc#1012382).\n- usb: usbip: Fix possible deadlocks reported by lockdep (bnc#1012382).\n- usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 (bnc#1012382).\n- usb: xhci: fix panic in xhci_free_virt_devices_depth_first (bnc#1012382).\n- userfaultfd: selftest: vm: allow to build in vm/ directory (bnc#1012382).\n- userfaultfd: shmem: __do_fault requires VM_FAULT_NOPAGE (bnc#1012382).\n- video: fbdev: au1200fb: Release some resources if a memory allocation fails (bnc#1012382).\n- video: fbdev: au1200fb: Return an error code if a memory allocation fails (bnc#1012382).\n- virtio: release virtio index when fail to device_register (bnc#1012382).\n- vmxnet3: repair memory leak (bnc#1012382).\n- vsyscall: Fix permissions for emulate mode with KAISER/PTI (bnc#1012382).\n- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend (bnc#1012382).\n- vti6: Do not report path MTU below IPV6_MIN_MTU (bnc#1012382).\n- vti6: fix device register to report IFLA_INFO_KIND (bnc#1012382).\n- workqueue: trigger WARN if queue_delayed_work() is called with NULL @wq (bnc#1012382).\n- writeback: fix memory leak in wb_queue_work() (bnc#1012382).\n- x.509: fix buffer overflow detection in sprint_oid() (bsc#1075078).\n- x509: fix printing uninitialized stack memory when OID is empty (bsc#1075078).\n- x.509: reject invalid BIT STRING for subjectPublicKey (bnc#1012382).\n- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).\n- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).\n- x86/alternatives: Add missing \u0027\\n\u0027 at end of ALTERNATIVE inline asm (bnc#1012382).\n- x86/alternatives: Fix optimize_nops() checking (bnc#1012382).\n- x86/apic/vector: Fix off by one in error path (bnc#1012382).\n- x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels (bnc#1012382).\n- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).\n- x86/cpu: Factor out application of forced CPU caps (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).\n- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/cpu: Merge bugs.c and bugs_64.c (bnc#1012382).\n- x86/cpu: Rename Merrifield2 to Moorefield (bsc#985025).\n- x86/cpu: Rename \u0027WESTMERE2\u0027 family to \u0027NEHALEM_G\u0027 (bsc#985025).\n- x86/cpu, x86/pti: Do not enable PTI on AMD processors (bnc#1012382).\n- x86/Documentation: Add PTI description (bnc#1012382).\n- x86/efi-bgrt: Replace early_memremap() with memremap() (bnc#1012382).\n- x86/efi: Build our own page table structures (fate#320512).\n- x86/efi: Hoist page table switching code into efi_call_virt() (fate#320512).\n- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt() (bnc#1012382).\n- x86/hpet: Prevent might sleep splat on resume (bnc#1012382).\n- x86/kasan: Clear kasan_zero_page after TLB flush (bnc#1012382).\n- x86/kasan: Write protect kasan zero shadow (bnc#1012382).\n- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bnc#1012382).\n- x86/microcode/intel: Extend BDW late-loading with a revision check (bnc#1012382).\n- x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier (git-fixes).\n- x86/mm: Disable PCID on 32-bit kernels (bnc#1012382).\n- x86/mm/pat: Ensure cpa-\u003epfn only contains page frame numbers (fate#320588).\n- x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bnc#1012382).\n- x86/pti: Document fix wrong index (bnc#1012382).\n- x86/pti/efi: broken conversion from efi to kernel page table (bnc#1012382).\n- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/smpboot: Remove stale TLB flush invocations (bnc#1012382).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n- x86/tlb: Drop the _GPL from the cpu_tlbstate export (bnc#1012382).\n- x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly() (bnc#1012382).\n- xen-netfront: avoid crashing on resume after a failure in talk_to_netback() (bnc#1012382).\n- xen-netfront: Improve error handling during initialization (bnc#1012382).\n- xfrm: Copy policy family in clone_policy (bnc#1012382).\n- xfs: add configurable error support to metadata buffers (bsc#1068569).\n- xfs: add configuration handlers for specific errors (bsc#1068569).\n- xfs: add configuration of error failure speed (bsc#1068569).\n- xfs: add \u0027fail at unmount\u0027 error handling configuration (bsc#1068569).\n- xfs: Add infrastructure needed for error propagation during buffer IO failure (bsc#1068569).\n- xfs: address kabi for xfs buffer retry infrastructure (kabi).\n- xfs: configurable error behavior via sysfs (bsc#1068569).\n- xfs: fix incorrect extent state in xfs_bmap_add_extent_unwritten_real (bnc#1012382).\n- xfs: fix log block underflow during recovery cycle verification (bnc#1012382).\n- xfs: fix up inode32/64 (re)mount handling (bsc#1069160).\n- xfs: introduce metadata IO error class (bsc#1068569).\n- xfs: introduce table-based init for error behaviors (bsc#1068569).\n- xfs: Properly retry failed inode items in case of error during buffer writeback (bsc#1068569).\n- xfs: remove xfs_trans_ail_delete_bulk (bsc#1068569).\n- xhci: Do not add a virt_dev to the devs array before it\u0027s fully allocated (bnc#1012382).\n- xhci: Fix ring leak in failure path of xhci_alloc_virt_device() (bnc#1012382).\n- xhci: plat: Register shutdown for xhci_plat (bnc#1012382).\n- zram: set physical queue limits to avoid array out of bounds accesses (bnc#1012382).\n- x86/microcode/intel: Fix BDW late-loading revision check (bnc#1012382).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-CAASP-ALL-2018-271,SUSE-SLE-DESKTOP-12-SP3-2018-271,SUSE-SLE-HA-12-SP3-2018-271,SUSE-SLE-Live-Patching-12-SP3-2018-271,SUSE-SLE-SDK-12-SP3-2018-271,SUSE-SLE-SERVER-12-SP3-2018-271,SUSE-SLE-WE-12-SP3-2018-271",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0383-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0383-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180383-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0383-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-February/003711.html"
},
{
"category": "self",
"summary": "SUSE Bug 1005778",
"url": "https://bugzilla.suse.com/1005778"
},
{
"category": "self",
"summary": "SUSE Bug 1005780",
"url": "https://bugzilla.suse.com/1005780"
},
{
"category": "self",
"summary": "SUSE Bug 1005781",
"url": "https://bugzilla.suse.com/1005781"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1012917",
"url": "https://bugzilla.suse.com/1012917"
},
{
"category": "self",
"summary": "SUSE Bug 1015342",
"url": "https://bugzilla.suse.com/1015342"
},
{
"category": "self",
"summary": "SUSE Bug 1015343",
"url": "https://bugzilla.suse.com/1015343"
},
{
"category": "self",
"summary": "SUSE Bug 1019784",
"url": "https://bugzilla.suse.com/1019784"
},
{
"category": "self",
"summary": "SUSE Bug 1022476",
"url": "https://bugzilla.suse.com/1022476"
},
{
"category": "self",
"summary": "SUSE Bug 1022595",
"url": "https://bugzilla.suse.com/1022595"
},
{
"category": "self",
"summary": "SUSE Bug 1022912",
"url": "https://bugzilla.suse.com/1022912"
},
{
"category": "self",
"summary": "SUSE Bug 1024296",
"url": "https://bugzilla.suse.com/1024296"
},
{
"category": "self",
"summary": "SUSE Bug 1024376",
"url": "https://bugzilla.suse.com/1024376"
},
{
"category": "self",
"summary": "SUSE Bug 1031395",
"url": "https://bugzilla.suse.com/1031395"
},
{
"category": "self",
"summary": "SUSE Bug 1031492",
"url": "https://bugzilla.suse.com/1031492"
},
{
"category": "self",
"summary": "SUSE Bug 1031717",
"url": "https://bugzilla.suse.com/1031717"
},
{
"category": "self",
"summary": "SUSE Bug 1037838",
"url": "https://bugzilla.suse.com/1037838"
},
{
"category": "self",
"summary": "SUSE Bug 1038078",
"url": "https://bugzilla.suse.com/1038078"
},
{
"category": "self",
"summary": "SUSE Bug 1038085",
"url": "https://bugzilla.suse.com/1038085"
},
{
"category": "self",
"summary": "SUSE Bug 1040182",
"url": "https://bugzilla.suse.com/1040182"
},
{
"category": "self",
"summary": "SUSE Bug 1043652",
"url": "https://bugzilla.suse.com/1043652"
},
{
"category": "self",
"summary": "SUSE Bug 1048325",
"url": "https://bugzilla.suse.com/1048325"
},
{
"category": "self",
"summary": "SUSE Bug 1048585",
"url": "https://bugzilla.suse.com/1048585"
},
{
"category": "self",
"summary": "SUSE Bug 1053472",
"url": "https://bugzilla.suse.com/1053472"
},
{
"category": "self",
"summary": "SUSE Bug 1060279",
"url": "https://bugzilla.suse.com/1060279"
},
{
"category": "self",
"summary": "SUSE Bug 1062129",
"url": "https://bugzilla.suse.com/1062129"
},
{
"category": "self",
"summary": "SUSE Bug 1066163",
"url": "https://bugzilla.suse.com/1066163"
},
{
"category": "self",
"summary": "SUSE Bug 1066223",
"url": "https://bugzilla.suse.com/1066223"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068038",
"url": "https://bugzilla.suse.com/1068038"
},
{
"category": "self",
"summary": "SUSE Bug 1068569",
"url": "https://bugzilla.suse.com/1068569"
},
{
"category": "self",
"summary": "SUSE Bug 1068984",
"url": "https://bugzilla.suse.com/1068984"
},
{
"category": "self",
"summary": "SUSE Bug 1069138",
"url": "https://bugzilla.suse.com/1069138"
},
{
"category": "self",
"summary": "SUSE Bug 1069160",
"url": "https://bugzilla.suse.com/1069160"
},
{
"category": "self",
"summary": "SUSE Bug 1070052",
"url": "https://bugzilla.suse.com/1070052"
},
{
"category": "self",
"summary": "SUSE Bug 1070799",
"url": "https://bugzilla.suse.com/1070799"
},
{
"category": "self",
"summary": "SUSE Bug 1072163",
"url": "https://bugzilla.suse.com/1072163"
},
{
"category": "self",
"summary": "SUSE Bug 1072484",
"url": "https://bugzilla.suse.com/1072484"
},
{
"category": "self",
"summary": "SUSE Bug 1073229",
"url": "https://bugzilla.suse.com/1073229"
},
{
"category": "self",
"summary": "SUSE Bug 1073928",
"url": "https://bugzilla.suse.com/1073928"
},
{
"category": "self",
"summary": "SUSE Bug 1074134",
"url": "https://bugzilla.suse.com/1074134"
},
{
"category": "self",
"summary": "SUSE Bug 1074488",
"url": "https://bugzilla.suse.com/1074488"
},
{
"category": "self",
"summary": "SUSE Bug 1074621",
"url": "https://bugzilla.suse.com/1074621"
},
{
"category": "self",
"summary": "SUSE Bug 1074709",
"url": "https://bugzilla.suse.com/1074709"
},
{
"category": "self",
"summary": "SUSE Bug 1074839",
"url": "https://bugzilla.suse.com/1074839"
},
{
"category": "self",
"summary": "SUSE Bug 1074847",
"url": "https://bugzilla.suse.com/1074847"
},
{
"category": "self",
"summary": "SUSE Bug 1075066",
"url": "https://bugzilla.suse.com/1075066"
},
{
"category": "self",
"summary": "SUSE Bug 1075078",
"url": "https://bugzilla.suse.com/1075078"
},
{
"category": "self",
"summary": "SUSE Bug 1075087",
"url": "https://bugzilla.suse.com/1075087"
},
{
"category": "self",
"summary": "SUSE Bug 1075091",
"url": "https://bugzilla.suse.com/1075091"
},
{
"category": "self",
"summary": "SUSE Bug 1075397",
"url": "https://bugzilla.suse.com/1075397"
},
{
"category": "self",
"summary": "SUSE Bug 1075428",
"url": "https://bugzilla.suse.com/1075428"
},
{
"category": "self",
"summary": "SUSE Bug 1075617",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "self",
"summary": "SUSE Bug 1075621",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "self",
"summary": "SUSE Bug 1075627",
"url": "https://bugzilla.suse.com/1075627"
},
{
"category": "self",
"summary": "SUSE Bug 1075811",
"url": "https://bugzilla.suse.com/1075811"
},
{
"category": "self",
"summary": "SUSE Bug 1075994",
"url": "https://bugzilla.suse.com/1075994"
},
{
"category": "self",
"summary": "SUSE Bug 1076017",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "self",
"summary": "SUSE Bug 1076110",
"url": "https://bugzilla.suse.com/1076110"
},
{
"category": "self",
"summary": "SUSE Bug 1076187",
"url": "https://bugzilla.suse.com/1076187"
},
{
"category": "self",
"summary": "SUSE Bug 1076232",
"url": "https://bugzilla.suse.com/1076232"
},
{
"category": "self",
"summary": "SUSE Bug 1076805",
"url": "https://bugzilla.suse.com/1076805"
},
{
"category": "self",
"summary": "SUSE Bug 1076847",
"url": "https://bugzilla.suse.com/1076847"
},
{
"category": "self",
"summary": "SUSE Bug 1076872",
"url": "https://bugzilla.suse.com/1076872"
},
{
"category": "self",
"summary": "SUSE Bug 1076899",
"url": "https://bugzilla.suse.com/1076899"
},
{
"category": "self",
"summary": "SUSE Bug 1077068",
"url": "https://bugzilla.suse.com/1077068"
},
{
"category": "self",
"summary": "SUSE Bug 1077560",
"url": "https://bugzilla.suse.com/1077560"
},
{
"category": "self",
"summary": "SUSE Bug 1077592",
"url": "https://bugzilla.suse.com/1077592"
},
{
"category": "self",
"summary": "SUSE Bug 1077704",
"url": "https://bugzilla.suse.com/1077704"
},
{
"category": "self",
"summary": "SUSE Bug 1077871",
"url": "https://bugzilla.suse.com/1077871"
},
{
"category": "self",
"summary": "SUSE Bug 1078002",
"url": "https://bugzilla.suse.com/1078002"
},
{
"category": "self",
"summary": "SUSE Bug 1078681",
"url": "https://bugzilla.suse.com/1078681"
},
{
"category": "self",
"summary": "SUSE Bug 963844",
"url": "https://bugzilla.suse.com/963844"
},
{
"category": "self",
"summary": "SUSE Bug 966170",
"url": "https://bugzilla.suse.com/966170"
},
{
"category": "self",
"summary": "SUSE Bug 966172",
"url": "https://bugzilla.suse.com/966172"
},
{
"category": "self",
"summary": "SUSE Bug 973818",
"url": "https://bugzilla.suse.com/973818"
},
{
"category": "self",
"summary": "SUSE Bug 985025",
"url": "https://bugzilla.suse.com/985025"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15129 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17712 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17712/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17862 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17864 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18017 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5332 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5333 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5333/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-02-07T13:35:19Z",
"generator": {
"date": "2018-02-07T13:35:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0383-1",
"initial_release_date": "2018-02-07T13:35:19Z",
"revision_history": [
{
"date": "2018-02-07T13:35:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-4.4.114-94.11.3.aarch64",
"product": {
"name": "kernel-obs-build-4.4.114-94.11.3.aarch64",
"product_id": "kernel-obs-build-4.4.114-94.11.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.114-94.11.3.aarch64",
"product": {
"name": "kernel-default-4.4.114-94.11.3.aarch64",
"product_id": "kernel-default-4.4.114-94.11.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.114-94.11.3.aarch64",
"product": {
"name": "kernel-default-base-4.4.114-94.11.3.aarch64",
"product_id": "kernel-default-base-4.4.114-94.11.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.114-94.11.3.aarch64",
"product": {
"name": "kernel-default-devel-4.4.114-94.11.3.aarch64",
"product_id": "kernel-default-devel-4.4.114-94.11.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.114-94.11.2.aarch64",
"product": {
"name": "kernel-syms-4.4.114-94.11.2.aarch64",
"product_id": "kernel-syms-4.4.114-94.11.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.114-94.11.2.noarch",
"product": {
"name": "kernel-devel-4.4.114-94.11.2.noarch",
"product_id": "kernel-devel-4.4.114-94.11.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.114-94.11.2.noarch",
"product": {
"name": "kernel-macros-4.4.114-94.11.2.noarch",
"product_id": "kernel-macros-4.4.114-94.11.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.114-94.11.2.noarch",
"product": {
"name": "kernel-source-4.4.114-94.11.2.noarch",
"product_id": "kernel-source-4.4.114-94.11.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.114-94.11.4.noarch",
"product": {
"name": "kernel-docs-4.4.114-94.11.4.noarch",
"product_id": "kernel-docs-4.4.114-94.11.4.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.114-94.11.3.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"product_id": "dlm-kmp-default-4.4.114-94.11.3.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"product_id": "gfs2-kmp-default-4.4.114-94.11.3.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.114-94.11.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"product": {
"name": "kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"product_id": "kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.114-94.11.3.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.114-94.11.3.ppc64le",
"product_id": "kernel-obs-build-4.4.114-94.11.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.114-94.11.3.ppc64le",
"product": {
"name": "kernel-default-4.4.114-94.11.3.ppc64le",
"product_id": "kernel-default-4.4.114-94.11.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.114-94.11.3.ppc64le",
"product": {
"name": "kernel-default-base-4.4.114-94.11.3.ppc64le",
"product_id": "kernel-default-base-4.4.114-94.11.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.114-94.11.3.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.114-94.11.3.ppc64le",
"product_id": "kernel-default-devel-4.4.114-94.11.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.114-94.11.2.ppc64le",
"product": {
"name": "kernel-syms-4.4.114-94.11.2.ppc64le",
"product_id": "kernel-syms-4.4.114-94.11.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"product_id": "cluster-md-kmp-default-4.4.114-94.11.3.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.114-94.11.3.s390x",
"product": {
"name": "dlm-kmp-default-4.4.114-94.11.3.s390x",
"product_id": "dlm-kmp-default-4.4.114-94.11.3.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.114-94.11.3.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.114-94.11.3.s390x",
"product_id": "gfs2-kmp-default-4.4.114-94.11.3.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"product_id": "ocfs2-kmp-default-4.4.114-94.11.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.114-94.11.3.s390x",
"product": {
"name": "kernel-obs-build-4.4.114-94.11.3.s390x",
"product_id": "kernel-obs-build-4.4.114-94.11.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.114-94.11.3.s390x",
"product": {
"name": "kernel-default-4.4.114-94.11.3.s390x",
"product_id": "kernel-default-4.4.114-94.11.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.114-94.11.3.s390x",
"product": {
"name": "kernel-default-base-4.4.114-94.11.3.s390x",
"product_id": "kernel-default-base-4.4.114-94.11.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.114-94.11.3.s390x",
"product": {
"name": "kernel-default-devel-4.4.114-94.11.3.s390x",
"product_id": "kernel-default-devel-4.4.114-94.11.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.114-94.11.3.s390x",
"product": {
"name": "kernel-default-man-4.4.114-94.11.3.s390x",
"product_id": "kernel-default-man-4.4.114-94.11.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.114-94.11.2.s390x",
"product": {
"name": "kernel-syms-4.4.114-94.11.2.s390x",
"product_id": "kernel-syms-4.4.114-94.11.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.114-94.11.3.x86_64",
"product": {
"name": "kernel-default-4.4.114-94.11.3.x86_64",
"product_id": "kernel-default-4.4.114-94.11.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.114-94.11.3.x86_64",
"product": {
"name": "kernel-default-devel-4.4.114-94.11.3.x86_64",
"product_id": "kernel-default-devel-4.4.114-94.11.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.114-94.11.3.x86_64",
"product": {
"name": "kernel-default-extra-4.4.114-94.11.3.x86_64",
"product_id": "kernel-default-extra-4.4.114-94.11.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.114-94.11.2.x86_64",
"product": {
"name": "kernel-syms-4.4.114-94.11.2.x86_64",
"product_id": "kernel-syms-4.4.114-94.11.2.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"product_id": "cluster-md-kmp-default-4.4.114-94.11.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.114-94.11.3.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.114-94.11.3.x86_64",
"product_id": "dlm-kmp-default-4.4.114-94.11.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"product_id": "gfs2-kmp-default-4.4.114-94.11.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"product_id": "ocfs2-kmp-default-4.4.114-94.11.3.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"product": {
"name": "kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"product_id": "kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.114-94.11.3.x86_64",
"product": {
"name": "kernel-obs-build-4.4.114-94.11.3.x86_64",
"product_id": "kernel-obs-build-4.4.114-94.11.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.114-94.11.3.x86_64",
"product": {
"name": "kernel-default-base-4.4.114-94.11.3.x86_64",
"product_id": "kernel-default-base-4.4.114-94.11.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64"
},
"product_reference": "kernel-default-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64"
},
"product_reference": "kernel-default-devel-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
},
"product_reference": "kernel-default-extra-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.114-94.11.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch"
},
"product_reference": "kernel-devel-4.4.114-94.11.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.114-94.11.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch"
},
"product_reference": "kernel-macros-4.4.114-94.11.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.114-94.11.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch"
},
"product_reference": "kernel-source-4.4.114-94.11.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-94.11.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64"
},
"product_reference": "kernel-syms-4.4.114-94.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.114-94.11.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.114-94.11.3.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.114-94.11.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.114-94.11.3.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x"
},
"product_reference": "dlm-kmp-default-4.4.114-94.11.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.114-94.11.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.114-94.11.3.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.114-94.11.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.114-94.11.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.114-94.11.3.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le"
},
"product_reference": "kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64"
},
"product_reference": "kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.4.114-94.11.4.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch"
},
"product_reference": "kernel-docs-4.4.114-94.11.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.114-94.11.3.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64"
},
"product_reference": "kernel-obs-build-4.4.114-94.11.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.114-94.11.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le"
},
"product_reference": "kernel-obs-build-4.4.114-94.11.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.114-94.11.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x"
},
"product_reference": "kernel-obs-build-4.4.114-94.11.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64"
},
"product_reference": "kernel-obs-build-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-94.11.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64"
},
"product_reference": "kernel-default-4.4.114-94.11.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-94.11.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le"
},
"product_reference": "kernel-default-4.4.114-94.11.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-94.11.3.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x"
},
"product_reference": "kernel-default-4.4.114-94.11.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64"
},
"product_reference": "kernel-default-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-94.11.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64"
},
"product_reference": "kernel-default-base-4.4.114-94.11.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-94.11.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le"
},
"product_reference": "kernel-default-base-4.4.114-94.11.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-94.11.3.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x"
},
"product_reference": "kernel-default-base-4.4.114-94.11.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64"
},
"product_reference": "kernel-default-base-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-94.11.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64"
},
"product_reference": "kernel-default-devel-4.4.114-94.11.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-94.11.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.114-94.11.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-94.11.3.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x"
},
"product_reference": "kernel-default-devel-4.4.114-94.11.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64"
},
"product_reference": "kernel-default-devel-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.114-94.11.3.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x"
},
"product_reference": "kernel-default-man-4.4.114-94.11.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.114-94.11.2.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch"
},
"product_reference": "kernel-devel-4.4.114-94.11.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.114-94.11.2.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch"
},
"product_reference": "kernel-macros-4.4.114-94.11.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.114-94.11.2.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch"
},
"product_reference": "kernel-source-4.4.114-94.11.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-94.11.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64"
},
"product_reference": "kernel-syms-4.4.114-94.11.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-94.11.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le"
},
"product_reference": "kernel-syms-4.4.114-94.11.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-94.11.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x"
},
"product_reference": "kernel-syms-4.4.114-94.11.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-94.11.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64"
},
"product_reference": "kernel-syms-4.4.114-94.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-94.11.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64"
},
"product_reference": "kernel-default-4.4.114-94.11.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-94.11.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le"
},
"product_reference": "kernel-default-4.4.114-94.11.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-94.11.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x"
},
"product_reference": "kernel-default-4.4.114-94.11.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64"
},
"product_reference": "kernel-default-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-94.11.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64"
},
"product_reference": "kernel-default-base-4.4.114-94.11.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-94.11.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le"
},
"product_reference": "kernel-default-base-4.4.114-94.11.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-94.11.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x"
},
"product_reference": "kernel-default-base-4.4.114-94.11.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64"
},
"product_reference": "kernel-default-base-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-94.11.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64"
},
"product_reference": "kernel-default-devel-4.4.114-94.11.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-94.11.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.114-94.11.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-94.11.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x"
},
"product_reference": "kernel-default-devel-4.4.114-94.11.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64"
},
"product_reference": "kernel-default-devel-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.114-94.11.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x"
},
"product_reference": "kernel-default-man-4.4.114-94.11.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.114-94.11.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch"
},
"product_reference": "kernel-devel-4.4.114-94.11.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.114-94.11.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch"
},
"product_reference": "kernel-macros-4.4.114-94.11.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.114-94.11.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch"
},
"product_reference": "kernel-source-4.4.114-94.11.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-94.11.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64"
},
"product_reference": "kernel-syms-4.4.114-94.11.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-94.11.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le"
},
"product_reference": "kernel-syms-4.4.114-94.11.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-94.11.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x"
},
"product_reference": "kernel-syms-4.4.114-94.11.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.114-94.11.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64"
},
"product_reference": "kernel-syms-4.4.114-94.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.114-94.11.3.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
},
"product_reference": "kernel-default-extra-4.4.114-94.11.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15129"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15129",
"url": "https://www.suse.com/security/cve/CVE-2017-15129"
},
{
"category": "external",
"summary": "SUSE Bug 1074839 for CVE-2017-15129",
"url": "https://bugzilla.suse.com/1074839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-07T13:35:19Z",
"details": "moderate"
}
],
"title": "CVE-2017-15129"
},
{
"cve": "CVE-2017-17712",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17712"
}
],
"notes": [
{
"category": "general",
"text": "The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet-\u003ehdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17712",
"url": "https://www.suse.com/security/cve/CVE-2017-17712"
},
{
"category": "external",
"summary": "SUSE Bug 1073229 for CVE-2017-17712",
"url": "https://bugzilla.suse.com/1073229"
},
{
"category": "external",
"summary": "SUSE Bug 1073230 for CVE-2017-17712",
"url": "https://bugzilla.suse.com/1073230"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-07T13:35:19Z",
"details": "important"
}
],
"title": "CVE-2017-17712"
},
{
"cve": "CVE-2017-17862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17862"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17862",
"url": "https://www.suse.com/security/cve/CVE-2017-17862"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17862",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-07T13:35:19Z",
"details": "moderate"
}
],
"title": "CVE-2017-17862"
},
{
"cve": "CVE-2017-17864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17864"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17864",
"url": "https://www.suse.com/security/cve/CVE-2017-17864"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17864",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-07T13:35:19Z",
"details": "moderate"
}
],
"title": "CVE-2017-17864"
},
{
"cve": "CVE-2017-18017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18017"
}
],
"notes": [
{
"category": "general",
"text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18017",
"url": "https://www.suse.com/security/cve/CVE-2017-18017"
},
{
"category": "external",
"summary": "SUSE Bug 1074488 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1074488"
},
{
"category": "external",
"summary": "SUSE Bug 1080255 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1080255"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 971126 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/971126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-07T13:35:19Z",
"details": "important"
}
],
"title": "CVE-2017-18017"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-07T13:35:19Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-07T13:35:19Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-5332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5332"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5332",
"url": "https://www.suse.com/security/cve/CVE-2018-5332"
},
{
"category": "external",
"summary": "SUSE Bug 1075621 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-07T13:35:19Z",
"details": "low"
}
],
"title": "CVE-2018-5332"
},
{
"cve": "CVE-2018-5333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5333"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5333",
"url": "https://www.suse.com/security/cve/CVE-2018-5333"
},
{
"category": "external",
"summary": "SUSE Bug 1075617 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-1-4.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.114-94.11.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.114-94.11.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.114-94.11.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.114-94.11.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.114-94.11.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-07T13:35:19Z",
"details": "low"
}
],
"title": "CVE-2018-5333"
}
]
}
SUSE-SU-2018:0986-1
Vulnerability from csaf_suse - Published: 2018-04-19 09:27 - Updated: 2018-04-19 09:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP3 Realtime kernel was updated to 4.4.120 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).\n\n The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the v4l2 video driver. (bnc#1072865).\n- CVE-2017-15129: A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel. The function get_net_ns_by_id() in net/core/net_namespace.c did not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely (bnc#1074839).\n- CVE-2017-15951: The KEYS subsystem in the Linux kernel did not correctly synchronize the actions of updating versus finding a key in the \u0027negative\u0027 state to avoid a race condition, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls (bnc#1065615).\n- CVE-2017-16912: The \u0027get_pipe()\u0027 function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).\n- CVE-2017-16913: The \u0027stub_recv_cmd_submit()\u0027 function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).\n- CVE-2017-17712: The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel has a race condition in inet-\u003ehdrincl that leads to uninitialized stack pointer usage; this allowed a local user to execute code and gain privileges (bnc#1073229 1073230).\n- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).\n- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a \u0027pointer leak (bnc#1073928).\n- CVE-2017-17975: Use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c allowed attackers to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfree of the usbtv data structure occurs during a usbtv_video_free call, but the usbtv_video_fail label\u0027s code attempts to both access and free this data structure (bnc#1074426).\n- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).\n- CVE-2017-18174: In the Linux kernel the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free (bnc#1080533).\n- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).\n- CVE-2018-1000004: In the Linux kernel a race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bnc#1076017).\n- CVE-2018-1000026: Linux kernel version contained a insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via an attacker that must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM. (bnc#1079384).\n- CVE-2018-5332: In the Linux kernel through 4.14.13, the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).\n- CVE-2018-5333: In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).\n- CVE-2018-8087: Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c allowed local users to cause a denial of service (memory consumption) by triggering an out-of-array error case (bnc#1085053).\n- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).\n\nThe following non-security bugs were fixed:\n\n- 509: fix printing uninitialized stack memory when OID is empty (bsc#1075078).\n- 8021q: fix a memory leak for VLAN 0 device (bnc#1012382).\n- acpi / bus: Leave modalias empty for devices which are not present (bnc#1012382).\n- acpi, nfit: fix health event notification (FATE#321135, FATE#321217, FATE#321256, FATE#321391, FATE#321393).\n- acpi, nfit: fix register dimm error handling (FATE#321135, FATE#321217, FATE#321256, FATE#321391, FATE#321393).\n- acpi: sbshc: remove raw pointer from printk() message (bnc#1012382).\n- acpi / scan: Prefer devices without _HID/_CID for _ADR matching (bnc#1012382).\n- Add delay-init quirk for Corsair K70 RGB keyboards (bnc#1012382).\n- add ip6_make_flowinfo helper (bsc#1042286).\n- af_key: fix buffer overread in parse_exthdrs() (bnc#1012382).\n- af_key: fix buffer overread in verify_address_len() (bnc#1012382).\n- afs: Adjust mode bits processing (bnc#1012382).\n- afs: Connect up the CB.ProbeUuid (bnc#1012382).\n- afs: Fix afs_kill_pages() (bnc#1012382).\n- afs: Fix missing put_page() (bnc#1012382).\n- afs: Fix page leak in afs_write_begin() (bnc#1012382).\n- afs: Fix the maths in afs_fs_store_data() (bnc#1012382).\n- afs: Flush outstanding writes when an fd is closed (bnc#1012382).\n- afs: Migrate vlocation fields to 64-bit (bnc#1012382).\n- afs: Populate and use client modification time (bnc#1012382).\n- afs: Populate group ID from vnode status (bnc#1012382).\n- afs: Prevent callback expiry timer overflow (bnc#1012382).\n- ahci: Add Intel Cannon Lake PCH-H PCI ID (bnc#1012382).\n- ahci: Add PCI ids for Intel Bay Trail, Cherry Trail and Apollo Lake AHCI (bnc#1012382).\n- ahci: Annotate PCI ids for mobile Intel chipsets as such (bnc#1012382).\n- alpha: fix build failures (bnc#1012382).\n- alpha: fix crash if pthread_create races with signal delivery (bnc#1012382).\n- alpha: fix reboot on Avanti platform (bnc#1012382).\n- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1031717).\n- alsa: aloop: Fix racy hw constraints adjustment (bsc#1031717).\n- alsa: aloop: Release cable upon open error path (bsc#1031717).\n- alsa: hda - Apply headphone noise quirk for another Dell XPS 13 variant (bsc#1031717).\n- alsa: hda - Apply the existing quirk to iMac 14,1 (bsc#1031717).\n- alsa: hda/ca0132 - fix possible NULL pointer use (bnc#1012382).\n- alsa: hda - Fix headset mic detection problem for two Dell machines (bnc#1012382).\n- alsa: hda/realtek - Add headset mode support for Dell laptop (bsc#1031717).\n- alsa: hda/realtek: PCI quirk for Fujitsu U7x7 (bnc#1012382).\n- alsa: hda - Reduce the suspend time consumption for ALC256 (bsc#1031717).\n- alsa: hda - Use IS_REACHABLE() for dependency on input (bsc#1031717).\n- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1031717).\n- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1031717).\n- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1031717).\n- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1031717).\n- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1031717).\n- alsa: seq: Fix racy pool initializations (bnc#1012382).\n- alsa: seq: Fix regression by incorrect ioctl_mutex usages (bnc#1012382).\n- alsa: usb-audio: add implicit fb quirk for Behringer UFX1204 (bnc#1012382).\n- alsa: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute (bnc#1012382).\n- amd-xgbe: Fix unused suspend handlers build warning (bnc#1012382).\n- arc: uaccess: dont use \u0027l\u0027 gcc inline asm constraint modifier (bnc#1012382).\n- arm64: add PTE_ADDR_MASK (bsc#1068032).\n- arm64: Add skeleton to harden the branch predictor against aliasing attacks (bsc#1068032).\n- arm64: Add trace_hardirqs_off annotation in ret_to_user (bsc#1068032).\n- arm64: barrier: Add CSDB macros to control data-value prediction (bsc#1068032).\n- arm64: Branch predictor hardening for Cavium ThunderX2 (bsc#1068032).\n- arm64/cpufeature: do not use mutex in bringup path (bsc#1068032).\n- arm64: cpufeature: Pass capability structure to -\u003eenable callback (bsc#1068032).\n- arm64: cputype: Add MIDR values for Cavium ThunderX2 CPUs (bsc#1068032).\n- arm64: cputype: Add missing MIDR values for Cortex-A72 and Cortex-A75 (bsc#1068032).\n- arm64: debug: remove unused local_dbg_{enable, disable} macros (bsc#1068032).\n- arm64: define BUG() instruction without CONFIG_BUG (bnc#1012382).\n- arm64: Define cputype macros for Falkor CPU (bsc#1068032).\n- arm64: Disable TTBR0_EL1 during normal kernel execution (bsc#1068032).\n- arm64: Disable unhandled signal log messages by default (bnc#1012382).\n- arm64: Do not force KPTI for CPUs that are not vulnerable (bsc#1076187).\n- arm64: do not pull uaccess.h into *.S (bsc#1068032).\n- arm64: dts: add #cooling-cells to CPU nodes (bnc#1012382).\n- arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: entry: Add exception trampoline page for exceptions from EL0 (bsc#1068032).\n- arm64: entry: Add fake CPU feature for unmapping the kernel at EL0 (bsc#1068032).\n- arm64: entry: Apply BP hardening for high-priority synchronous exceptions (bsc#1068032).\n- arm64: entry: Apply BP hardening for suspicious interrupts from EL0 (bsc#1068032).\n- arm64: entry: Ensure branch through syscall table is bounded under speculation (bsc#1068032).\n- arm64: entry: Explicitly pass exception level to kernel_ventry macro (bsc#1068032).\n- arm64: entry: Hook up entry trampoline to exception vectors (bsc#1068032).\n- arm64: entry: remove pointless SPSR mode check (bsc#1068032).\n- arm64: entry: Reword comment about post_ttbr_update_workaround (bsc#1068032).\n- arm64: entry.S convert el0_sync (bsc#1068032).\n- arm64: entry.S: convert el1_sync (bsc#1068032).\n- arm64: entry.S: convert elX_irq (bsc#1068032).\n- arm64: entry.S: move SError handling into a C function for future expansion (bsc#1068032).\n- arm64: entry.S: Remove disable_dbg (bsc#1068032).\n- arm64: erratum: Work around Falkor erratum #E1003 in trampoline code (bsc#1068032).\n- arm64: explicitly mask all exceptions (bsc#1068032).\n- arm64: factor out entry stack manipulation (bsc#1068032).\n- arm64: factor out PAGE_* and CONT_* definitions (bsc#1068032).\n- arm64: Factor out PAN enabling/disabling into separate uaccess_* macros (bsc#1068032).\n- arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm macro (bsc#1068032).\n- arm64: factor work_pending state machine to C (bsc#1068032).\n- arm64: Force KPTI to be disabled on Cavium ThunderX (bsc#1068032).\n- arm64: fpsimd: Prevent registers leaking from dead tasks (bnc#1012382).\n- arm64: futex: Mask __user pointers prior to dereference (bsc#1068032).\n- arm64: Handle el1 synchronous instruction aborts cleanly (bsc#1068032).\n- arm64: Handle faults caused by inadvertent user access with PAN enabled (bsc#1068032).\n- arm64: head.S: get rid of x25 and x26 with \u0027global\u0027 scope (bsc#1068032).\n- arm64: idmap: Use \u0027awx\u0027 flags for .idmap.text .pushsection directives (bsc#1068032).\n- arm64: Implement array_index_mask_nospec() (bsc#1068032).\n- arm64: Implement branch predictor hardening for affected Cortex-A CPUs (bsc#1068032).\n- arm64: Implement branch predictor hardening for Falkor (bsc#1068032).\n- arm64: Initialise high_memory global variable earlier (bnc#1012382).\n- arm64: introduce an order for exceptions (bsc#1068032).\n- arm64: introduce mov_q macro to move a constant into a 64-bit register (bsc#1068032).\n- arm64: Introduce uaccess_{disable,enable} functionality based on TTBR0_EL1 (bsc#1068032).\n- arm64: kaslr: Put kernel vectors address in separate data page (bsc#1068032).\n- arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 (bsc#1068032).\n- arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry (bsc#1068032).\n- arm64: Kconfig: select COMPAT_BINFMT_ELF only when BINFMT_ELF is set (bnc#1012382).\n- arm64: kill ESR_LNX_EXEC (bsc#1068032).\n- arm64: kpti: Add -\u003eenable callback to remap swapper using nG mappings (bsc#1068032).\n- arm64: kpti: Fix the interaction between ASID switching and software PAN (bsc#1068032).\n- arm64: kpti: Make use of nG dependent on arm64_kernel_unmapped_at_el0() (bsc#1068032).\n- arm64: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bsc#1076232).\n- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).\n- arm64: kvm: Make PSCI_VERSION a fast path (bsc#1068032).\n- arm64: kvm: Use per-CPU vector when BP hardening is enabled (bsc#1068032).\n- arm64: Make USER_DS an inclusive limit (bsc#1068032).\n- arm64: Mask all exceptions during kernel_exit (bsc#1068032).\n- arm64: mm: Add arm64_kernel_unmapped_at_el0 helper (bsc#1068032).\n- arm64: mm: Allocate ASIDs in pairs (bsc#1068032).\n- arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: mm: hardcode rodata=true (bsc#1068032).\n- arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR (bsc#1068032).\n- arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI (bsc#1068032).\n- arm64: mm: Map entry trampoline into trampoline and kernel page tables (bsc#1068032).\n- arm64: mm: Move ASID from TTBR0 to TTBR1 (bsc#1068032).\n- arm64: mm: Permit transitioning from Global to Non-Global without BBM (bsc#1068032).\n- arm64: mm: Remove pre_ttbr0_update_workaround for Falkor erratum #E1003 (bsc#1068032).\n- arm64: mm: Rename post_ttbr0_update_workaround (bsc#1068032).\n- arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: mm: Use non-global mappings for kernel space (bsc#1068032).\n- arm64: Move BP hardening to check_and_switch_context (bsc#1068032).\n- arm64: Move post_ttbr_update_workaround to C code (bsc#1068032).\n- arm64: move TASK_* definitions to \u003casm/processor.h\u003e (bsc#1068032).\n- arm64: Move the async/fiq helpers to explicitly set process context flags (bsc#1068032).\n- arm64: Run enable method for errata work arounds on late CPUs (bsc#1085045).\n- arm64: SW PAN: Point saved ttbr0 at the zero page when switching to init_mm (bsc#1068032).\n- arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb (bsc#1068032).\n- arm64: swp emulation: bound LL/SC retries before rescheduling (bsc#1068032).\n- arm64: sysreg: Fix unprotected macro argmuent in write_sysreg (bsc#1068032).\n- arm64: Take into account ID_AA64PFR0_EL1.CSV3 (bsc#1068032).\n- arm64: thunderx2: remove branch predictor hardening References: bsc#1076232 This causes undefined instruction abort on the smc call from guest kernel. Disable until kvm is fixed.\n- arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks (bsc#1068032).\n- arm64: Turn on KPTI only on CPUs that need it (bsc#1076187).\n- arm64: uaccess: Do not bother eliding access_ok checks in __{get, put}_user (bsc#1068032).\n- arm64: uaccess: Mask __user pointers for __arch_{clear, copy_*}_user (bsc#1068032).\n- arm64: uaccess: Prevent speculative use of the current addr_limit (bsc#1068032).\n- arm64: use alternative auto-nop (bsc#1068032).\n- arm64: Use pointer masking to limit uaccess speculation (bsc#1068032).\n- arm64: use RET instruction for exiting the trampoline (bsc#1068032).\n- arm64: xen: Enable user access before a privcmd hvc call (bsc#1068032).\n- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bnc#1012382).\n- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bnc#1012382).\n- arm/arm64: kvm: Make default HYP mappings non-excutable (bsc#1068032).\n- arm: avoid faulting on qemu (bnc#1012382).\n- arm: BUG if jumping to usermode address in kernel mode (bnc#1012382).\n- arm-ccn: perf: Prevent module unload while PMU is in use (bnc#1012382).\n- arm: dma-mapping: disallow dma_get_sgtable() for non-kernel managed memory (bnc#1012382).\n- arm: dts: am335x-evmsk: adjust mmc2 param to allow suspend (bnc#1012382).\n- arm: dts: am4372: Correct the interrupts_properties of McASP (bnc#1012382).\n- arm: dts: Fix omap4 hang with GPS connected to USB by using wakeupgen (bnc#1012382).\n- arm: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7 (bnc#1012382).\n- arm: dts: ls1021a: fix incorrect clock references (bnc#1012382).\n- arm: dts: s5pv210: add interrupt-parent for ohci (bnc#1012382).\n- arm: dts: STi: Add gpio polarity for \u0027hdmi,hpd-gpio\u0027 property (bnc#1012382).\n- arm: dts: ti: fix PCI bus dtc warnings (bnc#1012382).\n- arm: kprobes: Align stack to 8-bytes in test code (bnc#1012382).\n- arm: kprobes: Fix the return address of multiple kretprobes (bnc#1012382).\n- arm: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bnc#1012382).\n- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).\n- arm: OMAP1: DMA: Correct the number of logical channels (bnc#1012382).\n- arm: OMAP2+: Fix device node reference counts (bnc#1012382).\n- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bnc#1012382).\n- arm: OMAP2+: gpmc-onenand: propagate error on initialization failure (bnc#1012382).\n- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (git-fixes).\n- arm: OMAP2+: Release device node after it is no longer needed (bnc#1012382).\n- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bnc#1012382).\n- arm: spear13xx: Fix dmas cells (bnc#1012382).\n- arm: spear13xx: Fix spics gpio controller\u0027s warning (bnc#1012382).\n- arm: spear600: Add missing interrupt-parent of rtc (bnc#1012382).\n- arm: tegra: select USB_ULPI from EHCI rather than platform (bnc#1012382).\n- asm-prototypes: Clear any CPP defines before declaring the functions (git-fixes).\n- asn.1: check for error from ASN1_OP_END__ACT actions (bnc#1012382).\n- asn.1: fix out-of-bounds read when parsing indefinite length item (bnc#1012382).\n- ASoC: au1x: Fix timeout tests in au1xac97c_ac97_read() (bsc#1031717).\n- ASoC: Intel: Kconfig: fix build when ACPI is not enabled (bnc#1012382).\n- ASoC: Intel: sst: Fix the return value of \u0027sst_send_byte_stream_mrfld()\u0027 (bsc#1031717).\n- ASoC: mediatek: add i2c dependency (bnc#1012382).\n- ASoC: nuc900: Fix a loop timeout test (bsc#1031717).\n- asoc: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).\n- ASoC: rockchip: disable clock on error (bnc#1012382).\n- asoc: rsnd: avoid duplicate free_irq() (bnc#1012382).\n- asoc: rsnd: do not call free_irq() on Parent SSI (bnc#1012382).\n- asoc: simple-card: Fix misleading error message (bnc#1012382).\n- ASoC: ux500: add MODULE_LICENSE tag (bnc#1012382).\n- ata: ahci_xgene: free structure returned by acpi_get_object_info() (bsc#1082979).\n- ata: pata_artop: remove redundant initialization of pio (bsc#1082979).\n- ata: sata_dwc_460ex: remove incorrect locking (bsc#1082979).\n- ath9k: fix tx99 potential info leak (bnc#1012382).\n- atm: horizon: Fix irq release error (bnc#1012382).\n- audit: ensure that \u0027audit=1\u0027 actually enables audit for PID 1 (bnc#1012382).\n- axonram: Fix gendisk handling (bnc#1012382).\n- b2c2: flexcop: avoid unused function warnings (bnc#1012382).\n- backlight: pwm_bl: Fix overflow condition (bnc#1012382).\n- bcache: add a comment in journal bucket reading (bsc#1076110).\n- bcache: Avoid nested function definition (bsc#1076110).\n- bcache: bch_allocator_thread() is not freezable (bsc#1076110).\n- bcache: bch_writeback_thread() is not freezable (bsc#1076110).\n- bcache: check return value of register_shrinker (bsc#1076110).\n- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).\n- bcache: documentation updates and corrections (bsc#1076110).\n- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).\n- bcache: do not write back data if reading it failed (bsc#1076110).\n- bcache: explicitly destroy mutex while exiting (bnc#1012382).\n- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).\n- bcache: fix sequential large write IO bypass (bsc#1076110).\n- bcache: fix wrong cache_misses statistics (bnc#1012382).\n- bcache: gc does not work when triggering by manual command (bsc#1076110, bsc#1038078).\n- bcache: implement PI controller for writeback rate (bsc#1076110).\n- bcache: increase the number of open buckets (bsc#1076110).\n- bcache: only permit to recovery read error when cache device is clean (bnc#1012382 bsc#1043652).\n- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110, bsc#1019784).\n- bcache: rearrange writeback main thread ratelimit (bsc#1076110).\n- bcache: recover data from backing when data is clean (bnc#1012382 bsc#1043652).\n- bcache: Remove redundant set_capacity (bsc#1076110).\n- bcache: remove unused parameter (bsc#1076110).\n- bcache: rewrite multiple partitions support (bsc#1076110, bsc#1038085).\n- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).\n- bcache: silence static checker warning (bsc#1076110).\n- bcache: smooth writeback rate control (bsc#1076110).\n- bcache.txt: standardize document format (bsc#1076110).\n- bcache: update bio-\u003ebi_opf bypass/writeback REQ_ flag hints (bsc#1076110).\n- bcache: update bucket_in_use in real time (bsc#1076110).\n- bcache: Update continue_at() documentation (bsc#1076110).\n- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).\n- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).\n- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).\n- bcache: writeback rate shouldn\u0027t artifically clamp (bsc#1076110).\n- be2net: restore properly promisc mode after queues reconfiguration (bsc#963844 FATE#320192).\n- binder: add missing binder_unlock() (bnc#1012382).\n- binder: check for binder_thread allocation failure in binder_poll() (bnc#1012382).\n- binfmt_elf: compat: avoid unused function warning (bnc#1012382).\n- blacklist acb1feab320e powerpc/64: Do not trace irqs-off at interrupt return to soft-disabled context\n- blacklist.conf: Blacklist 9d25e3cc83d731ae4eeb017fd07562fde3f80bef Exynos IOMMU is not enabled in any config.\n- blacklist.conf: blacklist d207af2eab3f8668b95ad02b21930481c42806fd\n- blacklist.conf: blacklist too intrusive patches (bsc#1082979)\n- blacklist.conf: commit fd5f7cde1b85d4c8e09 (\u0027printk: Never set console_may_schedule in console_trylock()\u0027)\n- blacklist.conf: da391d640c528bc5bb227ea5b39c882b75ac3167 Comment-only fix\n- blk-mq: add warning to __blk_mq_run_hw_queue() for ints disabled (bsc#1084772).\n- blk-mq: stop \u0027delayed_run_work\u0027 in blk_mq_stop_hw_queue() (bsc#1084967).\n- blk-mq: turn WARN_ON in __blk_mq_run_hw_queue into printk (bsc#1084772).\n- blktrace: fix unlocked registration of tracepoints (bnc#1012382).\n- block: fix an error code in add_partition() (bsc#1082979).\n- block: Fix __bio_integrity_endio() documentation (bsc#1082979).\n- block: wake up all tasks blocked in get_request() (bnc#1012382).\n- bluetooth: btsdio: Do not bind to non-removable BCM43341 (bnc#1012382).\n- bluetooth: btusb: driver to enable the usb-wakeup feature (bnc#1012382).\n- bluetooth: btusb: Restore QCA Rome suspend/resume fix with a \u0027rewritten\u0027 version (bnc#1012382).\n- bnx2x: do not rollback VF MAC/VLAN filters we did not configure (bnc#1012382).\n- bnx2x: fix possible overrun of VFPF multicast addresses array (bnc#1012382).\n- bnx2x: Improve reliability in case of nested PCI errors (bnc#1012382).\n- bnx2x: prevent crash when accessing PTP with interface down (bnc#1012382).\n- bnxt_en: Fix the \u0027Invalid VF\u0027 id check in bnxt_vf_ndo_prep routine (bnc#1012382).\n- bpf: arsh is not supported in 32 bit alu thus reject it (bnc#1012382).\n- bpf: avoid false sharing of map refcount with max_entries (bnc#1012382).\n- bpf: fix 32-bit divide by zero (bnc#1012382).\n- bpf: fix bpf_tail_call() x64 JIT (bnc#1012382).\n- bpf: fix divides by zero (bnc#1012382).\n- bpf: introduce BPF_JIT_ALWAYS_ON config (bnc#1012382).\n- bpf: reject stores into ctx via st and xadd (bnc#1012382).\n- bridge: implement missing ndo_uninit() (bsc#1042286).\n- bridge: move bridge multicast cleanup to ndo_uninit (bsc#1042286).\n- btrfs: add missing memset while reading compressed inline extents (bnc#1012382).\n- btrfs: copy fsid to super_block s_uuid (bsc#1080774).\n- btrfs: fix crash due to not cleaning up tree log block\u0027s dirty bits (bnc#1012382).\n- btrfs: fix deadlock in run_delalloc_nocow (bnc#1012382).\n- btrfs: fix deadlock when writing out space cache (bnc#1012382).\n- btrfs: Fix possible off-by-one in btrfs_search_path_in_tree (bnc#1012382).\n- btrfs: Fix quota reservation leak on preallocated files (bsc#1079989).\n- btrfs: fix unexpected -EEXIST when creating new inode (bnc#1012382).\n- btrfs: Handle btrfs_set_extent_delalloc failure in fixup worker (bnc#1012382).\n- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).\n- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).\n- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: flex_can: Correct the checking for frame length in flexcan_start_xmit() (bnc#1012382).\n- can: gs_usb: fix return value of the \u0027set_bittiming\u0027 callback (bnc#1012382).\n- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bnc#1012382).\n- can: kvaser_usb: free buf in error paths (bnc#1012382).\n- can: kvaser_usb: ratelimit errors if incomplete messages are received (bnc#1012382).\n- can: peak: fix potential bug in packet fragmentation (bnc#1012382).\n- can: ti_hecc: Fix napi poll return value for repoll (bnc#1012382).\n- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- cdc-acm: apply quirk for card reader (bsc#1060279).\n- cdrom: factor out common open_for_* code (bsc#1048585).\n- cdrom: turn off autoclose by default (bsc#1080813).\n- cdrom: wait for tray to close (bsc#1048585).\n- ceph: fix incorrect snaprealm when adding caps (bsc#1081735).\n- ceph: fix un-balanced fsc-\u003ewriteback_count update (bsc#1081735).\n- ceph: more accurate statfs (bsc#1077068).\n- cfg80211: check dev_set_name() return value (bnc#1012382).\n- cfg80211: fix cfg80211_beacon_dup (bnc#1012382).\n- cifs: dump IPC tcon in debug proc file (bsc#1071306).\n- cifs: Fix autonegotiate security settings mismatch (bnc#1012382).\n- cifs: Fix missing put_xid in cifs_file_strict_mmap (bnc#1012382).\n- cifs: make IPC a regular tcon (bsc#1071306).\n- cifs: use tcon_ipc instead of use_ipc parameter of SMB2_ioctl (bsc#1071306).\n- cifs: zero sensitive data when freeing (bnc#1012382).\n- clk: fix a panic error caused by accessing NULL pointer (bnc#1012382).\n- clk: imx6: refine hdmi_isfr\u0027s parent to make HDMI work on i.MX6 SoCs w/o VPU (bnc#1012382).\n- clk: mediatek: add the option for determining PLL source clock (bnc#1012382).\n- clk: tegra: Fix cclk_lp divisor register (bnc#1012382).\n- config: arm64: enable HARDEN_BRANCH_PREDICTOR\n- config: arm64: enable UNMAP_KERNEL_AT_EL0\n- console/dummy: leave .con_font_get set to NULL (bnc#1012382).\n- cpufreq: Add Loongson machine dependencies (bnc#1012382).\n- cpuidle: fix broadcast control when broadcast can not be entered (bnc#1012382).\n- cpuidle: powernv: Pass correct drv-\u003ecpumask for registration (bnc#1012382).\n- cpuidle: Validate cpu_dev in cpuidle_add_sysfs() (bnc#1012382).\n- crypto: aesni - handle zero length dst buffer (bnc#1012382).\n- crypto: af_alg - whitelist mask and type (bnc#1012382).\n- crypto: algapi - fix NULL dereference in crypto_remove_spawns() (bnc#1012382).\n- crypto: caam - fix endless loop when DECO acquire fails (bnc#1012382).\n- crypto: chacha20poly1305 - validate the digest size (bnc#1012382).\n- crypto: chelsio - select CRYPTO_GF128MUL (bsc#1048325).\n- crypto: cryptd - pass through absence of -\u003esetkey() (bnc#1012382).\n- crypto: crypto4xx - increase context and scatter ring buffer elements (bnc#1012382).\n- crypto: deadlock between crypto_alg_sem/rtnl_mutex/genl_mutex (bnc#1012382).\n- crypto: hash - introduce crypto_hash_alg_has_setkey() (bnc#1012382).\n- crypto: mcryptd - protect the per-CPU queue with a lock (bnc#1012382).\n- crypto: n2 - cure use after free (bnc#1012382).\n- crypto: pcrypt - fix freeing pcrypt instances (bnc#1012382).\n- crypto: poly1305 - remove -\u003esetkey() method (bnc#1012382).\n- crypto: s5p-sss - Fix completing crypto request in IRQ handler (bnc#1012382).\n- crypto: s5p-sss - Fix kernel Oops in AES-ECB mode (bnc#1012382).\n- crypto: tcrypt - fix buffer lengths in test_aead_speed() (bnc#1012382).\n- crypto: tcrypt - fix S/G table for test_aead_speed() (bnc#1012382).\n- crypto: x86/twofish-3way - Fix %rbp usage (bnc#1012382).\n- cw1200: fix bogus maybe-uninitialized warning (bnc#1012382).\n- cxl: Check if vphb exists before iterating over AFU devices (bsc#1066223).\n- dax: Pass detailed error code from __dax_fault() (bsc#1072484).\n- dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state (bnc#1012382).\n- dccp: limit sk_filter trim to payload (bsc#1042286).\n- Deadly BUG_ON() had not been removed after all, merely relocated. (bnc#1083056)\n- delay: add poll_event_interruptible (bsc#1048585).\n- dell-wmi, dell-laptop: depends DMI (bnc#1012382).\n- direct-io: Fix sleep in atomic due to sync AIO (bsc#1084888).\n- dlm: fix double list_del() (bsc#1082795).\n- dlm: fix malfunction of dlm_tool caused by debugfs changes (bsc#1077704).\n- dlm: fix NULL pointer dereference in send_to_sock() (bsc#1082795).\n- dmaengine: at_hdmac: fix potential NULL pointer dereference in atc_prep_dma_interleaved (bnc#1012382).\n- dmaengine: dmatest: fix container_of member in dmatest_callback (bnc#1012382).\n- dmaengine: dmatest: move callback wait queue to thread context (bnc#1012382).\n- dmaengine: Fix array index out of bounds warning in __get_unmap_pool() (bnc#1012382).\n- dmaengine: ioat: Fix error handling path (bnc#1012382).\n- dmaengine: jz4740: disable/unprepare clk if probe fails (bnc#1012382).\n- dmaengine: pl330: fix double lock (bnc#1012382).\n- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bnc#1012382).\n- dmaengine: zx: fix build warning (bnc#1012382).\n- dm btree: fix serious bug in btree_split_beneath() (bnc#1012382).\n- dm bufio: fix shrinker scans when (nr_to_scan \u003c retain_target) (bnc#1012382).\n- dm: correctly handle chained bios in dec_pending() (bnc#1012382).\n- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bnc#1012382).\n- dn_getsockoptdecnet: move nf_{get/set}sockopt outside sock lock (bnc#1012382).\n- do not put symlink bodies in pagecache into highmem (bnc#1012382).\n- dpt_i2o: fix build warning (bnc#1012382).\n- driver-core: use \u0027dev\u0027 argument in dev_dbg_ratelimited stub (bnc#1012382).\n- drivers/firmware: Expose psci_get_version through psci_ops structure (bsc#1068032).\n- drivers: hv: balloon: Correctly update onlined page count (fate#315887, bsc#1082632).\n- drivers: hv: balloon: Initialize last_post_time on startup (fate#315887, bsc#1082632).\n- drivers: hv: balloon: Show the max dynamic memory assigned (fate#315887, bsc#1082632).\n- drivers: hv: kvp: Use MAX_ADAPTER_ID_SIZE for translating adapter id (fate#315887, bsc#1082632).\n- drivers: hv: Turn off write permission on the hypercall page (fate#315887, bsc#1082632).\n- drivers: hv: vmbus: Fix rescind handling (fate#315887, bsc#1082632).\n- drivers: hv: vmbus: Fix rescind handling issues (fate#315887, bsc#1082632).\n- drivers/net: fix eisa_driver probe section mismatch (bnc#1012382).\n- drm/amd/amdgpu: fix console deadlock if late init failed (bnc#1012382).\n- drm/amdgpu: Avoid leaking PM domain on driver unbind (v2) (bnc#1012382).\n- drm/amdgpu: Fix SDMA load/unload sequence on HWS disabled mode (bnc#1012382).\n- drm/amdkfd: Fix SDMA oversubsription handling (bnc#1012382).\n- drm/amdkfd: Fix SDMA ring buffer size calculation (bnc#1012382).\n- drm/armada: fix leak of crtc structure (bnc#1012382).\n- drm/edid: Add 6 bpc quirk for CPT panel in Asus UX303LA (bnc#1012382).\n- drm: extra printk() wrapper macros (bnc#1012382).\n- drm/exynos/decon5433: set STANDALONE_UPDATE_F on output enablement (bnc#1012382).\n- drm/exynos: gem: Drop NONCONTIG flag for buffers allocated without IOMMU (bnc#1012382).\n- drm/gma500: remove helper function (bnc#1012382).\n- drm/gma500: Sanity-check pipe index (bnc#1012382).\n- drm/nouveau: hide gcc-4.9 -Wmaybe-uninitialized (bnc#1012382).\n- drm/nouveau/pci: do a msi rearm on init (bnc#1012382).\n- drm/omap: fix dmabuf mmap for dma_alloc\u0027ed buffers (bnc#1012382).\n- drm/radeon: adjust tested variable (bnc#1012382).\n- drm/radeon: reinstate oland workaround for sclk (bnc#1012382).\n- drm/radeon/si: add dpm quirk for Oland (bnc#1012382).\n- drm: rcar-du: Fix race condition when disabling planes at CRTC stop (bnc#1012382).\n- drm: rcar-du: Use the VBK interrupt for vblank events (bnc#1012382).\n- drm: Require __GFP_NOFAIL for the legacy drm_modeset_lock_all (bnc#1012382).\n- drm/ttm: check the return value of kzalloc (bnc#1012382).\n- drm/vmwgfx: Potential off by one in vmw_view_add() (bnc#1012382).\n- drm/vmwgfx: use *_32_bits() macros (bnc#1012382).\n- dynamic-debug-howto: fix optional/omitted ending line number to be LARGE instead of 0 (bnc#1012382).\n- e1000: fix disabling already-disabled warning (bnc#1012382).\n- edac, i5000, i5400: Fix definition of NRECMEMB register (bnc#1012382).\n- edac, i5000, i5400: Fix use of MTR_DRAM_WIDTH macro (bnc#1012382).\n- edac, octeon: Fix an uninitialized variable warning (bnc#1012382).\n- edac, sb_edac: Fix missing break in switch (bnc#1012382).\n- efi/esrt: Cleanup bad memory map log messages (bnc#1012382).\n- efi: Move some sysfs files to be read-only by root (bnc#1012382).\n- em28xx: only use mt9v011 if camera support is enabled (bnc#1012382).\n- enable DST_CACHE in non-vanilla configs except s390x/zfcpdump\n- eventpoll.h: add missing epoll event masks (bnc#1012382).\n- ext4: correct documentation for grpid mount option (bnc#1012382).\n- ext4: do not unnecessarily allocate buffer in recently_deleted() (bsc#1080344).\n- ext4: fix crash when a directory\u0027s i_size is too small (bnc#1012382).\n- ext4: Fix data exposure after failed AIO DIO (bsc#1069135 bsc#1082864).\n- ext4: Fix ENOSPC handling in DAX page fault handle (bsc#1072484).\n- ext4: fix fdatasync(2) after fallocate(2) operation (bnc#1012382).\n- ext4: save error to disk in __ext4_grp_locked_error() (bnc#1012382).\n- f2fs: fix a bug caused by NULL extent tree (bsc#1082478).\n- fbdev: auo_k190x: avoid unused function warnings (bnc#1012382).\n- fbdev: controlfb: Add missing modes to fix out of bounds access (bnc#1012382).\n- fbdev: s6e8ax0: avoid unused function warnings (bnc#1012382).\n- fbdev: sis: enforce selection of at least one backend (bnc#1012382).\n- fbdev: sm712fb: avoid unused function warnings (bnc#1012382).\n- Fix build error in vma.c (bnc#1012382).\n- Fixup hang when calling \u0027nvme list\u0027 on all paths down (bsc#1070052).\n- fjes: Fix wrong netdevice feature flags (bnc#1012382).\n- flow_dissector: properly cap thoff field (bnc#1012382).\n- fm10k: ensure we process SM mbx when processing VF mbx (bnc#1012382).\n- fork: clear thread stack upon allocation (bsc#1077560).\n- fs: Avoid invalidation in interrupt context in dio_complete() (bsc#1073407 bsc#1069135).\n- fscache: Fix the default for fscache_maybe_release_page() (bnc#1012382).\n- fs: Fix page cache inconsistency when mixing buffered and AIO DIO (bsc#1073407 bsc#1069135).\n- fs: invalidate page cache after end_io() in dio completion (bsc#1073407 bsc#1069135).\n- ftrace: Remove incorrect setting of glob search field (bnc#1012382).\n- futex: Prevent overflow by strengthen input validation (bnc#1012382).\n- gcov: disable for COMPILE_TEST (bnc#1012382).\n- geneve: fix populating tclass in geneve_get_v6_dst (bsc#1042286).\n- genirq/msi: Add stubs for get_cached_msi_msg/pci_write_msi_msg (bnc#1012382).\n- genirq/msi: Fix populating multiple interrupts (bsc#1085047).\n- genirq: Restore trigger settings in irq_modify_status() (bsc#1085056).\n- genksyms: Fix segfault with invalid declarations (bnc#1012382).\n- gfs2: Take inode off order_write list when setting jdata flag (bnc#1012382).\n- gianfar: fix a flooded alignment reports because of padding issue (bnc#1012382).\n- go7007: add MEDIA_CAMERA_SUPPORT dependency (bnc#1012382).\n- gpio: altera: Use handle_level_irq when configured as a level_high (bnc#1012382).\n- gpio: ath79: add missing MODULE_DESCRIPTION/LICENSE (bnc#1012382).\n- gpio: intel-mid: Fix build warning when !CONFIG_PM (bnc#1012382).\n- gpio: iop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).\n- gpio: xgene: mark PM functions as __maybe_unused (bnc#1012382).\n- grace: replace BUG_ON by WARN_ONCE in exit_net hook (bnc#1012382).\n- gre: build header correctly for collect metadata tunnels (bsc#1042286).\n- gre: do not assign header_ops in collect metadata mode (bsc#1042286).\n- gre: do not keep the GRE header around in collect medata mode (bsc#1042286).\n- gre: reject GUE and FOU in collect metadata mode (bsc#1042286).\n- hdpvr: hide unused variable (bnc#1012382).\n- hid: chicony: Add support for another ASUS Zen AiO keyboard (bnc#1012382).\n- hid: quirks: Fix keyboard + touchpad on Toshiba Click Mini not working (bnc#1012382).\n- hid: xinmo: fix for out of range for THT 2P arcade controller (bnc#1012382).\n- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bnc#1012382).\n- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1012382).\n- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1012382).\n- hv: kvp: Avoid reading past allocated blocks from KVP file (bnc#1012382).\n- hv_netvsc: Add ethtool handler to set and get TCP hash levels (fate#315887, bsc#1082632).\n- hv_netvsc: Add ethtool handler to set and get UDP hash levels (fate#315887, bsc#1082632).\n- hv_netvsc: Add initialization of tx_table in netvsc_device_add() (fate#315887, bsc#1082632).\n- hv_netvsc: Change the hash level variable to bit flags (fate#315887, bsc#1082632).\n- hv_netvsc: Clean up an unused parameter in rndis_filter_set_rss_param() (fate#315887, bsc#1082632).\n- hv_netvsc: Clean up unused parameter from netvsc_get_hash() (fate#315887, bsc#1082632).\n- hv_netvsc: Clean up unused parameter from netvsc_get_rss_hash_opts() (fate#315887, bsc#1082632).\n- hv_netvsc: copy_to_send buf can be void (fate#315887, bsc#1082632).\n- hv_netvsc: do not need local xmit_more (fate#315887, bsc#1082632).\n- hv_netvsc: drop unused macros (fate#315887, bsc#1082632).\n- hv_netvsc: empty current transmit aggregation if flow blocked (fate#315887, bsc#1082632).\n- hv_netvsc: Fix rndis_filter_close error during netvsc_remove (fate#315887, bsc#1082632).\n- hv_netvsc: fix send buffer failure on MTU change (fate#315887, bsc#1082632).\n- hv_netvsc: Fix the channel limit in netvsc_set_rxfh() (fate#315887, bsc#1082632).\n- hv_netvsc: Fix the real number of queues of non-vRSS cases (fate#315887, bsc#1082632).\n- hv_netvsc: Fix the receive buffer size limit (fate#315887, bsc#1082632).\n- hv_netvsc: Fix the TX/RX buffer default sizes (fate#315887, bsc#1082632).\n- hv_netvsc: hide warnings about uninitialized/missing rndis device (fate#315887, bsc#1082632).\n- hv_netvsc: make const array ver_list static, reduces object code size (fate#315887, bsc#1082632).\n- hv_netvsc: optimize initialization of RNDIS header (fate#315887, bsc#1082632).\n- hv_netvsc: pass netvsc_device to receive callback (fate#315887, bsc#1082632).\n- hv_netvsc: remove open_cnt reference count (fate#315887, bsc#1082632).\n- hv_netvsc: Rename ind_table to rx_table (fate#315887, bsc#1082632).\n- hv_netvsc: Rename tx_send_table to tx_table (fate#315887, bsc#1082632).\n- hv_netvsc: replace divide with mask when computing padding (fate#315887, bsc#1082632).\n- hv_netvsc: report stop_queue and wake_queue (fate#315887, bsc#1082632).\n- hv_netvsc: simplify function args in receive status path (fate#315887, bsc#1082632).\n- hv_netvsc: Simplify the limit check in netvsc_set_channels() (fate#315887, bsc#1082632).\n- hv_netvsc: track memory allocation failures in ethtool stats (fate#315887, bsc#1082632).\n- hv: preserve kabi by keeping hv_do_hypercall (bnc#1082632).\n- hwmon: (asus_atk0110) fix uninitialized data access (bnc#1012382).\n- hwmon: (pmbus) Use 64bit math for DIRECT format values (bnc#1012382).\n- hwrng: exynos - use __maybe_unused to hide pm functions (bnc#1012382).\n- hyper-v: trace vmbus_ongpadl_created() (fate#315887, bsc#1082632).\n- hyper-v: trace vmbus_ongpadl_torndown() (fate#315887, bsc#1082632).\n- hyper-v: trace vmbus_on_message() (fate#315887, bsc#1082632).\n- hyper-v: trace vmbus_on_msg_dpc() (fate#315887, bsc#1082632).\n- hyper-v: trace vmbus_onoffer() (fate#315887, bsc#1082632).\n- hyper-v: trace vmbus_onoffer_rescind() (fate#315887, bsc#1082632).\n- hyper-v: trace vmbus_onopen_result() (fate#315887, bsc#1082632).\n- hyper-v: trace vmbus_onversion_response() (fate#315887, bsc#1082632).\n- hyper-v: Use fast hypercall for HVCALL_SIGNAL_EVENT (fate#315887, bsc#1082632).\n- i2c: remove __init from i2c_register_board_info() (bnc#1012382).\n- i40iw: Account for IPv6 header when setting MSS (bsc#1024376 FATE#321249).\n- i40iw: Allocate a sdbuf per CQP WQE (bsc#1024376 FATE#321249).\n- i40iw: Cleanup AE processing (bsc#1024376 FATE#321249).\n- i40iw: Clear CQP Head/Tail during initialization (bsc#1024376 FATE#321249).\n- i40iw: Correct ARP index mask (bsc#1024376 FATE#321249).\n- i40iw: Correct Q1/XF object count equation (bsc#969476 FATE#319648 bsc#969477 FATE#319816).\n- i40iw: Do not allow posting WR after QP is flushed (bsc#1024376 FATE#321249).\n- i40iw: Do not free sqbuf when event is I40IW_TIMER_TYPE_CLOSE (bsc#1024376 FATE#321249).\n- i40iw: Do not generate CQE for RTR on QP flush (bsc#1024376 FATE#321249).\n- i40iw: Do not retransmit MPA request after it is ACKed (bsc#1024376 FATE#321249).\n- i40iw: Fixes for static checker warnings (bsc#1024376 FATE#321249).\n- i40iw: Fix sequence number for the first partial FPDU (bsc#969476 FATE#319648 bsc#969477 FATE#319816).\n- i40iw: Fix the connection ORD value for loopback (bsc#969476 FATE#319648 bsc#969477 FATE#319816).\n- i40iw: Ignore AE source field in AEQE for some AEs (bsc#1024376 FATE#321249).\n- i40iw: Move cqp_cmd_head init to CQP initialization (bsc#1024376 FATE#321249).\n- i40iw: Move exception_lan_queue to VSI structure (bsc#1024376 FATE#321249).\n- i40iw: Move MPA request event for loopback after connect (bsc#1024376 FATE#321249).\n- i40iw: Notify user of established connection after QP in RTS (bsc#1024376 FATE#321249).\n- i40iw: Reinitialize IEQ on MTU change (bsc#1024376 FATE#321249).\n- i40iw: Remove limit on re-posting AEQ entries to HW (bsc#969476 FATE#319648 bsc#969477 FATE#319816).\n- i40iw: Selectively teardown QPs on IP addr change event (bsc#1024376 FATE#321249).\n- i40iw: Validate correct IRD/ORD connection parameters (bsc#969476 FATE#319648 bsc#969477 FATE#319816).\n- ib/hfi1: Fix for potential refcount leak in hfi1_open_file() (FATE#321231 FATE#321473).\n- ib/hfi1: Fix misspelling in comment (bsc#973818, fate#319242).\n- ib/hfi1: Prevent kernel QP post send hard lockups (bsc#973818 FATE#319242).\n- ib/ipoib: Fix lockdep issue found on ipoib_ib_dev_heavy_flush (git-fixes).\n- ib/ipoib: Fix race condition in neigh creation (bsc#1022595 FATE#322350).\n- ib/ipoib: Grab rtnl lock on heavy flush when calling ndo_open/stop (bnc#1012382).\n- ib/iser: Handle lack of memory management extentions correctly (bsc#1082979).\n- ib/mlx4: Fix incorrectly releasing steerable UD QPs when have only ETH ports (bnc#1012382).\n- ib/mlx4: Fix mlx4_ib_alloc_mr error flow (bnc#1012382).\n- ib/mlx4: Increase maximal message size under UD QP (bnc#1012382).\n- ib/mlx5: Assign send CQ and recv CQ of UMR QP (bnc#1012382).\n- ib/mlx5: Serialize access to the VMA list (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- ibmvnic: Account for VLAN header length in TX buffers (bsc#1085239).\n- ibmvnic: Account for VLAN tag in L2 Header descriptor (bsc#1085239).\n- ibmvnic: Allocate and request vpd in init_resources (bsc#1076872).\n- ibmvnic: Allocate max queues stats buffers (bsc#1081498).\n- ibmvnic: Allocate statistics buffers during probe (bsc#1082993).\n- ibmvnic: Check for NULL skb\u0027s in NAPI poll routine (bsc#1081134, git-fixes).\n- ibmvnic: Clean RX pool buffers during device close (bsc#1081134).\n- ibmvnic: Clean up device close (bsc#1084610).\n- ibmvnic: Correct goto target for tx irq initialization failure (bsc#1082223).\n- ibmvnic: Do not attempt to login if RX or TX queues are not allocated (bsc#1082993).\n- ibmvnic: Do not disable device during failover or partition migration (bsc#1084610).\n- ibmvnic: Do not handle RX interrupts when not up (bsc#1075066).\n- ibmvnic: Ensure that buffers are NULL after free (bsc#1080014).\n- ibmvnic: Fix early release of login buffer (bsc#1081134, git-fixes).\n- ibmvnic: fix empty firmware version and errors cleanup (bsc#1079038).\n- ibmvnic: fix firmware version when no firmware level has been provided by the VIOS server (bsc#1079038).\n- ibmvnic: Fix IP offload control buffer (bsc#1076899).\n- ibmvnic: Fix IPv6 packet descriptors (bsc#1076899).\n- ibmvnic: Fix login buffer memory leaks (bsc#1081134).\n- ibmvnic: Fix NAPI structures memory leak (bsc#1081134).\n- ibmvnic: Fix pending MAC address changes (bsc#1075627).\n- ibmvnic: Fix recent errata commit (bsc#1085239).\n- ibmvnic: Fix rx queue cleanup for non-fatal resets (bsc#1080014).\n- ibmvnic: Fix TX descriptor tracking again (bsc#1082993).\n- ibmvnic: Fix TX descriptor tracking (bsc#1081491).\n- ibmvnic: Free and re-allocate scrqs when tx/rx scrqs change (bsc#1081498).\n- ibmvnic: Free RX socket buffer in case of adapter error (bsc#1081134).\n- ibmvnic: Generalize TX pool structure (bsc#1085224).\n- ibmvnic: Handle TSO backing device errata (bsc#1085239).\n- ibmvnic: Harden TX/RX pool cleaning (bsc#1082993).\n- ibmvnic: Improve TX buffer accounting (bsc#1085224).\n- ibmvnic: Keep track of supplementary TX descriptors (bsc#1081491).\n- ibmvnic: Make napi usage dynamic (bsc#1081498).\n- ibmvnic: Modify buffer size and number of queues on failover (bsc#1076872).\n- ibmvnic: Move active sub-crq count settings (bsc#1081498).\n- ibmvnic: Pad small packets to minimum MTU size (bsc#1085239).\n- ibmvnic: queue reset when CRQ gets closed during reset (bsc#1080263).\n- ibmvnic: Remove skb-\u003eprotocol checks in ibmvnic_xmit (bsc#1080384).\n- ibmvnic: Rename active queue count variables (bsc#1081498).\n- ibmvnic: Reorganize device close (bsc#1084610).\n- ibmvnic: Report queue stops and restarts as debug output (bsc#1082993).\n- ibmvnic: Reset long term map ID counter (bsc#1080364).\n- ibmvnic: Revert to previous mtu when unsupported value requested (bsc#1076872).\n- ibmvnic: Split counters for scrq/pools/napi (bsc#1082223).\n- ibmvnic: Update and clean up reset TX pool routine (bsc#1085224).\n- ibmvnic: Update release RX pool routine (bsc#1085224).\n- ibmvnic: Update TX and TX completion routines (bsc#1085224).\n- ibmvnic: Update TX pool initialization routine (bsc#1085224).\n- ibmvnic: Wait for device response when changing MAC (bsc#1078681).\n- ibmvnic: Wait until reset is complete to set carrier on (bsc#1081134).\n- ib/qib: Fix comparison error with qperf compare/swap test (FATE#321231 FATE#321473).\n- ib/rdmavt: restore IRQs on error path in rvt_create_ah() (bsc#973818, fate#319242).\n- ib/srpt: Disable RDMA access by the initiator (bnc#1012382).\n- ib/srpt: Fix ACL lookup during login (bsc#1024296 FATE#321265).\n- ib/srpt: Remove an unused structure member (bsc#1082979).\n- idle: i7300: add PCI dependency (bnc#1012382).\n- igb: check memory allocation failure (bnc#1012382).\n- igb: Free IRQs when device is hotplugged (bnc#1012382).\n- iio: adc: axp288: remove redundant duplicate const on axp288_adc_channels (bnc#1012382).\n- iio: adis_lib: Initialize trigger before requesting interrupt (bnc#1012382).\n- iio: buffer: check if a buffer has been set up when poll is called (bnc#1012382).\n- ima: fix hash algorithm initialization (bnc#1012382).\n- inet: frag: release spinlock before calling icmp_send() (bnc#1012382).\n- input: 88pm860x-ts - fix child-node lookup (bnc#1012382).\n- input: elantech - add new icbody type 15 (bnc#1012382).\n- input: i8042 - add TUXEDO BU1406 (N24_25BU) to the nomux list (bnc#1012382).\n- input: tca8418_keypad - hide gcc-4.9 -Wmaybe-uninitialized warning (bnc#1012382).\n- input: tca8418_keypad - remove double read of key event register (git-fixes).\n- input: trackpoint - force 3 buttons if 0 button is reported (bnc#1012382).\n- input: twl4030-vibra - fix sibling-node lookup (bnc#1012382).\n- input: twl6040-vibra - fix child-node lookup (bnc#1012382).\n- input: twl6040-vibra - fix DT node memory management (bnc#1012382).\n- intel_th: pci: Add Gemini Lake support (bnc#1012382).\n- iommu/amd: Add align parameter to alloc_irq_index() (bsc#975772).\n- iommu/amd: Enforce alignment for MSI IRQs (bsc#975772).\n- iommu/amd: Fix alloc_irq_index() increment (bsc#975772).\n- iommu/amd: Limit the IOVA page range to the specified addresses (fate#321026).\n- iommu/arm-smmu-v3: Cope with duplicated Stream IDs (bsc#1084926).\n- iommu/arm-smmu-v3: Do not free page table ops twice (bnc#1012382).\n- iommu/iova: Fix underflow bug in __alloc_and_insert_iova_range (bsc#1084928).\n- iommu/vt-d: Fix scatterlist offset handling (bnc#1012382).\n- iommu/vt-d: Use domain instead of cache fetching (bsc#975772).\n- ip6_gre: remove the incorrect mtu limit for ipgre tap (bsc#1022912 FATE#321246).\n- ip6mr: fix stale iterator (bnc#1012382).\n- ip6_tunnel: disable dst caching if tunnel is dual-stack (bnc#1012382).\n- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).\n- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).\n- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).\n- ipmi: Stop timers before cleaning up the module (bnc#1012382).\n- ip_tunnel: fix preempt warning in ip tunnel creation/updating (bnc#1012382).\n- ip_tunnel: replace dst_cache with generic implementation (bnc#1012382).\n- ipv4: allow local fragmentation in ip_finish_output_gso() (bsc#1042286).\n- ipv4: fix checksum annotation in udp4_csum_init (bsc#1042286).\n- ipv4: Fix use-after-free when flushing FIB tables (bnc#1012382).\n- ipv4: igmp: guard against silly MTU values (bnc#1012382).\n- ipv4: ipconfig: avoid unused ic_proto_used symbol (bnc#1012382).\n- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (bnc#1012382).\n- ipv4: update comment to document GSO fragmentation cases (bsc#1042286).\n- ipv6: datagram: Refactor dst lookup and update codes to a new function (bsc#1042286).\n- ipv6: datagram: Refactor flowi6 init codes to a new function (bsc#1042286).\n- ipv6: datagram: Update dst cache of a connected datagram sk during pmtu update (bsc#1042286).\n- ipv6: fix checksum annotation in udp6_csum_init (bsc#1042286).\n- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (bnc#1012382).\n- ipv6: fix possible mem leaks in ipv6_make_skb() (bnc#1012382).\n- ipv6: fix udpv6 sendmsg crash caused by too small MTU (bnc#1012382).\n- ipv6: icmp6: Allow icmp messages to be looped back (bnc#1012382).\n- ipv6/ila: fix nlsize calculation for lwtunnel (bsc#1042286).\n- ipv6: ip6_make_skb() needs to clear cork.base.dst (git-fixes).\n- ipv6: mcast: better catch silly mtu values (bnc#1012382).\n- ipv6: remove unused in6_addr struct (bsc#1042286).\n- ipv6: reorder icmpv6_init() and ip6_mr_init() (bnc#1012382).\n- ipv6: tcp: fix endianness annotation in tcp_v6_send_response (bsc#1042286).\n- ipv6: udp: Do a route lookup and update during release_cb (bsc#1042286).\n- ipvlan: Add the skb-\u003emark as flow4\u0027s member to lookup route (bnc#1012382).\n- ipvlan: fix ipv6 outbound device (bnc#1012382).\n- ipvlan: fix multicast processing (bsc#1042286).\n- ipvlan: fix various issues in ipvlan_process_multicast() (bsc#1042286).\n- ipvlan: remove excessive packet scrubbing (bsc#1070799).\n- irda: vlsi_ir: fix check for DMA mapping errors (bnc#1012382).\n- irqchip/crossbar: Fix incorrect type of register size (bnc#1012382).\n- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bnc#1012382).\n- iscsi_iser: Re-enable \u0027iser_pi_guard\u0027 module parameter (bsc#1062129).\n- iscsi-target: fix memory leak in lio_target_tiqn_addtpg() (bnc#1012382).\n- iscsi-target: Make TASK_REASSIGN use proper se_cmd-\u003ecmd_kref (bnc#1012382).\n- isdn: eicon: reduce stack size of sig_ind function (bnc#1012382).\n- isdn: icn: remove a #warning (bnc#1012382).\n- isdn: kcapi: avoid uninitialized data (bnc#1012382).\n- isdn: sc: work around type mismatch warning (bnc#1012382).\n- iser-target: Fix possible use-after-free in connection establishment error (FATE#321732).\n- iw_cxgb4: Only validate the MSN for successful completions (bnc#1012382).\n- ixgbe: fix use of uninitialized padding (bnc#1012382).\n- jffs2: Fix use-after-free bug in jffs2_iget()\u0027s error handling path (git-fixes).\n- jump_label: Invoke jump_label_test() via early_initcall() (bnc#1012382).\n- Kabi: Keep KVM stable after enable s390 wire up bpb feature (bsc#1076805).\n- kABI: protect struct bpf_map (kabi).\n- kABI: protect struct cpuinfo_x86 (kabi).\n- kABI: protect struct ethtool_link_settings (bsc#1085050).\n- kABI: protect struct ip_tunnel and reintroduce ip_tunnel_dst_reset_all (kabi).\n- kABI: protect struct ipv6_pinfo (kabi).\n- kABI: protect struct t10_alua_tg_pt_gp (kabi).\n- kABI: protect struct usbip_device (kabi).\n- kABI: reintroduce crypto_poly1305_setkey (kabi).\n- kabi: restore kabi after \u0027net: replace dst_cache ip6_tunnel implementation with the generic one\u0027 (bsc#1082897).\n- kabi: restore nft_set_elem_destroy() signature (bsc#1042286).\n- kabi: restore rhashtable_insert_slow() signature (bsc#1042286).\n- kabi/severities: add sclp to KABI ignore list\n- kabi/severities: add __x86_indirect_thunk_rsp\n- kabi/severities: arm64: ignore cpu capability array\n- kabi/severities: as per bsc#1068569 we can ignore XFS kabi The gods have spoken, let there be light.\n- kabi/severities: do not care about stuff_RSB\n- kabi/severities: Ignore kvm for KABI severities\n- kabi: uninline sk_receive_skb() (bsc#1042286).\n- kaiser: fix compile error without vsyscall (bnc#1012382).\n- kaiser: fix intel_bts perf crashes (bnc#1012382).\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382).\n- kasan: rework Kconfig settings (bnc#1012382).\n- kbuild: add \u0027-fno-stack-check\u0027 to kernel build options (bnc#1012382).\n- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).\n- kbuild: pkg: use --transform option to prefix paths in tar (bnc#1012382).\n- kdb: Fix handling of kallsyms_symbol_next() return value (bnc#1012382).\n- kernel/acct.c: fix the acct-\u003eneedcheck check in check_free_space() (bnc#1012382).\n- kernel/async.c: revert \u0027async: simplify lowest_in_progress()\u0027 (bnc#1012382).\n- kernel: fix rwlock implementation (bnc#1079886, LTC#164371).\n- kernel: make groups_sort calling a responsibility group_info allocators (bnc#1012382).\n- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals (bnc#1012382).\n- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL (bnc#1012382).\n- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() (bnc#1012382).\n- kernfs: fix regression in kernfs_fop_write caused by wrong type (bnc#1012382).\n- keys: add missing permission check for request_key() destination (bnc#1012382).\n- keys: encrypted: fix buffer overread in valid_master_desc() (bnc#1012382).\n- kmemleak: add scheduling point to kmemleak_scan() (bnc#1012382).\n- kprobes/x86: Disable preemption in ftrace-based jprobes (bnc#1012382).\n- kpti: Rename to PAGE_TABLE_ISOLATION (bnc#1012382).\n- kpti: Report when enabled (bnc#1012382).\n- kvm: add X86_LOCAL_APIC dependency (bnc#1012382).\n- kvm: ARM64: fix phy counter access failure in guest (bsc#1085015).\n- kvm: arm/arm64: Check pagesize when allocating a hugepage at Stage 2 (bsc#1079029).\n- kvm: Fix stack-out-of-bounds read in write_mmio (bnc#1012382).\n- kvm: nVMX: Fix kernel panics induced by illegal INVEPT/INVVPID types (bnc#1012382).\n- kvm: nVMX: Fix races when sending nested PI while dest enters/leaves L2 (bnc#1012382).\n- kvm: nVMX: invvpid handling improvements (bnc#1012382).\n- kvm: nVMX: kmap() can\u0027t fail (bnc#1012382).\n- kvm: nVMX: reset nested_run_pending if the vCPU is going to be reset (bnc#1012382).\n- kvm: nVMX: VMCLEAR should not cause the vCPU to shut down (bnc#1012382).\n- kvm: nVMX: vmx_complete_nested_posted_interrupt() can\u0027t fail (bnc#1012382).\n- kvm: pci-assign: do not map smm memory slot pages in vt-d page tables (bnc#1012382).\n- kvm: PPC: Book3S PR: Fix svcpu copying with preemption enabled (bsc#1066223).\n- kvm: s390: Add operation exception interception handler (FATE#324070, LTC#158959).\n- kvm: s390: Add sthyi emulation (FATE#324070, LTC#158959).\n- kvm: s390: Enable all facility bits that are known good for passthrough (bsc#1076805).\n- kvm: s390: Enable all facility bits that are known good for passthrough (FATE#324071, LTC#158956).\n- kvm: s390: Extend diag 204 fields (FATE#324070, LTC#158959).\n- kvm: s390: Fix STHYI buffer alignment for diag224 (FATE#324070, LTC#158959).\n- kvm: s390: instruction-execution-protection support (LTC#162428).\n- kvm: s390: Introduce BCD Vector Instructions to the guest (FATE#324072, LTC#158953).\n- kvm: s390: Introduce Vector Enhancements facility 1 to the guest (FATE#324072, LTC#158953).\n- kvm: s390: Limit sthyi execution (FATE#324070, LTC#158959).\n- kvm: s390: Populate mask of non-hypervisor managed facility bits (FATE#324071, LTC#158956).\n- kvm: s390: wire up bpb feature (bsc#1076805).\n- kvm: VMX: clean up declaration of VPID/EPT invalidation types (bnc#1012382).\n- kvm: VMX: Fix enable VPID conditions (bnc#1012382).\n- kvm: VMX: Fix rflags cache during vCPU reset (bnc#1012382).\n- kvm: VMX: Make indirect call speculation safe (bnc#1012382).\n- kvm: VMX: remove I/O port 0x80 bypass on Intel hosts (bnc#1012382).\n- kvm: vmx: Scrub hardware GPRs at VM-exit (bnc#1012382 bsc#1068032).\n- kvm: x86: Add memory barrier on vmcs field lookup (bnc#1012382).\n- kvm: x86: correct async page present tracepoint (bnc#1012382).\n- kvm: x86: Do not re-execute instruction when not passing CR2 value (bnc#1012382).\n- kvm: x86: emulator: Return to user-mode on L1 CPL=0 emulation failure (bnc#1012382).\n- kvm: x86: fix escape of guest dr6 to the host (bnc#1012382).\n- kvm: X86: Fix load RFLAGS w/o the fixed bit (bnc#1012382).\n- kvm: X86: Fix operand/address-size during instruction decoding (bnc#1012382).\n- kvm: x86: fix RSM when PCID is non-zero (bnc#1012382).\n- kvm: x86: ioapic: Clear Remote IRR when entry is switched to edge-triggered (bnc#1012382).\n- kvm: x86: ioapic: Fix level-triggered EOI and IOAPIC reconfigure race (bnc#1012382).\n- kvm: x86: ioapic: Preserve read-only values in the redirection table (bnc#1012382).\n- kvm: x86: Make indirect calls in emulator speculation safe (bnc#1012382).\n- kvm/x86: Reduce retpoline performance impact in slot_handle_level_range(), by always inlining iterator helper methods (bnc#1012382).\n- l2tp: cleanup l2tp_tunnel_delete calls (bnc#1012382).\n- l2tp: fix use-after-free during module unload (bsc#1042286).\n- lan78xx: Fix failure in USB Full Speed (bnc#1012382).\n- led: core: Fix brightness setting when setting delay_off=0 (bnc#1012382).\n- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).\n- libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (bnc#1012382).\n- libata: drop WARN from protocol error in ata_sff_qc_issue() (bnc#1012382).\n- libceph: check kstrndup() return value (bsc#1081735).\n- lib/genalloc.c: make the avail variable an atomic_long_t (bnc#1012382).\n- lib/mpi: Fix umul_ppmm() for MIPS64r6 (bnc#1012382).\n- lib/uuid.c: introduce a few more generic helpers (fate#315887, bsc#1082632).\n- lib/uuid.c: use correct offset in uuid parser (fate#315887, bsc#1082632).\n- livepatch: introduce shadow variable API (bsc#1082299 fate#313296). Shadow variables support.\n- livepatch: __kgr_shadow_get_or_alloc() is local to shadow.c (bsc#1082299 fate#313296). Shadow variables support.\n- lockd: fix \u0027list_add double add\u0027 caused by legacy signal interface (bnc#1012382).\n- loop: fix concurrent lo_open/lo_release (bnc#1012382).\n- mac80211: fix the update of path metric for RANN frame (bnc#1012382).\n- mac80211: mesh: drop frames appearing to be from us (bnc#1012382).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bnc#1012382).\n- Make DST_CACHE a silent config option (bnc#1012382).\n- mdio-sun4i: Fix a memory leak (bnc#1012382).\n- md: more open-coded offset_in_page() (bsc#1076110).\n- md/raid1: Use a new variable to count flighting sync requests(bsc#1083048)\n- media: cxusb, dib0700: ignore XC2028_I2C_FLUSH (bnc#1012382).\n- media: dvb: i2c transfers over usb cannot be done from stack (bnc#1012382).\n- media: dvb-usb-v2: lmedm04: Improve logic checking of warm start (bnc#1012382).\n- media: dvb-usb-v2: lmedm04: move ts2020 attach to dm04_lme2510_tuner (bnc#1012382).\n- media: r820t: fix r820t_write_reg for KASAN (bnc#1012382).\n- media: s5k6aa: describe some function parameters (bnc#1012382).\n- media: soc_camera: soc_scale_crop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).\n- media: ts2020: avoid integer overflows on 32 bit machines (bnc#1012382).\n- media: usbtv: add a new usbid (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: add missing VIDIOC_PREPARE_BUF (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: avoid sizeof(type) (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: copy clip list in put_v4l2_window32 (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: copy m.userptr in put_v4l2_plane32 (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: do not copy back the result for certain errors (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: drop pr_info for unknown buffer type (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: fix ctrl_is_pointer (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: fix the indentation (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: make ctrl_is_pointer work for subdevs (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: move \u0027helper\u0027 functions to __get/put_v4l2_format32 (bnc#1012382).\n- media: v4l2-compat-ioctl32: Copy v4l2_window-\u003eglobal_alpha (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: refactor compat ioctl32 logic (bnc#1012382).\n- media: v4l2-ioctl.c: do not copy back the result for -ENOTTY (bnc#1012382).\n- mfd: cros ec: spi: Do not send first message too soon (bnc#1012382).\n- mfd: twl4030-audio: Fix sibling-node lookup (bnc#1012382).\n- mfd: twl6040: Fix child-node lookup (bnc#1012382).\n- MIPS: Also verify sizeof `elf_fpreg_t\u0027 with PTRACE_SETREGSET (bnc#1012382).\n- MIPS: AR7: ensure the port type\u0027s FCR value is used (bnc#1012382).\n- MIPS: Consistently handle buffer counter with PTRACE_SETREGSET (bnc#1012382).\n- MIPS: Disallow outsized PTRACE_SETREGSET NT_PRFPREG regset accesses (bnc#1012382).\n- MIPS: Factor out NT_PRFPREG regset access helpers (bnc#1012382).\n- MIPS: Fix an FCSR access API regression with NT_PRFPREG and MSA (bnc#1012382).\n- MIPS: Guard against any partial write attempt with PTRACE_SETREGSET (bnc#1012382).\n- MIPS: math-emu: Fix final emulation phase for certain instructions (bnc#1012382).\n- MIPS: Validate PR_SET_FP_MODE prctl(2) requests against the ABI of the task (bnc#1012382).\n- mlxsw: reg: Fix SPVMLR max record count (bnc#1012382).\n- mlxsw: reg: Fix SPVM max record count (bnc#1012382).\n- mm: avoid returning VM_FAULT_RETRY from -\u003epage_mkwrite handlers (bnc#1012382).\n- mmc: bcm2835: Do not overwrite max frequency unconditionally (bsc#983145, git-fixes).\n- mmc: mediatek: Fixed bug where clock frequency could be set wrong (bnc#1012382).\n- mm: drop unused pmdp_huge_get_and_clear_notify() (bnc#1012382).\n- mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep (bnc#1012382).\n- mm: Handle 0 flags in _calc_vm_trans() macro (bnc#1012382).\n- mm: hide a #warning for COMPILE_TEST (bnc#1012382).\n- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (git-fixes).\n- mm/mprotect: add a cond_resched() inside change_pmd_range() (bnc#1077871, bnc#1078002).\n- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (bnc#1012382).\n- mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP (bnc#1012382).\n- mn10300/misalignment: Use SIGSEGV SEGV_MAPERR to report a failed user copy (bnc#1012382).\n- modsign: hide openssl output in silent builds (bnc#1012382).\n- module: Add retpoline tag to VERMAGIC (bnc#1012382).\n- module/retpoline: Warn about missing retpoline in module (bnc#1012382).\n- module: set __jump_table alignment to 8 (bnc#1012382).\n- more bio_map_user_iov() leak fixes (bnc#1012382).\n- mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bsc#1078583).\n- mptfusion: hide unused seq_mpt_print_ioc_summary function (bnc#1012382).\n- mtd: cfi: convert inline functions to macros (bnc#1012382).\n- mtd: cfi: enforce valid geometry configuration (bnc#1012382).\n- mtd: ichxrom: maybe-uninitialized with gcc-4.9 (bnc#1012382).\n- mtd: maps: add __init attribute (bnc#1012382).\n- mtd: nand: brcmnand: Disable prefetch by default (bnc#1012382).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).\n- mtd: nand: Fix nand_do_read_oob() return value (bnc#1012382).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bnc#1012382).\n- mtd: nand: sunxi: Fix ECC strength choice (bnc#1012382).\n- mtd: sh_flctl: pass FIFO as physical address (bnc#1012382).\n- mvpp2: fix multicast address filter (bnc#1012382).\n- ncpfs: fix unused variable warning (bnc#1012382).\n- ncr5380: shut up gcc indentation warning (bnc#1012382).\n- net: add dst_cache support (bnc#1012382).\n- net: Allow neigh contructor functions ability to modify the primary_key (bnc#1012382).\n- net/appletalk: Fix kernel memory disclosure (bnc#1012382).\n- net: arc_emac: fix arc_emac_rx() error paths (bnc#1012382).\n- net: avoid skb_warn_bad_offload on IS_ERR (bnc#1012382).\n- net: bcmgenet: correct MIB access of UniMAC RUNT counters (bnc#1012382).\n- net: bcmgenet: correct the RBUF_OVFL_CNT and RBUF_ERR_CNT MIB values (bnc#1012382).\n- net: bcmgenet: power down internal phy if open or resume fails (bnc#1012382).\n- net: bcmgenet: Power up the internal PHY before probing the MII (bnc#1012382).\n- net: bcmgenet: reserved phy revisions must be checked first (bnc#1012382).\n- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks (bnc#1012382).\n- net: cdc_ncm: initialize drvflags before usage (bnc#1012382).\n- net: core: fix module type in sock_diag_bind (bnc#1012382).\n- net: Do not allow negative values for busy_read and busy_poll sysctl interfaces (bnc#1012382).\n- net: dst_cache_per_cpu_dst_set() can be static (bnc#1012382).\n- net: ena: add detection and recovery mechanism for handling missed/misrouted MSI-X (bsc#1083548).\n- net: ena: add new admin define for future support of IPv6 RSS (bsc#1083548).\n- net: ena: add power management ops to the ENA driver (bsc#1083548).\n- net: ena: add statistics for missed tx packets (bsc#1083548).\n- net: ena: fix error handling in ena_down() sequence (bsc#1083548).\n- net: ena: fix race condition between device reset and link up setup (bsc#1083548).\n- net: ena: fix rare kernel crash when bar memory remap fails (bsc#1083548).\n- net: ena: fix wrong max Tx/Rx queues on ethtool (bsc#1083548).\n- net: ena: improve ENA driver boot time (bsc#1083548).\n- net: ena: increase ena driver version to 1.3.0 (bsc#1083548).\n- net: ena: increase ena driver version to 1.5.0 (bsc#1083548).\n- net: ena: reduce the severity of some printouts (bsc#1083548).\n- net: ena: remove legacy suspend suspend/resume support (bsc#1083548).\n- net: ena: Remove redundant unlikely() (bsc#1083548).\n- net: ena: unmask MSI-X only after device initialization is completed (bsc#1083548).\n- net: ethernet: cavium: Correct Cavium Thunderx NIC driver names accordingly to module name (bsc#1085011).\n- net: ethernet: xilinx: Mark XILINX_LL_TEMAC broken on 64-bit (bnc#1012382).\n- net: ethtool: Add back transceiver type (bsc#1085050).\n- net: ethtool: remove error check for legacy setting transceiver type (bsc#1085050).\n- net: fec: fix multicast filtering hardware setup (bnc#1012382).\n- netfilter: bridge: honor frag_max_size when refragmenting (bnc#1012382).\n- netfilter: do not track fragmented packets (bnc#1012382).\n- netfilter: drop outermost socket lock in getsockopt() (bnc#1012382).\n- netfilter: ebtables: CONFIG_COMPAT: do not trust userland offsets (bsc#1085107).\n- netfilter: ebtables: fix erroneous reject of last rule (bsc#1085107).\n- netfilter: ipt_CLUSTERIP: fix out-of-bounds accesses in clusterip_tg_check() (bnc#1012382).\n- netfilter: ipvs: avoid unused variable warnings (bnc#1012382).\n- netfilter: ipvs: Fix inappropriate output of procfs (bnc#1012382).\n- netfilter: nfnetlink_queue: fix secctx memory leak (bnc#1012382).\n- netfilter: nfnetlink_queue: fix timestamp attribute (bsc#1074134).\n- netfilter: nfnl_cthelper: fix a race when walk the nf_ct_helper_hash table (bnc#1012382).\n- netfilter: nfnl_cthelper: Fix memory leak (bnc#1012382).\n- netfilter: nfnl_cthelper: fix runtime expectation policy updates (bnc#1012382).\n- netfilter: nf_queue: Make the queue_handler pernet (bnc#1012382).\n- netfilter: nf_tables: fix a wrong check to skip the inactive rules (bsc#1042286).\n- netfilter: nf_tables: fix inconsistent element expiration calculation (bsc#1042286).\n- netfilter: nf_tables: fix *leak* when expr clone fail (bsc#1042286).\n- netfilter: nf_tables: fix race when create new element in dynset (bsc#1042286).\n- netfilter: on sockopt() acquire sock lock only in the required scope (bnc#1012382).\n- netfilter: tee: select NF_DUP_IPV6 unconditionally (bsc#1042286).\n- netfilter: x_tables: avoid out-of-bounds reads in xt_request_find_{match|target} (bnc#1012382).\n- netfilter: x_tables: fix int overflow in xt_alloc_table_info() (bnc#1012382).\n- netfilter: xt_RATEEST: acquire xt_rateest_mutex for hash insert (bnc#1012382).\n- netfilter: xt_socket: fix transparent match for IPv6 request sockets (bsc#1042286).\n- net: Fix double free and memory corruption in get_net_ns_by_id() (bnc#1012382).\n- net: gianfar_ptp: move set_fipers() to spinlock protecting area (bnc#1012382).\n- net: hns: add ACPI mode support for ethtool -p (bsc#1084041).\n- net: hp100: remove unnecessary #ifdefs (bnc#1012382).\n- net: igmp: add a missing rcu locking section (bnc#1012382).\n- net: igmp: fix source address check for IGMPv3 reports (bnc#1012382).\n- net: igmp: Use correct source address on IGMPv3 reports (bnc#1012382).\n- net: initialize msg.msg_flags in recvfrom (bnc#1012382).\n- net: ipv4: fix for a race condition in raw_sendmsg (bnc#1012382).\n- net/ipv4: Introduce IPSKB_FRAG_SEGS bit to inet_skb_parm.flags (bsc#1042286).\n- netlink: fix nla_put_{u8,u16,u32} for KASAN (bnc#1012382).\n- net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y (bnc#1012382).\n- net/mlx5: Avoid NULL pointer dereference on steering cleanup (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5: Cleanup IRQs in case of unload failure (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: Add refcount to VXLAN structure (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: Fix features check of IPv6 traffic (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: Fix fixpoint divide exception in mlx5e_am_stats_compare (bsc#1015342).\n- net/mlx5e: Fix loopback self test when GRO is off (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5e: Fix possible deadlock of VXLAN lock (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: Fix wrong delay calculation for overflow check scheduling (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: Prevent possible races in VXLAN control flow (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: Verify inline header size do not exceed SKB linear size (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5: Fix rate limit packet pacing naming and struct (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5: Stay in polling mode when command EQ destroy fails (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5: Use 128B cacheline size for 128B or larger cachelines (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (bnc#1012382).\n- net: mvneta: clear interface link status on port disable (bnc#1012382).\n- net: mvneta: eliminate wrong call to handle rx descriptor error (fate#319899).\n- net: mvneta: use proper rxq_number in loop on rx queues (fate#319899).\n- net/packet: fix a race in packet_bind() and packet_notifier() (bnc#1012382).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bnc#1012382).\n- net: phy: Keep reporting transceiver type (bsc#1085050).\n- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround (bnc#1012382).\n- net: qdisc_pkt_len_init() should be more robust (bnc#1012382).\n- net: qmi_wwan: add Sierra EM7565 1199:9091 (bnc#1012382).\n- net: qmi_wwan: Add USB IDs for MDM6600 modem on Motorola Droid 4 (bnc#1012382).\n- net: reevalulate autoflowlabel setting after sysctl setting (bnc#1012382).\n- net: replace dst_cache ip6_tunnel implementation with the generic one (bnc#1012382).\n- net: Resend IGMP memberships upon peer notification (bnc#1012382).\n- net_sched: red: Avoid devision by zero (bnc#1012382).\n- net_sched: red: Avoid illegal values (bnc#1012382).\n- net: sctp: fix array overrun read on sctp_timer_tbl (bnc#1012382).\n- net/smc: fix NULL pointer dereference on sock_create_kern() error path (bsc#1082979).\n- net: stmmac: enable EEE in MII, GMII or RGMII only (bnc#1012382).\n- net: systemport: Pad packet before inserting TSB (bnc#1012382).\n- net: systemport: Utilize skb_put_padto() (bnc#1012382).\n- net: tcp: close sock if net namespace is exiting (bnc#1012382).\n- netvsc: allow controlling send/recv buffer size (fate#315887, bsc#1082632).\n- netvsc: allow driver to be removed even if VF is present (fate#315887, bsc#1082632).\n- netvsc: check error return when restoring channels and mtu (fate#315887, bsc#1082632).\n- netvsc: cleanup datapath switch (fate#315887, bsc#1082632).\n- netvsc: do not signal host twice if empty (fate#315887, bsc#1082632).\n- netvsc: fix deadlock betwen link status and removal (fate#315887, bsc#1082632).\n- netvsc: increase default receive buffer size (fate#315887, bsc#1082632).\n- netvsc: keep track of some non-fatal overload conditions (fate#315887, bsc#1082632).\n- netvsc: no need to allocate send/receive on numa node (fate#315887, bsc#1082632).\n- netvsc: propagate MAC address change to VF slave (fate#315887, bsc#1082632).\n- netvsc: remove unnecessary cast of void pointer (fate#315887, bsc#1082632).\n- netvsc: remove unnecessary check for NULL hdr (fate#315887, bsc#1082632).\n- netvsc: whitespace cleanup (fate#315887, bsc#1082632).\n- net: vxlan: lwt: Fix vxlan local traffic (bsc#1042286).\n- net: vxlan: lwt: Use source ip address during route lookup (bsc#1042286).\n- net: wimax/i2400m: fix NULL-deref at probe (bnc#1012382).\n- nfs: Add a cond_resched() to nfs_commit_release_pages() (bsc#1077779).\n- nfs: commit direct writes even if they fail partially (bnc#1012382).\n- nfsd: auth: Fix gid sorting when rootsquash enabled (bnc#1012382).\n- nfsd: check for use of the closed special stateid (bnc#1012382).\n- nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x\u003e0) (bnc#1012382).\n- nfsd: Ensure we check stateid validity in the seqid operation checks (bnc#1012382).\n- NFSD: fix nfsd_minorversion(.., NFSD_AVAIL) (bnc#1012382).\n- NFSD: fix nfsd_reset_versions for NFSv4 (bnc#1012382).\n- nfs: Do not convert nfs_idmap_cache_timeout to jiffies (git-fixes).\n- nfs: Do not take a reference on fl-\u003efl_file for LOCK operation (bnc#1012382).\n- nfs: fix a deadlock in nfs client initialization (bsc#1074198).\n- NFS: Fix a typo in nfs_rename() (bnc#1012382).\n- nfs/pnfs: fix nfs_direct_req ref leak when i/o falls back to the mds (bnc#1012382).\n- nfs: reject request for id_legacy key without auxdata (bnc#1012382).\n- nfs: Trunking detection should handle ERESTARTSYS/EINTR (bsc#1074198).\n- NFSv4.1 respect server\u0027s max size in CREATE_SESSION (bnc#1012382).\n- NFSv4: Fix client recovery when server reboots multiple times (bnc#1012382).\n- nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick() (bnc#1012382).\n- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) (bnc#1012382).\n- nvme_fc: cleanup io completion (bsc#1079609).\n- nvme_fc: correct abort race condition on resets (bsc#1079609).\n- nvme_fc: correct hang in nvme_ns_remove() (bsc#1075811).\n- nvme_fc: fix abort race on teardown with lld reject (bsc#1083750).\n- nvme_fc: fix ctrl create failures racing with workq items (bsc#1076982).\n- nvme_fc: fix rogue admin cmds stalling teardown (bsc#1075811).\n- nvme_fc: io timeout should defer abort to ctrl reset (bsc#1085054).\n- nvme-fc: kick admin requeue list on disconnect (bsc#1077241).\n- nvme-fc: merge error on sles12sp3 for reset_work (bsc#1079195).\n- nvme_fc: minor fixes on sqsize (bsc#1076760).\n- nvme_fc: on remoteport reuse, set new nport_id and role (bsc#1076760).\n- nvme_fc: rework sqsize handling (bsc#1076760).\n- nvme: Fix managing degraded controllers (bnc#1012382).\n- nvme: Fix setting logical block format when revalidating (bsc#1079313).\n- nvme: only start KATO if the controller is live (bsc#1083387).\n- nvme-pci: clean up CMB initialization (bsc#1082979).\n- nvme-pci: clean up SMBSZ bit definitions (bsc#1082979).\n- nvme-pci: consistencly use ctrl-\u003edevice for logging (bsc#1082979).\n- nvme-pci: fix typos in comments (bsc#1082979).\n- nvme-pci: Remap CMB SQ entries on every controller reset (bsc#1082979).\n- nvme-pci: Remove watchdog timer (bsc#1066163).\n- nvme-pci: Use PCI bus address for data/queues in CMB (bsc#1082979).\n- nvme: Quirks for PM1725 controllers (bsc#1082979).\n- nvme_rdma: clear NVME_RDMA_Q_LIVE bit if reconnect fails (bsc#1083770).\n- nvme-rdma: fix concurrent reset and reconnect (bsc#1082979).\n- nvme: remove nvme_revalidate_ns (bsc#1079313).\n- ocfs2: return error when we attempt to access a dirty bh in jbd2 (bsc#1070404).\n- openrisc: fix issue handling 8 byte get_user calls (bnc#1012382).\n- openvswitch: fix the incorrect flow action alloc size (bnc#1012382).\n- ovl: fix failure to fsync lower dir (bnc#1012382).\n- ovs/geneve: fix rtnl notifications on iface deletion (bsc#1042286).\n- ovs/gre: fix rtnl notifications on iface deletion (bsc#1042286).\n- ovs/gre,geneve: fix error path when creating an iface (bsc#1042286).\n- ovs/vxlan: fix rtnl notifications on iface deletion (bsc#1042286).\n- packet: fix crash in fanout_demux_rollover() (bnc#1012382).\n- parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel (bnc#1012382).\n- parisc: Hide Diva-built-in serial aux and graphics card (bnc#1012382).\n- partially revert tipc improve link resiliency when rps is activated (bsc#1068038).\n- PCI/AER: Report non-fatal errors only to the affected endpoint (bnc#1012382).\n- pci/ASPM: Do not retrain link if ASPM not possible (bnc#1071892).\n- PCI: Avoid bus reset if bridge itself is broken (bnc#1012382).\n- PCI: Create SR-IOV virtfn/physfn links before attaching driver (bnc#1012382).\n- PCI: Detach driver before procfs \u0026 sysfs teardown on device remove (bnc#1012382).\n- pci: hv: Do not sleep in compose_msi_msg() (fate#315887, bsc#1082632).\n- pci: keystone: Fix interrupt-controller-node lookup (bnc#1012382).\n- pci/MSI: Fix msi_desc-\u003eaffinity memory leak when freeing MSI IRQs (bsc#1082979).\n- PCI/PME: Handle invalid data when reading Root Status (bnc#1012382).\n- PCI / PM: Force devices to D0 in pci_pm_thaw_noirq() (bnc#1012382).\n- perf bench numa: Fixup discontiguous/sparse numa nodes (bnc#1012382).\n- perf symbols: Fix symbols__fixup_end heuristic for corner cases (bnc#1012382).\n- perf test attr: Fix ignored test case result (bnc#1012382).\n- perf top: Fix window dimensions change handling (bnc#1012382).\n- perf/x86: Shut up false-positive -Wmaybe-uninitialized warning (bnc#1012382).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bnc#1012382).\n- pinctrl: adi2: Fix Kconfig build problem (bnc#1012382).\n- pinctrl: st: add irq_request/release_resources callbacks (bnc#1012382).\n- pinctrl: sunxi: Fix A80 interrupt pin bank (bnc#1012382).\n- pipe: avoid round_pipe_size() nr_pages overflow on 32-bit (bnc#1012382).\n- pktcdvd: Fix pkt_setup_dev() error path (bnc#1012382).\n- platform/x86: intel_mid_thermal: Fix suspend handlers unused warning (bnc#1012382).\n- pm / devfreq: Propagate error from devfreq_add_device() (bnc#1012382).\n- pm / wakeirq: Fix unbalanced IRQ enable for wakeirq (bsc#1031717).\n- posix-timer: Properly check sigevent-\u003esigev_notify (bnc#1012382).\n- power: bq27xxx_battery: mark some symbols __maybe_unused (bnc#1012382).\n- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075087).\n- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64: Fix flush_(d|i)cache_range() called from modules (FATE#315275 LTC#103998 bnc#1012382 bnc#863764).\n- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075087).\n- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032, bsc#1075087).\n- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075087).\n- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64s: Fix RFI flush dependency on HARDLOCKUP_DETECTOR (bnc#1012382).\n- powerpc/64s: Improve RFI L1-D cache flush fallback (bsc#1068032, bsc#1075087).\n- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075087).\n- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075087).\n- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).\n- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075087).\n- powerpc: Do not preempt_disable() in show_cpuinfo() (bsc#1066223).\n- powerpc/ipic: Fix status get and status clear (bnc#1012382).\n- powerpc/numa: Ensure nodes initialized for hotplug (FATE#322022, bsc#1081514).\n- powerpc/numa: Invalidate numa_cpu_lookup_table on cpu remove (bsc#1081512).\n- powerpc/numa: Use ibm,max-associativity-domains to discover possible nodes (FATE#322022, bsc#1081514).\n- powerpc/perf: Dereference BHRB entries safely (bsc#1066223).\n- powerpc/perf: Fix oops when grouping different pmu events (bnc#1012382).\n- powerpc/perf/hv-24x7: Fix incorrect comparison in memord (bnc#1012382).\n- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032, bsc#1075087).\n- powerpc/powernv/cpufreq: Fix the frequency read by /proc/cpuinfo (bnc#1012382).\n- powerpc/powernv: Fix MCE handler to avoid trashing CR0/CR1 registers (bsc#1066223).\n- powerpc/powernv/ioda2: Gracefully fail if too many TCE levels requested (bnc#1012382).\n- powerpc/powernv: Move IDLE_STATE_ENTER_SEQ macro to cpuidle.h (bsc#1066223).\n- powerpc/powernv: Support firmware disable of RFI flush (bsc#1068032, bsc#1075087).\n- powerpc/pseries: Fix cpu hotplug crash with memoryless nodes (FATE#322022, bsc#1081514).\n- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075087).\n- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075087).\n- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032, bsc#1075087).\n- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).\n- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).\n- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: prevent crash when changing flush type to fallback after system boot (bsc#1068032, bsc#1075087).\n- powerpc: Simplify module TOC handling (bnc#1012382).\n- power: reset: zx-reboot: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).\n- ppp: Destroy the mutex when cleanup (bnc#1012382).\n- pppoe: take -\u003eneeded_headroom of lower device into account on xmit (bnc#1012382).\n- profile: hide unused functions when !CONFIG_PROC_FS (bnc#1012382).\n- Provide a function to create a NUL-terminated string from unterminated data (bnc#1012382).\n- pwc: hide unused label (bnc#1012382).\n- qla2xxx: Add changes for devloss timeout in driver (bsc#1084427).\n- qla2xxx: Add FC-NVMe abort processing (bsc#1084427).\n- qla2xxx: asynchronous pci probing (bsc#1034503).\n- qla2xxx: Cleanup code to improve FC-NVMe error handling (bsc#1084427).\n- qla2xxx: Convert QLA_TGT_ABTS to TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1043726,FATE#324770).\n- qla2xxx: do not check login_state if no loop id is assigned (bsc#1081681).\n- qla2xxx: ensure async flags are reset correctly (bsc#1081681).\n- qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan (bsc#1084427).\n- qla2xxx: Fix FC-NVMe IO abort during driver reset (bsc#1084427).\n- qla2xxx: Fix incorrect tcm_qla2xxx_free_cmd use during TMR ABORT (v2) (bsc#1043726,FATE#324770).\n- qla2xxx: Fix n2n_ae flag to prevent dev_loss on PDB change (bsc#1084427).\n- qla2xxx: Fix NVMe entry_type for iocb packet on BE system (bsc#1043726,FATE#324770).\n- qla2xxx: Fix retry for PRLI RJT with reason of BUSY (bsc#1084427).\n- qla2xxx: Fixup locking for session deletion (bsc#1081681).\n- qla2xxx: Remove nvme_done_list (bsc#1084427).\n- qla2xxx: Remove unneeded message and minor cleanup for FC-NVMe (bsc#1084427).\n- qla2xxx: remove use of FC-specific error codes (bsc#1043726,FATE#324770).\n- qla2xxx: Restore ZIO threshold setting (bsc#1084427).\n- qla2xxx: Return busy if rport going away (bsc#1084427).\n- qla2xxx: Set IIDMA and fcport state before qla_nvme_register_remote() (bsc#1084427).\n- qla2xxx: Update driver version to 10.00.00.06-k (bsc#1084427).\n- qlcnic: fix deadlock bug (bnc#1012382).\n- r8152: fix the list rx_done may be used without initialization (bnc#1012382).\n- r8152: prevent the driver from transmitting packets with carrier off (bnc#1012382).\n- r8169: fix memory corruption on retrieval of hardware statistics (bnc#1012382).\n- r8169: fix RTL8168EP take too long to complete driver initialization (bnc#1012382).\n- raid5: Set R5_Expanded on parity devices as well as data (bnc#1012382).\n- ravb: Remove Rx overflow log messages (bnc#1012382).\n- rbd: set max_segments to USHRT_MAX (bnc#1012382).\n- RDMA/cma: Avoid triggering undefined behavior (bnc#1012382).\n- rdma/cma: Make sure that PSN is not over max allowed (bnc#1012382).\n- RDMA/i40iw: Remove MSS change support (bsc#1024376 FATE#321249).\n- rdma/uverbs: Protect from command mask overflow (bsc#1082979).\n- rds: Fix NULL pointer dereference in __rds_rdma_map (bnc#1012382).\n- RDS: Heap OOB write in rds_message_alloc_sgs() (bnc#1012382).\n- RDS: null pointer dereference in rds_atomic_free_op (bnc#1012382).\n- regulator: core: Rely on regulator_dev_release to free constraints (bsc#1074847).\n- regulator: da9063: Return an error code on probe failure (bsc#1074847).\n- regulator: pwm: Fix regulator ramp delay for continuous mode (bsc#1074847).\n- regulator: Try to resolve regulators supplies on registration (bsc#1074847).\n- reiserfs: avoid a -Wmaybe-uninitialized warning (bnc#1012382).\n- Revert \u0027Bluetooth: btusb: driver to enable the usb-wakeup feature\u0027 (bnc#1012382).\n- Revert \u0027Bluetooth: btusb: fix QCA Rome suspend/resume\u0027 (bnc#1012382).\n- Revert \u0027drm/armada: Fix compile fail\u0027 (bnc#1012382).\n- Revert \u0027Enable DEBUG_RFI\u0027\n- Revert \u0027kaiser: vmstat show NR_KAISERTABLE as nr_overhead\u0027 (kabi).\n- Revert \u0027lib/genalloc.c: make the avail variable an atomic_long_t\u0027 (kabi).\n- Revert \u0027module: Add retpoline tag to VERMAGIC\u0027 (bnc#1012382 kabi).\n- Revert \u0027module: Add retpoline tag to VERMAGIC\u0027 (kabi).\n- Revert \u0027net: replace dst_cache ip6_tunnel implementation with the generic one\u0027 (kabi bnc#1082897).\n- Revert \u0027ocfs2: should wait dio before inode lock in ocfs2_setattr()\u0027 (bnc#1012382).\n- Revert \u0027power: bq27xxx_battery: Remove unneeded dependency in Kconfig\u0027 (bnc#1012382).\n- Revert \u0027s390/kbuild: enable modversions for symbols exported from asm\u0027 (bnc#1012382).\n- Revert \u0027sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks\u0027 (kabi).\n- Revert \u0027scsi: libsas: align sata_device\u0027s rps_resp on a cacheline\u0027 (kabi).\n- Revert \u0027spi: SPI_FSL_DSPI should depend on HAS_DMA\u0027 (bnc#1012382).\n- Revert \u0027userfaultfd: selftest: vm: allow to build in vm/ directory\u0027 (bnc#1012382).\n- Revert \u0027x86/efi: Build our own page table structures\u0027 (bnc#1012382).\n- Revert \u0027x86/efi: Hoist page table switching code into efi_call_virt()\u0027 (bnc#1012382).\n- Revert \u0027x86/entry/64: Separate cpu_current_top_of_stack from TSS.sp0\u0027\n- Revert \u0027x86/entry/64: Use a per-CPU trampoline stack for IDT entries\u0027\n- Revert \u0027x86/mm/pat: Ensure cpa-\u003epfn only contains page frame numbers\u0027 (bnc#1012382).\n- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075087).\n- rfi-flush: Move the logic to avoid a redo into the debugfs code (bsc#1068032, bsc#1075087).\n- rfi-flush: Switch to new linear fallback flush (bsc#1068032, bsc#1075087).\n- rhashtable: add rhashtable_lookup_get_insert_key() (bsc#1042286).\n- ring-buffer: Mask out the info bits when returning buffer page length (bnc#1012382).\n- route: also update fnhe_genid when updating a route cache (bnc#1012382).\n- route: update fnhe_expires for redirect when the fnhe exists (bnc#1012382).\n- rtc: cmos: Initialize hpet timer before irq is registered (bsc#1077592).\n- rtc-opal: Fix handling of firmware error codes, prevent busy loops (bnc#1012382).\n- rtc: pcf8563: fix output clock rate (bnc#1012382).\n- rtc: pl031: make interrupt optional (bnc#1012382).\n- rtc: set the alarm to the next expiring timer (bnc#1012382).\n- rtlwifi: fix gcc-6 indentation warning (bnc#1012382).\n- rtlwifi: rtl8821ae: Fix connection lost problem correctly (bnc#1012382).\n- s390: add no-execute support (FATE#324087, LTC#158827).\n- s390: always save and restore all registers on context switch (bnc#1012382).\n- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847, LTC#163740).\n- s390/dasd: fix handling of internal requests (bsc#1080321).\n- s390/dasd: fix wrongly assigned configuration data (bnc#1012382).\n- s390/dasd: prevent prefix I/O error (bnc#1012382).\n- s390: fix compat system call table (bnc#1012382).\n- s390: fix handling of -1 in set{,fs}[gu]id16 syscalls (bnc#1012382).\n- s390: hypfs: Move diag implementation and data definitions (FATE#324070, LTC#158959).\n- s390: kvm: Cpu model support for msa6, msa7 and msa8 (FATE#324069, LTC#159031).\n- s390: Make cpc_name accessible (FATE#324070, LTC#158959).\n- s390: Make diag224 public (FATE#324070, LTC#158959).\n- s390/mem_detect: use unsigned longs (FATE#324071, LTC#158956).\n- s390/mm: align swapper_pg_dir to 16k (FATE#324087, LTC#158827).\n- s390/mm: always use PAGE_KERNEL when mapping pages (FATE#324087, LTC#158827).\n- s390/noexec: execute kexec datamover without DAT (FATE#324087, LTC#158827).\n- s390/oprofile: fix address range for asynchronous stack (bsc#1082979).\n- s390/pageattr: allow kernel page table splitting (FATE#324087, LTC#158827).\n- s390/pageattr: avoid unnecessary page table splitting (FATE#324087, LTC#158827).\n- s390/pageattr: handle numpages parameter correctly (FATE#324087, LTC#158827).\n- s390/pci_dma: improve lazy flush for unmap (bnc#1079886, LTC#163393).\n- s390/pci_dma: improve map_sg (bnc#1079886, LTC#163393).\n- s390/pci_dma: make lazy flush independent from the tlb_refresh bit (bnc#1079886, LTC#163393).\n- s390/pci_dma: remove dma address range check (bnc#1079886, LTC#163393).\n- s390/pci_dma: simplify dma address calculation (bnc#1079886, LTC#163393).\n- s390/pci_dma: split dma_update_trans (bnc#1079886, LTC#163393).\n- s390/pci: do not require AIS facility (bnc#1012382).\n- s390/pci: fix dma address calculation in map_sg (bnc#1079886, LTC#163393).\n- s390/pci: handle insufficient resources during dma tlb flush (bnc#1079886, LTC#163393).\n- s390/pgtable: introduce and use generic csp inline asm (FATE#324087, LTC#158827).\n- s390/pgtable: make pmd and pud helper functions available (FATE#324087, LTC#158827).\n- s390/qeth: fix underestimated count of buffer elements (bnc#1082089, LTC#164529).\n- s390/qeth: no ETH header for outbound AF_IUCV (LTC#156276 bnc#1012382 bnc#1053472).\n- s390: report new vector facilities (FATE#324088, LTC#158828).\n- s390/runtime instrumentation: simplify task exit handling (bnc#1012382).\n- s390/sclp: Add hmfai field (FATE#324071, LTC#158956).\n- s390/vmem: align segment and region tables to 16k (FATE#324087, LTC#158827).\n- s390/vmem: introduce and use SEGMENT_KERNEL and REGION3_KERNEL (FATE#324087, LTC#158827).\n- s390/vmem: simplify vmem code for read-only mappings (FATE#324087, LTC#158827).\n- sch_dsmark: fix invalid skb_cow() usage (bnc#1012382).\n- sched/deadline: Make sure the replenishment timer fires in the next period (bnc#1012382).\n- sched/deadline: Throttle a constrained deadline task activated after the deadline (bnc#1012382).\n- sched/deadline: Use deadline instead of period when calculating overflow (bnc#1012382).\n- sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks (bnc#1012382).\n- sched/deadline: Zero out positive runtime after throttling constrained tasks (git-fixes).\n- sched/rt: Up the root domain ref count when passing it around via IPIs (bnc#1012382).\n- sched/rt: Use container_of() to get root domain in rto_push_irq_work_func() (bnc#1012382).\n- scripts/kernel-doc: Do not fail with status != 0 if error encountered with -none (bnc#1012382).\n- scsi: aacraid: Fix hang in kdump (bsc#1022607, FATE#321673).\n- scsi: aacraid: Prevent crash in case of free interrupt during scsi EH path (bnc#1012382).\n- scsi: advansys: fix build warning for PCI=n (bnc#1012382).\n- scsi: advansys: fix uninitialized data access (bnc#1012382).\n- scsi: bfa: integer overflow in debugfs (bnc#1012382).\n- scsi: cxgb4i: fix Tx skb leak (bnc#1012382).\n- scsi: do not look for NULL devices handlers by name (bsc#1082373).\n- scsi: fas216: fix sense buffer initialization (bsc#1082979).\n- scsi: fdomain: drop fdomain_pci_tbl when built-in (bnc#1012382).\n- scsi: handle ABORTED_COMMAND on Fujitsu ETERNUS (bsc#1069138).\n- scsi: hisi_sas: directly attached disk LED feature for v2 hw (bsc#1083409).\n- scsi: hpsa: cleanup sas_phy structures in sysfs when unloading (bnc#1012382).\n- scsi: hpsa: destroy sas transport properties before scsi_host (bnc#1012382).\n- scsi: ibmvfc: fix misdefined reserved field in ibmvfc_fcp_rsp_info (bnc#1012382).\n- scsi: initio: remove duplicate module device table (bnc#1012382 bsc#1082979).\n- scsi: initio: remove duplicate module device table (bsc#1082979).\n- scsi: libsas: align sata_device\u0027s rps_resp on a cacheline (bnc#1012382).\n- scsi: libsas: fix error when getting phy events (bsc#1082979).\n- scsi: libsas: fix memory leak in sas_smp_get_phy_events() (bsc#1082979).\n- scsi: lpfc: Add WQ Full Logic for NVME Target (bsc#1080656).\n- scsi: lpfc: Allow set of maximum outstanding SCSI cmd limit for a target (bsc#1080656).\n- scsi: lpfc: Beef up stat counters for debug (bsc#1076693).\n- scsi: lpfc: correct debug counters for abort (bsc#1080656).\n- scsi: lpfc: do not dereference localport before it has been null checked (bsc#1076693).\n- scsi: lpfc: Do not return internal MBXERR_ERROR code from probe function (bsc#1082979).\n- scsi: lpfc: fix a couple of minor indentation issues (bsc#1076693).\n- scsi: lpfc: Fix -EOVERFLOW behavior for NVMET and defer_rcv (bsc#1076693).\n- scsi: lpfc: Fix header inclusion in lpfc_nvmet (bsc#1080656).\n- scsi: lpfc: Fix infinite wait when driver unregisters a remote NVME port (bsc#1076693).\n- scsi: lpfc: Fix IO failure during hba reset testing with nvme io (bsc#1080656).\n- scsi: lpfc: Fix issue_lip if link is disabled (bsc#1080656).\n- scsi: lpfc: Fix issues connecting with nvme initiator (bsc#1076693).\n- scsi: lpfc: Fix nonrecovery of NVME controller after cable swap (bsc#1080656).\n- scsi: lpfc: Fix PRLI handling when topology type changes (bsc#1080656).\n- scsi: lpfc: Fix receive PRLI handling (bsc#1076693).\n- scsi: lpfc: Fix RQ empty firmware trap (bsc#1080656).\n- scsi: lpfc: Fix SCSI io host reset causing kernel crash (bsc#1080656).\n- scsi: lpfc: Fix SCSI LUN discovery when SCSI and NVME enabled (bsc#1076693).\n- scsi: lpfc: Fix soft lockup in lpfc worker thread during LIP testing (bsc#1080656).\n- scsi: lpfc: Increase CQ and WQ sizes for SCSI (bsc#1080656).\n- scsi: lpfc: Increase SCSI CQ and WQ sizes (bsc#1076693).\n- scsi: lpfc: Indicate CONF support in NVMe PRLI (bsc#1080656).\n- scsi: lpfc: move placement of target destroy on driver detach (bsc#1080656).\n- scsi: lpfc: Treat SCSI Write operation Underruns as an error (bsc#1080656).\n- scsi: lpfc: Update 11.4.0.7 modified files for 2018 Copyright (bsc#1080656).\n- scsi: lpfc: update driver version to 11.4.0.6 (bsc#1076693).\n- scsi: lpfc: update driver version to 11.4.0.7 (bsc#1080656).\n- scsi: lpfc: Use after free in lpfc_rq_buf_free() (bsc#1037838).\n- scsi: lpfc: Validate adapter support for SRIU option (bsc#1080656).\n- scsi: mpt3sas: Fix IO error occurs on pulling out a drive from RAID1 volume created on two SATA drive (bnc#1012382).\n- scsi: mvumi: use __maybe_unused to hide pm functions (bnc#1012382).\n- scsi: qla2xxx: Ability to process multiple SGEs in Command SGL for CT passthrough commands (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Accelerate SCSI BUSY status generation in target mode (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Add ability to autodetect SFP type (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add ability to send PRLO (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add ability to use GPNFT/GNNFT for RSCN handling (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add ATIO-Q processing for INTx mode (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add boundary checks for exchanges to be offloaded (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add command completion for error path (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add debug knob for user control workload (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Add debug logging routine for qpair (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Added change to enable ZIO for FC-NVMe devices (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add FC-NVMe command handling (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add FC-NVMe F/W initialization and transport registration (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add FC-NVMe port discovery and PRLI handling (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add function call to qpair for door bell (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Add fw_started flags to qpair (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Add lock protection around host lookup (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add LR distance support from nvram bit (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: add missing includes for qla_isr (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add option for use reserve exch for ELS (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add ql2xiniexchg parameter (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Add retry limit for fabric scan logic (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add support for minimum link speed (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add switch command to simplify fabric discovery (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add timeout ability to wait_for_sess_deletion() (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Add XCB counters to debugfs (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Allow ABTS, PURX, RIDA on ATIOQ for ISP83XX/27XX (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Allow MBC_GET_PORT_DATABASE to query and save the port states (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Allow relogin and session creation after reset (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Allow SNS fabric login to be retried (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Allow target mode to accept PRLI in dual mode (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: avoid unused-function warning (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Change ha-\u003ewq max_active value to default (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Changes to support N2N logins (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Chip reset uses wrong lock during IO flush (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Cleanup FC-NVMe code (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Cleanup NPIV host in target mode during config teardown (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Clear fc4f_nvme flag (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Clear loop id after delete (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Combine Active command arrays (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Convert 32-bit LUN usage to 64-bit (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Defer processing of GS IOCB calls (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Delay loop id allocation at login (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Do not call abort handler function during chip reset (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Do not call dma_free_coherent with IRQ disabled (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: do not include \u003cgenerated/utsrelease.h\u003e (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Enable Async TMF processing (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Enable ATIO interrupt handshake for ISP27XX (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Enable Target Multi Queue (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Fix abort command deadlock due to spinlock (FATE#320146, bsc#966328).\n- scsi: qla2xxx: fix a bunch of typos and spelling mistakes (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix a locking imbalance in qlt_24xx_handle_els() (bsc#1082979).\n- scsi: qla2xxx: Fix compile warning (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Fix FC-NVMe LUN discovery (bsc#1083223).\n- scsi: qla2xxx: Fix Firmware dump size for Extended login and Exchange Offload (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix GPNFT/GNNFT error handling (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix gpnid error processing (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix incorrect handle for abort IOCB (bsc#1082979).\n- scsi: qla2xxx: Fix login state machine freeze (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix login state machine stuck at GPDB (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix logo flag for qlt_free_session_done() (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix mailbox failure while deleting Queue pairs (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Fix memory leak in dual/target mode (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix NPIV host cleanup in target mode (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix NPIV host enable after chip reset (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix NULL pointer access for fcport structure (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix NULL pointer crash due to active timer for ABTS (bsc#1082979).\n- scsi: qla2xxx: Fix NULL pointer crash due to probe failure (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix oops in qla2x00_probe_one error path (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix PRLI state check (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix queue ID for async abort with Multiqueue (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix recursion while sending terminate exchange (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix Relogin being triggered too fast (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix re-login for Nport Handle in use (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix remoteport disconnect for FC-NVMe (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix scan state field for fcport (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix session cleanup for N2N (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix slow mem alloc behind lock (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix smatch warning in qla25xx_delete_{rsp|req}_que (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: fix spelling mistake of variable sfp_additonal_info (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix system crash for Notify ack timeout handling (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix system crash in qlt_plogi_ack_unref (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix system crash while triggering FW dump (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix system panic due to pointer access problem (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix target multiqueue configuration (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix task mgmt handling for NPIV (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix warning during port_name debug print (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix warning for code intentation in __qla24xx_handle_gpdb_event() (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix warning in qla2x00_async_iocb_timeout() (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Fix WWPN/WWNN in debug message (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Handle PCIe error for driver (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Include Exchange offload/Extended Login into FW dump (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Increase ql2xmaxqdepth to 64 (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Increase verbosity of debug messages logged (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Migrate switch registration commands away from mailbox interface (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: move fields from qla_hw_data to qla_qpair (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Move function prototype to correct header (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Move logging default mask to execute once only (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Move session delete to driver work queue (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Move target stat counters from vha to qpair (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Move work element processing out of DPC thread (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Off by one in qlt_ctio_to_cmd() (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Preparation for Target MQ (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Prevent multiple active discovery commands per session (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Prevent relogin trigger from sending too many commands (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Prevent sp-\u003efree null/uninitialized pointer dereference (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Print correct mailbox registers in failed summary (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Properly extract ADISC error codes (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Protect access to qpair members with qpair-\u003eqp_lock (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Query FC4 type during RSCN processing (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Recheck session state after RSCN (bsc#1043726,FATE#324770)\n- scsi: qla2xxx: Reduce the use of terminate exchange (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Reduce trace noise for Async Events (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Reinstate module parameter ql2xenablemsix (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Relogin to target port on a cable swap (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Remove aborting ELS IOCB call issued as part of timeout (FATE#320146, bsc#966328).\n- scsi: qla2xxx: Remove an unused structure member (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Remove datasegs_per_cmd and datasegs_per_cont field (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Remove extra register read (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Remove extra register read (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Remove FC_NO_LOOP_ID for FCP and FC-NVMe Discovery (bsc#1084397).\n- scsi: qla2xxx: Remove potential macro parameter side-effect in ql_dump_regs() (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: remove redundant assignment of d (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: remove redundant null check on tgt (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Remove redundant wait when target is stopped (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Remove session creation redundant code (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Remove unused argument from qlt_schedule_sess_for_deletion() (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Remove unused irq_cmd_count field (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Remove unused tgt_enable_64bit_addr flag (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: remove writeq/readq function definitions (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Replace fcport alloc with qla2x00_alloc_fcport (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Replace GPDB with async ADISC command (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Reset the logo flag, after target re-login (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Retry switch command on time out (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Send FC4 type NVMe to the management server (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Serialize GPNID for multiple RSCN (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Serialize session deletion by using work_lock (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Serialize session free in qlt_free_session_done (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Simpify unregistration of FC-NVMe local/remote ports (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Skip IRQ affinity for Target QPairs (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Skip zero queue count entry during FW dump capture (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_init_base_qpair() (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Tweak resource count dump (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Update Driver version to 10.00.00.00-k (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Update driver version to 10.00.00.01-k (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Update driver version to 10.00.00.02-k (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Update driver version to 10.00.00.03-k (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Update driver version to 10.00.00.04-k (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Update driver version to 10.00.00.05-k (bsc#1081681).\n- scsi: qla2xxx: Update driver version to 9.01.00.00-k (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Update fw_started flags at qpair creation (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Use BIT_6 to acquire FAWWPN from switch (bsc#1043726,FATE#324770)\n- scsi: qla2xxx: Use chip reset to bring down laser on unload (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: use dma_mapping_error to check map errors (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Use FC-NVMe FC4 type for FDMI registration (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Use IOCB path to submit Control VP MBX command (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Use known NPort ID for Management Server login (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Use ql2xnvmeenable to enable Q-Pair for FC-NVMe (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: use shadow register for ISP27XX (bsc#1043725,FATE#324770).\n- scsi: qla2xxx: Use shadow register for ISP27XX (bsc#1043726,FATE#324770).\n- scsi: qla2xxx: Use sp-\u003efree instead of hard coded call (bsc#1043726,FATE#324770).\n- scsi: sd: change allow_restart to bool in sysfs interface (bnc#1012382).\n- scsi: sd: change manage_start_stop to bool in sysfs interface (bnc#1012382).\n- scsi: ses: do not get power status of SES device slot on probe (bsc#1082979).\n- scsi: sg: disable SET_FORCE_LOW_DMA (bnc#1012382).\n- scsi: sim710: fix build warning (bnc#1012382).\n- scsi: sr: wait for the medium to become ready (bsc#1048585).\n- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).\n- scsi: storvsc: Fix scsi_cmd error assignments in storvsc_handle_error (bnc#1012382).\n- scsi: storvsc: remove unnecessary channel inbound lock (fate#315887, bsc#1082632).\n- scsi: sun_esp: fix device reference leaks (bsc#1082979).\n- scsi: tcm_qla2xxx: Do not allow aborted cmd to advance (bsc#1043725,FATE#324770).\n- scsi: ufs: ufshcd: fix potential NULL pointer dereference in ufshcd_config_vreg (bnc#1012382).\n- sctp: do not allow the v4 socket to bind a v4mapped v6 address (bnc#1012382).\n- sctp: do not free asoc when it is already dead in sctp_sendmsg (bnc#1012382).\n- sctp: make use of pre-calculated len (bnc#1012382).\n- sctp: Replace use of sockets_allocated with specified macro (bnc#1012382).\n- sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf (bnc#1012382).\n- sctp: use the right sk after waking up from wait_buf sleep (bnc#1012382).\n- selftest/powerpc: Fix false failures for skipped tests (bnc#1012382).\n- selftests/x86: Add test_vsyscall (bnc#1012382).\n- selftests/x86/ldt_get: Add a few additional tests for limits (bnc#1012382).\n- selinux: ensure the context is NUL terminated in security_context_to_sid_core() (bnc#1012382).\n- selinux: general protection fault in sock_has_perm (bnc#1012382).\n- selinux: skip bounded transition processing if the policy isn\u0027t loaded (bnc#1012382).\n- serial: 8250_mid: fix broken DMA dependency (bnc#1012382).\n- serial: 8250_pci: Add Amazon PCI serial device ID (bnc#1012382).\n- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bnc#1012382).\n- serial: 8250_uniphier: fix error return code in uniphier_uart_probe() (bsc#1031717).\n- serial: imx: Only wakeup via RTSDEN bit if the system has RTS/CTS (bnc#1012382).\n- series.conf: disable qla2xxx patches (bsc#1043725)\n- series.conf: move core networking (including netfilter) into sorted section\n- series.conf: refresh Ran series_sort.py (no effect on expanded tree).\n- series.conf: whitespace cleanup\n- Set supported_modules_check 1 (bsc#1072163).\n- sfc: do not warn on successful change of MAC (bnc#1012382).\n- sget(): handle failures of register_shrinker() (bnc#1012382).\n- sh_eth: fix SH7757 GEther initialization (bnc#1012382).\n- sh_eth: fix TSU resource handling (bnc#1012382).\n- signal/openrisc: Fix do_unaligned_access to send the proper signal (bnc#1012382).\n- signal/sh: Ensure si_signo is initialized in do_divide_error (bnc#1012382).\n- sit: update frag_off info (bnc#1012382).\n- sock: free skb in skb_complete_tx_timestamp on error (bnc#1012382).\n- SolutionEngine771x: fix Ether platform data (bnc#1012382).\n- sparc64/mm: set fields in deferred pages (bnc#1012382).\n- spi: atmel: fixed spin_lock usage inside atmel_spi_remove (bnc#1012382).\n- spi: imx: do not access registers while clocks disabled (bnc#1012382).\n- spi_ks8995: fix \u0027BUG: key accdaa28 not in .data!\u0027 (bnc#1012382).\n- spi: sh-msiof: Fix DMA transfer size check (bnc#1012382).\n- spi: sun4i: disable clocks in the remove function (bnc#1012382).\n- spi: xilinx: Detect stall with Unknown commands (bnc#1012382).\n- ssb: mark ssb_bus_register as __maybe_unused (bnc#1012382).\n- staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl (bnc#1012382).\n- staging: android: ashmem: Fix a race condition in pin ioctls (bnc#1012382).\n- staging: iio: adc: ad7192: fix external frequency setting (bnc#1012382).\n- staging: rtl8188eu: Fix incorrect response to SIOCGIWESSID (bnc#1012382).\n- staging: ste_rmi4: avoid unused function warnings (bnc#1012382).\n- staging: unisys: visorinput depends on INPUT (bnc#1012382).\n- staging: wilc1000: fix kbuild test robot error (bnc#1012382).\n- sunrpc: Allow connect to return EHOSTUNREACH (bnc#1012382).\n- sunrpc: Fix rpc_task_begin trace point (bnc#1012382).\n- sunxi-rsb: Include OF based modalias in device uevent (bnc#1012382).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- sysrq : fix Show Regs call trace on ARM (bnc#1012382).\n- target: Add support for TMR percpu reference counting (bsc#1043726,FATE#324770).\n- target: Add TARGET_SCF_LOOKUP_LUN_FROM_TAG support for ABORT_TASK (bsc#1043726,FATE#324770).\n- target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK (bnc#1012382).\n- target/file: Do not return error for UNMAP if length is zero (bnc#1012382).\n- target: fix ALUA transition timeout handling (bnc#1012382).\n- target:fix condition return in core_pr_dump_initiator_port() (bnc#1012382).\n- target: fix race during implicit transition work flushes (bnc#1012382).\n- target/iscsi: Fix a race condition in iscsit_add_reject_from_cmd() (bnc#1012382).\n- target: Use system workqueue for ALUA transitions (bnc#1012382).\n- tc1100-wmi: fix build warning when CONFIG_PM not enabled (bnc#1012382).\n- tc358743: fix register i2c_rd/wr function fix (git-fixes).\n- tc358743: fix register i2c_rd/wr functions (bnc#1012382).\n- tcp: correct memory barrier usage in tcp_check_space() (bnc#1012382).\n- tcp: do not set rtt_min to 1 (bsc#1042286).\n- tcp: fix under-evaluated ssthresh in TCP Vegas (bnc#1012382).\n- tcp md5sig: Use skb\u0027s saddr when replying to an incoming segment (bnc#1012382).\n- tcp: release sk_frag.page in tcp_disconnect (bnc#1012382).\n- tcp: __tcp_hdrlen() helper (bnc#1012382).\n- test_bpf: fix the dummy skb after dissector changes (bsc#1042286).\n- tg3: Add workaround to restrict 5762 MRRS to 2048 (bnc#1012382).\n- tg3: Enable PHY reset in MTU change path for 5720 (bnc#1012382).\n- tg3: Fix rx hang on MTU change with 5717/5719 (bnc#1012382).\n- thermal/drivers/step_wise: Fix temperature regulation misbehavior (bnc#1012382).\n- thermal: fix INTEL_SOC_DTS_IOSF_CORE dependencies (bnc#1012382).\n- thermal: hisilicon: Handle return value of clk_prepare_enable (bnc#1012382).\n- thermal: spear: use __maybe_unused for PM functions (bnc#1012382).\n- tipc: fix cleanup at module unload (bnc#1012382).\n- tipc: fix memory leak in tipc_accept_from_sock() (bnc#1012382).\n- tipc: improve link resiliency when rps is activated (bsc#1068038).\n- tlan: avoid unused label with PCI=n (bnc#1012382).\n- tools build: Add tools tree support for \u0027make -s\u0027 (bnc#1012382).\n- tpm-dev-common: Reject too short writes (bsc#1020645, git-fixes).\n- tpm: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).\n- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).\n- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).\n- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).\n- tpm_tis: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).\n- tracing: Allocate mask_str buffer dynamically (bnc#1012382).\n- tracing: Fix converting enum\u0027s from the map in trace_event_eval_update() (bnc#1012382).\n- tracing: Fix crash when it fails to alloc ring buffer (bnc#1012382).\n- tracing: Fix possible double free on failure of allocating trace buffer (bnc#1012382).\n- tracing: Remove extra zeroing out of the ring buffer page (bnc#1012382).\n- tty: cyclades: cyz_interrupt is only used for PCI (bnc#1012382).\n- tty fix oops when rmmod 8250 (bnc#1012382).\n- tty: hvc_xen: hide xen_console_remove when unused (bnc#1012382).\n- tty: mxser: Remove ASYNC_CLOSING (bnc#1072363).\n- uas: Always apply US_FL_NO_ATA_1X quirk to Seagate devices (bnc#1012382).\n- uas: ignore UAS for Norelsys NS1068(X) chips (bnc#1012382).\n- ubi: block: Fix locking for idr_alloc/idr_remove (bnc#1012382).\n- udf: Avoid overflow when session starts at large offset (bnc#1012382).\n- udp: restore UDPlite many-cast delivery (bsc#1042286).\n- um: link vmlinux with -no-pie (bnc#1012382).\n- usb: Add device quirk for Logitech HD Pro Webcam C925e (bnc#1012382).\n- usb: add RESET_RESUME for ELSA MicroLink 56K (bnc#1012382).\n- usb: build drivers/usb/common/ when USB_SUPPORT is set (bnc#1012382).\n- usb: cdc-acm: Do not log urb submission errors on disconnect (bnc#1012382).\n- usb: cdc_subset: only build when one driver is enabled (bnc#1012382).\n- USB: core: Add type-specific length check of BOS descriptors (bnc#1012382).\n- USB: core: prevent malicious bNumInterfaces overflow (bnc#1012382).\n- USB: devio: Prevent integer overflow in proc_do_submiturb() (bnc#1012382).\n- usb: dwc3: gadget: Set maxpacket size for ep0 IN (bnc#1012382).\n- usb: f_fs: Prevent gadget unbind if it is already unbound (bnc#1012382).\n- USB: Fix off by one in type-specific length check of BOS SSP capability (git-fixes).\n- USB: fix usbmon BUG trigger (bnc#1012382).\n- usb: gadget: configs: plug memory leak (bnc#1012382).\n- usb: gadget: do not dereference g until after it has been null checked (bnc#1012382).\n- usb: gadget: ffs: Forbid usb_ep_alloc_request from sleeping (bnc#1012382).\n- usb: gadget: f_fs: Process all descriptors during bind (bnc#1012382).\n- USB: gadgetfs: Fix a potential memory leak in \u0027dev_config()\u0027 (bnc#1012382).\n- usb: gadget: f_uvc: Sanity check wMaxPacketSize for SuperSpeed (bnc#1012382).\n- usb: gadget: udc: remove pointer dereference after free (bnc#1012382).\n- usb: gadget: uvc: Missing files for configfs interface (bnc#1012382).\n- usb: hub: Cycle HUB power when initialization fails (bnc#1012382).\n- USB: Increase usbfs transfer limit (bnc#1012382).\n- usbip: fix 3eee23c3ec14 tcp_socket address still in the status file (bnc#1012382).\n- usbip: Fix implicit fallthrough warning (bnc#1012382).\n- usbip: Fix potential format overflow in userspace tools (bnc#1012382).\n- usbip: fix stub_rx: get_pipe() to validate endpoint number (bnc#1012382).\n- usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input (bnc#1012382).\n- usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer (bnc#1012382).\n- usbip: fix usbip bind writing random string after command in match_busid (bnc#1012382).\n- usbip: keep usbip_device sockfd state in sync with tcp_socket (bnc#1012382).\n- usbip: list: do not list devices attached to vhci_hcd (bnc#1012382).\n- usbip: prevent bind loops on devices attached to vhci_hcd (bnc#1012382).\n- usbip: prevent leaking socket pointer address in messages (bnc#1012382).\n- usbip: prevent vhci_hcd driver from leaking a socket pointer address (bnc#1012382).\n- usbip: remove kernel addresses from usb device and urb debug msgs (bnc#1012382).\n- usbip: stub: stop printing kernel pointer addresses in messages (bnc#1012382).\n- usbip: vhci_hcd: clear just the USB_PORT_STAT_POWER bit (bnc#1012382).\n- usbip: vhci: stop printing kernel pointer addresses in messages (bnc#1012382).\n- usb: ldusb: add PIDs for new CASSY devices supported by this driver (bnc#1012382).\n- usb: misc: usb3503: make sure reset is low for at least 100us (bnc#1012382).\n- usb: musb: da8xx: fix babble condition handling (bnc#1012382).\n- usb: musb/ux500: remove duplicate check for dma_is_compatible (bnc#1012382).\n- usb: ohci: Proper handling of ed_rm_list to handle race condition between usb_kill_urb() and finish_unlinks() (bnc#1012382).\n- usb: option: Add support for FS040U modem (bnc#1012382).\n- usb: phy: isp1301: Add OF device ID table (bnc#1012382).\n- usb: phy: isp1301: Fix build warning when CONFIG_OF is disabled (git-fixes).\n- usb: phy: msm add regulator dependency (bnc#1012382).\n- usb: phy: tahvo: fix error handling in tahvo_usb_probe() (bnc#1012382).\n- usb: quirks: Add no-lpm quirk for KY-688 USB 3.1 Type-C Hub (bnc#1012382).\n- usb: renesas_usbhs: missed the \u0027running\u0027 flag in usb_dmac with rx path (bnc#1012382).\n- USB: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ (bnc#1012382).\n- USB: serial: cp210x: add new device ID ELV ALC 8xxx (bnc#1012382).\n- USB: serial: ftdi_sio: add id for Airbus DS P8GR (bnc#1012382).\n- usb: serial: io_edgeport: fix possible sleep-in-atomic (bnc#1012382).\n- USB: serial: option: adding support for YUGA CLM920-NC5 (bnc#1012382).\n- USB: serial: option: add Quectel BG96 id (bnc#1012382).\n- USB: serial: option: add support for Telit ME910 PID 0x1101 (bnc#1012382).\n- usb: serial: pl2303: new device id for Chilitag (bnc#1012382).\n- USB: serial: qcserial: add Sierra Wireless EM7565 (bnc#1012382).\n- usb: serial: simple: add Motorola Tetra driver (bnc#1012382).\n- USB: uas and storage: Add US_FL_BROKEN_FUA for another JMicron JMS567 ID (bnc#1012382).\n- usb: uas: unconditionally bring back host after reset (bnc#1012382).\n- USB: usbfs: Filter flags passed in from user space (bnc#1012382).\n- usb: usbip: Fix possible deadlocks reported by lockdep (bnc#1012382).\n- usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 (bnc#1012382).\n- usb: xhci: fix panic in xhci_free_virt_devices_depth_first (bnc#1012382).\n- userfaultfd: selftest: vm: allow to build in vm/ directory (bnc#1012382).\n- userfaultfd: shmem: __do_fault requires VM_FAULT_NOPAGE (bnc#1012382).\n- v4l: remove MEDIA_TUNER dependency for VIDEO_TUNER (bnc#1012382).\n- vb2: V4L2_BUF_FLAG_DONE is set after DQBUF (bnc#1012382).\n- vfs: do not do RCU lookup of empty pathnames (bnc#1012382).\n- vhost_net: stop device during reset owner (bnc#1012382).\n- video: fbdev: atmel_lcdfb: fix display-timings lookup (bnc#1012382).\n- video: fbdev: au1200fb: Release some resources if a memory allocation fails (bnc#1012382).\n- video: fbdev: au1200fb: Return an error code if a memory allocation fails (bnc#1012382).\n- video: fbdev/mmp: add MODULE_LICENSE (bnc#1012382).\n- video: fbdev: sis: remove unused variable (bnc#1012382).\n- video: fbdev: via: remove possibly unused variables (bnc#1012382).\n- video: Use bool instead int pointer for get_opt_bool() argument (bnc#1012382).\n- virtio_balloon: prevent uninitialized variable use (bnc#1012382).\n- virtio: release virtio index when fail to device_register (bnc#1012382).\n- vmbus: add per-channel sysfs info (fate#315887, bsc#1082632).\n- vmbus: add prefetch to ring buffer iterator (fate#315887, bsc#1082632).\n- vmbus: do not acquire the mutex in vmbus_hvsock_device_unregister() (fate#315887, bsc#1082632).\n- vmbus: drop unused ring_buffer_info elements (fate#315887, bsc#1082632).\n- vmbus: eliminate duplicate cached index (fate#315887, bsc#1082632).\n- vmbus: hvsock: add proper sync for vmbus_hvsock_device_unregister() (fate#315887, bsc#1082632).\n- vmbus: initialize reserved fields in messages (fate#315887, bsc#1082632).\n- vmbus: make channel_message table constant (fate#315887, bsc#1082632).\n- vmbus: more host signalling avoidance (fate#315887, bsc#1082632).\n- vmbus: refactor hv_signal_on_read (fate#315887, bsc#1082632).\n- vmbus: remove unused vmbus_sendpacket_ctl (fate#315887, bsc#1082632).\n- vmbus: remove unused vmbus_sendpacket_multipagebuffer (fate#315887, bsc#1082632).\n- vmbus: remove unused vmubs_sendpacket_pagebuffer_ctl (fate#315887, bsc#1082632).\n- vmbus: Reuse uuid_le_to_bin() helper (fate#315887, bsc#1082632).\n- vmbus: simplify hv_ringbuffer_read (fate#315887, bsc#1082632).\n- vmbus: unregister device_obj-\u003echannels_kset (fate#315887, bsc#1082632).\n- vmxnet3: prevent building with 64K pages (bnc#1012382).\n- vmxnet3: repair memory leak (bnc#1012382).\n- vsyscall: Fix permissions for emulate mode with KAISER/PTI (bnc#1012382).\n- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend (bnc#1012382).\n- vti6: Do not report path MTU below IPV6_MIN_MTU (bnc#1012382).\n- vti6: fix device register to report IFLA_INFO_KIND (bnc#1012382).\n- vxlan: consolidate csum flag handling (bsc#1042286).\n- vxlan: consolidate output route calculation (bsc#1042286).\n- vxlan: consolidate vxlan_xmit_skb and vxlan6_xmit_skb (bsc#1042286).\n- vxlan: do not allow overwrite of config src addr (bsc#1042286).\n- watchdog: imx2_wdt: restore previous timeout after suspend+resume (bnc#1012382).\n- wireless: cw1200: use __maybe_unused to hide pm functions_ (bnc#1012382).\n- workqueue: trigger WARN if queue_delayed_work() is called with NULL @wq (bnc#1012382).\n- writeback: fix memory leak in wb_queue_work() (bnc#1012382).\n- X.509: fix buffer overflow detection in sprint_oid() (bsc#1075078).\n- X.509: reject invalid BIT STRING for subjectPublicKey (bnc#1012382).\n- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).\n- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).\n- x86: add MULTIUSER dependency for KVM (bnc#1012382).\n- x86/alternatives: Add missing \u0027\\n\u0027 at end of ALTERNATIVE inline asm (bnc#1012382).\n- x86/alternatives: Fix optimize_nops() checking (bnc#1012382).\n- x86/apic/vector: Fix off by one in error path (bnc#1012382).\n- x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels (bnc#1012382).\n- x86/asm: Fix inline asm call constraints for GCC 4.4 (bnc#1012382).\n- x86/boot: Avoid warning for zero-filling .bss (bnc#1012382).\n- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).\n- x86: bpf_jit: small optimization in emit_bpf_tail_call() (bnc#1012382).\n- x86/bugs: Drop one \u0027mitigation\u0027 from dmesg (bnc#1012382).\n- x86/build: Silence the build with \u0027make -s\u0027 (bnc#1012382).\n- x86/cpu/bugs: Make retpoline module warning conditional (bnc#1012382).\n- x86/cpu: Change type of x86_cache_size variable to unsigned int (bnc#1012382).\n- x86/cpu: Factor out application of forced CPU caps (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).\n- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/cpu: Merge bugs.c and bugs_64.c (bnc#1012382).\n- x86/cpu: Rename Merrifield2 to Moorefield (bsc#985025).\n- x86/cpu: Rename \u0027WESTMERE2\u0027 family to \u0027NEHALEM_G\u0027 (bsc#985025).\n- x86/cpu, x86/pti: Do not enable PTI on AMD processors (bnc#1012382).\n- x86/Documentation: Add PTI description (bnc#1012382).\n- x86/efi: Build our own page table structures (fate#320512).\n- x86/efi: Hoist page table switching code into efi_call_virt() (fate#320512).\n- x86/entry/64: Separate cpu_current_top_of_stack from TSS.sp0 (bsc#1077560).\n- x86/entry/64: Use a per-CPU trampoline stack for IDT entries (bsc#1077560).\n- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt() (bnc#1012382).\n- x86: fix build warnign with 32-bit PAE (bnc#1012382).\n- x86/fpu/math-emu: Fix possible uninitialized variable use (bnc#1012382).\n- x86/hpet: Prevent might sleep splat on resume (bnc#1012382).\n- x86/hyperv: Implement hv_get_tsc_page() (fate#315887, bsc#1082632).\n- x86/hyper-v: include hyperv/ only when CONFIG_HYPERV is set (fate#315887, bsc#1082632).\n- x86/hyper-v: Introduce fast hypercall implementation (fate#315887, bsc#1082632).\n- x86/hyper-v: Make hv_do_hypercall() inline (fate#315887, bsc#1082632).\n- x86/hyperv: Move TSC reading method to asm/mshyperv.h (fate#315887, bsc#1082632).\n- x86/kaiser: fix build error with KASAN \u0026\u0026 !FUNCTION_GRAPH_TRACER (bnc#1012382).\n- x86/kasan: Clear kasan_zero_page after TLB flush (bnc#1012382).\n- x86/kasan: Write protect kasan zero shadow (bnc#1012382).\n- x86/kvm/vmx: do not use vm-exit instruction length for fast MMIO when running nested (bsc#1081431).\n- x86/mce: Pin the timer when modifying (bsc#1080851,1076282).\n- x86/microcode/AMD: Change load_microcode_amd()\u0027s param to bool to fix preemptibility bug (bnc#1012382).\n- x86/microcode/AMD: Do not load when running on a hypervisor (bnc#1012382).\n- x86/microcode/AMD: Do not load when running on a hypervisor (bsc#1081436 bsc#1081437).\n- x86/microcode: Do the family check first (bnc#1012382).\n- x86/microcode: Do the family check first (bsc#1081436 bsc#1081437).\n- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bnc#1012382).\n- x86/microcode/intel: Extend BDW late-loading with a revision check (bnc#1012382).\n- x86/microcode/intel: Fix BDW late-loading revision check (bnc#1012382).\n- x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier (git-fixes).\n- x86/mm: Disable PCID on 32-bit kernels (bnc#1012382).\n- x86/mm/kmmio: Fix mmiotrace for page unaligned addresses (bnc#1012382).\n- x86/mm/pat: Ensure cpa-\u003epfn only contains page frame numbers (fate#320588).\n- x86/mm/pkeys: Fix fill_sig_info_pkey (fate#321300).\n- x86/nospec: Fix header guards names (bnc#1012382).\n- x86/oprofile: Fix bogus GCC-8 warning in nmi_setup() (bnc#1012382).\n- x86/paravirt: Remove \u0027noreplace-paravirt\u0027 cmdline option (bnc#1012382).\n- x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bnc#1012382).\n- x86/platform: Add PCI dependency for PUNIT_ATOM_DEBUG (bnc#1012382).\n- x86/platform/olpc: Fix resume handler build warning (bnc#1012382).\n- x86/pti: Document fix wrong index (bnc#1012382).\n- x86/pti/efi: broken conversion from efi to kernel page table (bnc#1012382).\n- x86/pti: Make unpoison of pgd for trusted boot work for real (bnc#1012382).\n- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).\n- x86/ras/inject: Make it depend on X86_LOCAL_APIC=y (bnc#1012382).\n- x86/retpoline: Avoid retpolines for built-in __init functions (bnc#1012382).\n- x86/retpoline/hyperv: Convert assembler indirect jumps (fate#315887, bsc#1082632).\n- x86/retpoline: Remove the esp/rsp thunk (bnc#1012382).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/smpboot: Remove stale TLB flush invocations (bnc#1012382).\n- x86/spectre: Check CONFIG_RETPOLINE in command line parser (bnc#1012382).\n- x86/spectre: Fix an error message (git-fixes).\n- x86/spectre: Fix spelling mistake: \u0027vunerable\u0027-\u003e \u0027vulnerable\u0027 (bnc#1012382).\n- x86/spectre: Remove the out-of-tree RSB stuffing\n- x86/spectre: Simplify spectre_v2 command line parsing (bnc#1012382).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL (bnc#1012382).\n- x86/tlb: Drop the _GPL from the cpu_tlbstate export (bnc#1012382).\n- x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly() (bnc#1012382).\n- x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend (bnc#1065600).\n- xen: Fix trampoline stack loading issue on XEN PV.\n- xen/gntdev: Fix off-by-one error when unmapping with holes (bnc#1012382).\n- xen/gntdev: Fix partial gntdev_mmap() cleanup (bnc#1012382).\n- xen-netfront: avoid crashing on resume after a failure in talk_to_netback() (bnc#1012382).\n- xen-netfront: enable device after manual module load (bnc#1012382).\n- xen-netfront: Improve error handling during initialization (bnc#1012382).\n- xen-netfront: remove warning when unloading module (bnc#1012382).\n- xen: XEN_ACPI_PROCESSOR is Dom0-only (bnc#1012382).\n- xfrm: check id proto in validate_tmpl() (bnc#1012382).\n- xfrm: Copy policy family in clone_policy (bnc#1012382).\n- xfrm: Fix stack-out-of-bounds read on socket policy lookup (bnc#1012382).\n- xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies (bnc#1012382).\n- xfrm_user: propagate sec ctx allocation errors (bsc#1042286).\n- xfs: add configurable error support to metadata buffers (bsc#1068569).\n- xfs: add configuration handlers for specific errors (bsc#1068569).\n- xfs: add configuration of error failure speed (bsc#1068569).\n- xfs: add \u0027fail at unmount\u0027 error handling configuration (bsc#1068569).\n- xfs: Add infrastructure needed for error propagation during buffer IO failure (bsc#1068569).\n- xfs: address kabi for xfs buffer retry infrastructure (kabi).\n- xfs: configurable error behavior via sysfs (bsc#1068569).\n- xfs: do not chain ioends during writepage submission (bsc#1077285 bsc#1043441).\n- xfs: factor mapping out of xfs_do_writepage (bsc#1077285 bsc#1043441).\n- xfs: fix incorrect extent state in xfs_bmap_add_extent_unwritten_real (bnc#1012382).\n- xfs: fix log block underflow during recovery cycle verification (bnc#1012382).\n- xfs: fix up inode32/64 (re)mount handling (bsc#1069160).\n- xfs: introduce metadata IO error class (bsc#1068569).\n- xfs: introduce table-based init for error behaviors (bsc#1068569).\n- xfs: Introduce writeback context for writepages (bsc#1077285 bsc#1043441).\n- xfs: ioends require logically contiguous file offsets (bsc#1077285 bsc#1043441).\n- xfs: Properly retry failed inode items in case of error during buffer writeback (bsc#1068569).\n- xfs: quota: check result of register_shrinker() (bnc#1012382).\n- xfs: quota: fix missed destroy of qi_tree_lock (bnc#1012382).\n- xfs: reinit btree pointer on attr tree inactivation walk (bsc#1078787).\n- xfs: remove nonblocking mode from xfs_vm_writepage (bsc#1077285 bsc#1043441).\n- xfs: remove xfs_cancel_ioend (bsc#1077285 bsc#1043441).\n- xfs: remove xfs_trans_ail_delete_bulk (bsc#1068569).\n- xfs: stop searching for free slots in an inode chunk when there are none (bsc#1072739).\n- xfs: toggle readonly state around xfs_log_mount_finish (bsc#1073401).\n- xfs: ubsan fixes (bnc#1012382).\n- xfs: validate sb_logsunit is a multiple of the fs blocksize (bsc#1077513).\n- xfs: write unmount record for ro mounts (bsc#1073401).\n- xfs: xfs_cluster_write is redundant (bsc#1077285 bsc#1043441).\n- xhci: Do not add a virt_dev to the devs array before it\u0027s fully allocated (bnc#1012382).\n- xhci: Fix ring leak in failure path of xhci_alloc_virt_device() (bnc#1012382).\n- xhci: plat: Register shutdown for xhci_plat (bnc#1012382).\n- xtensa: fix futex_atomic_cmpxchg_inatomic (bnc#1012382).\n- zram: fix operator precedence to get offset (bsc#1082979).\n- zram: set physical queue limits to avoid array out of bounds accesses (bnc#1012382).\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-RT-12-SP3-2018-663",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0986-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0986-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180986-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0986-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003902.html"
},
{
"category": "self",
"summary": "SUSE Bug 1006867",
"url": "https://bugzilla.suse.com/1006867"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1015342",
"url": "https://bugzilla.suse.com/1015342"
},
{
"category": "self",
"summary": "SUSE Bug 1015343",
"url": "https://bugzilla.suse.com/1015343"
},
{
"category": "self",
"summary": "SUSE Bug 1019784",
"url": "https://bugzilla.suse.com/1019784"
},
{
"category": "self",
"summary": "SUSE Bug 1020645",
"url": "https://bugzilla.suse.com/1020645"
},
{
"category": "self",
"summary": "SUSE Bug 1022595",
"url": "https://bugzilla.suse.com/1022595"
},
{
"category": "self",
"summary": "SUSE Bug 1022607",
"url": "https://bugzilla.suse.com/1022607"
},
{
"category": "self",
"summary": "SUSE Bug 1022912",
"url": "https://bugzilla.suse.com/1022912"
},
{
"category": "self",
"summary": "SUSE Bug 1024296",
"url": "https://bugzilla.suse.com/1024296"
},
{
"category": "self",
"summary": "SUSE Bug 1024376",
"url": "https://bugzilla.suse.com/1024376"
},
{
"category": "self",
"summary": "SUSE Bug 1027054",
"url": "https://bugzilla.suse.com/1027054"
},
{
"category": "self",
"summary": "SUSE Bug 1031492",
"url": "https://bugzilla.suse.com/1031492"
},
{
"category": "self",
"summary": "SUSE Bug 1031717",
"url": "https://bugzilla.suse.com/1031717"
},
{
"category": "self",
"summary": "SUSE Bug 1033587",
"url": "https://bugzilla.suse.com/1033587"
},
{
"category": "self",
"summary": "SUSE Bug 1034503",
"url": "https://bugzilla.suse.com/1034503"
},
{
"category": "self",
"summary": "SUSE Bug 1037838",
"url": "https://bugzilla.suse.com/1037838"
},
{
"category": "self",
"summary": "SUSE Bug 1038078",
"url": "https://bugzilla.suse.com/1038078"
},
{
"category": "self",
"summary": "SUSE Bug 1038085",
"url": "https://bugzilla.suse.com/1038085"
},
{
"category": "self",
"summary": "SUSE Bug 1040182",
"url": "https://bugzilla.suse.com/1040182"
},
{
"category": "self",
"summary": "SUSE Bug 1042286",
"url": "https://bugzilla.suse.com/1042286"
},
{
"category": "self",
"summary": "SUSE Bug 1043441",
"url": "https://bugzilla.suse.com/1043441"
},
{
"category": "self",
"summary": "SUSE Bug 1043652",
"url": "https://bugzilla.suse.com/1043652"
},
{
"category": "self",
"summary": "SUSE Bug 1043725",
"url": "https://bugzilla.suse.com/1043725"
},
{
"category": "self",
"summary": "SUSE Bug 1043726",
"url": "https://bugzilla.suse.com/1043726"
},
{
"category": "self",
"summary": "SUSE Bug 1048325",
"url": "https://bugzilla.suse.com/1048325"
},
{
"category": "self",
"summary": "SUSE Bug 1048585",
"url": "https://bugzilla.suse.com/1048585"
},
{
"category": "self",
"summary": "SUSE Bug 1053472",
"url": "https://bugzilla.suse.com/1053472"
},
{
"category": "self",
"summary": "SUSE Bug 1060279",
"url": "https://bugzilla.suse.com/1060279"
},
{
"category": "self",
"summary": "SUSE Bug 1062129",
"url": "https://bugzilla.suse.com/1062129"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065615",
"url": "https://bugzilla.suse.com/1065615"
},
{
"category": "self",
"summary": "SUSE Bug 1066163",
"url": "https://bugzilla.suse.com/1066163"
},
{
"category": "self",
"summary": "SUSE Bug 1066223",
"url": "https://bugzilla.suse.com/1066223"
},
{
"category": "self",
"summary": "SUSE Bug 1067118",
"url": "https://bugzilla.suse.com/1067118"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068038",
"url": "https://bugzilla.suse.com/1068038"
},
{
"category": "self",
"summary": "SUSE Bug 1068569",
"url": "https://bugzilla.suse.com/1068569"
},
{
"category": "self",
"summary": "SUSE Bug 1068984",
"url": "https://bugzilla.suse.com/1068984"
},
{
"category": "self",
"summary": "SUSE Bug 1069135",
"url": "https://bugzilla.suse.com/1069135"
},
{
"category": "self",
"summary": "SUSE Bug 1069138",
"url": "https://bugzilla.suse.com/1069138"
},
{
"category": "self",
"summary": "SUSE Bug 1069160",
"url": "https://bugzilla.suse.com/1069160"
},
{
"category": "self",
"summary": "SUSE Bug 1070052",
"url": "https://bugzilla.suse.com/1070052"
},
{
"category": "self",
"summary": "SUSE Bug 1070404",
"url": "https://bugzilla.suse.com/1070404"
},
{
"category": "self",
"summary": "SUSE Bug 1070799",
"url": "https://bugzilla.suse.com/1070799"
},
{
"category": "self",
"summary": "SUSE Bug 1071306",
"url": "https://bugzilla.suse.com/1071306"
},
{
"category": "self",
"summary": "SUSE Bug 1071892",
"url": "https://bugzilla.suse.com/1071892"
},
{
"category": "self",
"summary": "SUSE Bug 1072163",
"url": "https://bugzilla.suse.com/1072163"
},
{
"category": "self",
"summary": "SUSE Bug 1072363",
"url": "https://bugzilla.suse.com/1072363"
},
{
"category": "self",
"summary": "SUSE Bug 1072484",
"url": "https://bugzilla.suse.com/1072484"
},
{
"category": "self",
"summary": "SUSE Bug 1072689",
"url": "https://bugzilla.suse.com/1072689"
},
{
"category": "self",
"summary": "SUSE Bug 1072739",
"url": "https://bugzilla.suse.com/1072739"
},
{
"category": "self",
"summary": "SUSE Bug 1072865",
"url": "https://bugzilla.suse.com/1072865"
},
{
"category": "self",
"summary": "SUSE Bug 1073229",
"url": "https://bugzilla.suse.com/1073229"
},
{
"category": "self",
"summary": "SUSE Bug 1073401",
"url": "https://bugzilla.suse.com/1073401"
},
{
"category": "self",
"summary": "SUSE Bug 1073407",
"url": "https://bugzilla.suse.com/1073407"
},
{
"category": "self",
"summary": "SUSE Bug 1073928",
"url": "https://bugzilla.suse.com/1073928"
},
{
"category": "self",
"summary": "SUSE Bug 1074134",
"url": "https://bugzilla.suse.com/1074134"
},
{
"category": "self",
"summary": "SUSE Bug 1074198",
"url": "https://bugzilla.suse.com/1074198"
},
{
"category": "self",
"summary": "SUSE Bug 1074426",
"url": "https://bugzilla.suse.com/1074426"
},
{
"category": "self",
"summary": "SUSE Bug 1074488",
"url": "https://bugzilla.suse.com/1074488"
},
{
"category": "self",
"summary": "SUSE Bug 1074621",
"url": "https://bugzilla.suse.com/1074621"
},
{
"category": "self",
"summary": "SUSE Bug 1074839",
"url": "https://bugzilla.suse.com/1074839"
},
{
"category": "self",
"summary": "SUSE Bug 1074847",
"url": "https://bugzilla.suse.com/1074847"
},
{
"category": "self",
"summary": "SUSE Bug 1075066",
"url": "https://bugzilla.suse.com/1075066"
},
{
"category": "self",
"summary": "SUSE Bug 1075078",
"url": "https://bugzilla.suse.com/1075078"
},
{
"category": "self",
"summary": "SUSE Bug 1075087",
"url": "https://bugzilla.suse.com/1075087"
},
{
"category": "self",
"summary": "SUSE Bug 1075091",
"url": "https://bugzilla.suse.com/1075091"
},
{
"category": "self",
"summary": "SUSE Bug 1075397",
"url": "https://bugzilla.suse.com/1075397"
},
{
"category": "self",
"summary": "SUSE Bug 1075428",
"url": "https://bugzilla.suse.com/1075428"
},
{
"category": "self",
"summary": "SUSE Bug 1075617",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "self",
"summary": "SUSE Bug 1075621",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "self",
"summary": "SUSE Bug 1075627",
"url": "https://bugzilla.suse.com/1075627"
},
{
"category": "self",
"summary": "SUSE Bug 1075811",
"url": "https://bugzilla.suse.com/1075811"
},
{
"category": "self",
"summary": "SUSE Bug 1075994",
"url": "https://bugzilla.suse.com/1075994"
},
{
"category": "self",
"summary": "SUSE Bug 1076017",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "self",
"summary": "SUSE Bug 1076110",
"url": "https://bugzilla.suse.com/1076110"
},
{
"category": "self",
"summary": "SUSE Bug 1076187",
"url": "https://bugzilla.suse.com/1076187"
},
{
"category": "self",
"summary": "SUSE Bug 1076232",
"url": "https://bugzilla.suse.com/1076232"
},
{
"category": "self",
"summary": "SUSE Bug 1076282",
"url": "https://bugzilla.suse.com/1076282"
},
{
"category": "self",
"summary": "SUSE Bug 1076693",
"url": "https://bugzilla.suse.com/1076693"
},
{
"category": "self",
"summary": "SUSE Bug 1076760",
"url": "https://bugzilla.suse.com/1076760"
},
{
"category": "self",
"summary": "SUSE Bug 1076805",
"url": "https://bugzilla.suse.com/1076805"
},
{
"category": "self",
"summary": "SUSE Bug 1076847",
"url": "https://bugzilla.suse.com/1076847"
},
{
"category": "self",
"summary": "SUSE Bug 1076872",
"url": "https://bugzilla.suse.com/1076872"
},
{
"category": "self",
"summary": "SUSE Bug 1076899",
"url": "https://bugzilla.suse.com/1076899"
},
{
"category": "self",
"summary": "SUSE Bug 1076982",
"url": "https://bugzilla.suse.com/1076982"
},
{
"category": "self",
"summary": "SUSE Bug 1077068",
"url": "https://bugzilla.suse.com/1077068"
},
{
"category": "self",
"summary": "SUSE Bug 1077241",
"url": "https://bugzilla.suse.com/1077241"
},
{
"category": "self",
"summary": "SUSE Bug 1077285",
"url": "https://bugzilla.suse.com/1077285"
},
{
"category": "self",
"summary": "SUSE Bug 1077513",
"url": "https://bugzilla.suse.com/1077513"
},
{
"category": "self",
"summary": "SUSE Bug 1077560",
"url": "https://bugzilla.suse.com/1077560"
},
{
"category": "self",
"summary": "SUSE Bug 1077592",
"url": "https://bugzilla.suse.com/1077592"
},
{
"category": "self",
"summary": "SUSE Bug 1077704",
"url": "https://bugzilla.suse.com/1077704"
},
{
"category": "self",
"summary": "SUSE Bug 1077779",
"url": "https://bugzilla.suse.com/1077779"
},
{
"category": "self",
"summary": "SUSE Bug 1077871",
"url": "https://bugzilla.suse.com/1077871"
},
{
"category": "self",
"summary": "SUSE Bug 1078002",
"url": "https://bugzilla.suse.com/1078002"
},
{
"category": "self",
"summary": "SUSE Bug 1078583",
"url": "https://bugzilla.suse.com/1078583"
},
{
"category": "self",
"summary": "SUSE Bug 1078672",
"url": "https://bugzilla.suse.com/1078672"
},
{
"category": "self",
"summary": "SUSE Bug 1078673",
"url": "https://bugzilla.suse.com/1078673"
},
{
"category": "self",
"summary": "SUSE Bug 1078681",
"url": "https://bugzilla.suse.com/1078681"
},
{
"category": "self",
"summary": "SUSE Bug 1078787",
"url": "https://bugzilla.suse.com/1078787"
},
{
"category": "self",
"summary": "SUSE Bug 1079029",
"url": "https://bugzilla.suse.com/1079029"
},
{
"category": "self",
"summary": "SUSE Bug 1079038",
"url": "https://bugzilla.suse.com/1079038"
},
{
"category": "self",
"summary": "SUSE Bug 1079195",
"url": "https://bugzilla.suse.com/1079195"
},
{
"category": "self",
"summary": "SUSE Bug 1079313",
"url": "https://bugzilla.suse.com/1079313"
},
{
"category": "self",
"summary": "SUSE Bug 1079384",
"url": "https://bugzilla.suse.com/1079384"
},
{
"category": "self",
"summary": "SUSE Bug 1079609",
"url": "https://bugzilla.suse.com/1079609"
},
{
"category": "self",
"summary": "SUSE Bug 1079886",
"url": "https://bugzilla.suse.com/1079886"
},
{
"category": "self",
"summary": "SUSE Bug 1079989",
"url": "https://bugzilla.suse.com/1079989"
},
{
"category": "self",
"summary": "SUSE Bug 1080014",
"url": "https://bugzilla.suse.com/1080014"
},
{
"category": "self",
"summary": "SUSE Bug 1080263",
"url": "https://bugzilla.suse.com/1080263"
},
{
"category": "self",
"summary": "SUSE Bug 1080321",
"url": "https://bugzilla.suse.com/1080321"
},
{
"category": "self",
"summary": "SUSE Bug 1080344",
"url": "https://bugzilla.suse.com/1080344"
},
{
"category": "self",
"summary": "SUSE Bug 1080364",
"url": "https://bugzilla.suse.com/1080364"
},
{
"category": "self",
"summary": "SUSE Bug 1080384",
"url": "https://bugzilla.suse.com/1080384"
},
{
"category": "self",
"summary": "SUSE Bug 1080464",
"url": "https://bugzilla.suse.com/1080464"
},
{
"category": "self",
"summary": "SUSE Bug 1080533",
"url": "https://bugzilla.suse.com/1080533"
},
{
"category": "self",
"summary": "SUSE Bug 1080656",
"url": "https://bugzilla.suse.com/1080656"
},
{
"category": "self",
"summary": "SUSE Bug 1080774",
"url": "https://bugzilla.suse.com/1080774"
},
{
"category": "self",
"summary": "SUSE Bug 1080813",
"url": "https://bugzilla.suse.com/1080813"
},
{
"category": "self",
"summary": "SUSE Bug 1080851",
"url": "https://bugzilla.suse.com/1080851"
},
{
"category": "self",
"summary": "SUSE Bug 1081134",
"url": "https://bugzilla.suse.com/1081134"
},
{
"category": "self",
"summary": "SUSE Bug 1081431",
"url": "https://bugzilla.suse.com/1081431"
},
{
"category": "self",
"summary": "SUSE Bug 1081436",
"url": "https://bugzilla.suse.com/1081436"
},
{
"category": "self",
"summary": "SUSE Bug 1081437",
"url": "https://bugzilla.suse.com/1081437"
},
{
"category": "self",
"summary": "SUSE Bug 1081491",
"url": "https://bugzilla.suse.com/1081491"
},
{
"category": "self",
"summary": "SUSE Bug 1081498",
"url": "https://bugzilla.suse.com/1081498"
},
{
"category": "self",
"summary": "SUSE Bug 1081500",
"url": "https://bugzilla.suse.com/1081500"
},
{
"category": "self",
"summary": "SUSE Bug 1081512",
"url": "https://bugzilla.suse.com/1081512"
},
{
"category": "self",
"summary": "SUSE Bug 1081514",
"url": "https://bugzilla.suse.com/1081514"
},
{
"category": "self",
"summary": "SUSE Bug 1081681",
"url": "https://bugzilla.suse.com/1081681"
},
{
"category": "self",
"summary": "SUSE Bug 1081735",
"url": "https://bugzilla.suse.com/1081735"
},
{
"category": "self",
"summary": "SUSE Bug 1082089",
"url": "https://bugzilla.suse.com/1082089"
},
{
"category": "self",
"summary": "SUSE Bug 1082223",
"url": "https://bugzilla.suse.com/1082223"
},
{
"category": "self",
"summary": "SUSE Bug 1082299",
"url": "https://bugzilla.suse.com/1082299"
},
{
"category": "self",
"summary": "SUSE Bug 1082373",
"url": "https://bugzilla.suse.com/1082373"
},
{
"category": "self",
"summary": "SUSE Bug 1082478",
"url": "https://bugzilla.suse.com/1082478"
},
{
"category": "self",
"summary": "SUSE Bug 1082632",
"url": "https://bugzilla.suse.com/1082632"
},
{
"category": "self",
"summary": "SUSE Bug 1082795",
"url": "https://bugzilla.suse.com/1082795"
},
{
"category": "self",
"summary": "SUSE Bug 1082864",
"url": "https://bugzilla.suse.com/1082864"
},
{
"category": "self",
"summary": "SUSE Bug 1082897",
"url": "https://bugzilla.suse.com/1082897"
},
{
"category": "self",
"summary": "SUSE Bug 1082979",
"url": "https://bugzilla.suse.com/1082979"
},
{
"category": "self",
"summary": "SUSE Bug 1082993",
"url": "https://bugzilla.suse.com/1082993"
},
{
"category": "self",
"summary": "SUSE Bug 1083048",
"url": "https://bugzilla.suse.com/1083048"
},
{
"category": "self",
"summary": "SUSE Bug 1083056",
"url": "https://bugzilla.suse.com/1083056"
},
{
"category": "self",
"summary": "SUSE Bug 1083086",
"url": "https://bugzilla.suse.com/1083086"
},
{
"category": "self",
"summary": "SUSE Bug 1083223",
"url": "https://bugzilla.suse.com/1083223"
},
{
"category": "self",
"summary": "SUSE Bug 1083387",
"url": "https://bugzilla.suse.com/1083387"
},
{
"category": "self",
"summary": "SUSE Bug 1083409",
"url": "https://bugzilla.suse.com/1083409"
},
{
"category": "self",
"summary": "SUSE Bug 1083494",
"url": "https://bugzilla.suse.com/1083494"
},
{
"category": "self",
"summary": "SUSE Bug 1083548",
"url": "https://bugzilla.suse.com/1083548"
},
{
"category": "self",
"summary": "SUSE Bug 1083750",
"url": "https://bugzilla.suse.com/1083750"
},
{
"category": "self",
"summary": "SUSE Bug 1083770",
"url": "https://bugzilla.suse.com/1083770"
},
{
"category": "self",
"summary": "SUSE Bug 1084041",
"url": "https://bugzilla.suse.com/1084041"
},
{
"category": "self",
"summary": "SUSE Bug 1084397",
"url": "https://bugzilla.suse.com/1084397"
},
{
"category": "self",
"summary": "SUSE Bug 1084427",
"url": "https://bugzilla.suse.com/1084427"
},
{
"category": "self",
"summary": "SUSE Bug 1084610",
"url": "https://bugzilla.suse.com/1084610"
},
{
"category": "self",
"summary": "SUSE Bug 1084772",
"url": "https://bugzilla.suse.com/1084772"
},
{
"category": "self",
"summary": "SUSE Bug 1084888",
"url": "https://bugzilla.suse.com/1084888"
},
{
"category": "self",
"summary": "SUSE Bug 1084926",
"url": "https://bugzilla.suse.com/1084926"
},
{
"category": "self",
"summary": "SUSE Bug 1084928",
"url": "https://bugzilla.suse.com/1084928"
},
{
"category": "self",
"summary": "SUSE Bug 1084967",
"url": "https://bugzilla.suse.com/1084967"
},
{
"category": "self",
"summary": "SUSE Bug 1085011",
"url": "https://bugzilla.suse.com/1085011"
},
{
"category": "self",
"summary": "SUSE Bug 1085015",
"url": "https://bugzilla.suse.com/1085015"
},
{
"category": "self",
"summary": "SUSE Bug 1085045",
"url": "https://bugzilla.suse.com/1085045"
},
{
"category": "self",
"summary": "SUSE Bug 1085047",
"url": "https://bugzilla.suse.com/1085047"
},
{
"category": "self",
"summary": "SUSE Bug 1085050",
"url": "https://bugzilla.suse.com/1085050"
},
{
"category": "self",
"summary": "SUSE Bug 1085053",
"url": "https://bugzilla.suse.com/1085053"
},
{
"category": "self",
"summary": "SUSE Bug 1085054",
"url": "https://bugzilla.suse.com/1085054"
},
{
"category": "self",
"summary": "SUSE Bug 1085056",
"url": "https://bugzilla.suse.com/1085056"
},
{
"category": "self",
"summary": "SUSE Bug 1085107",
"url": "https://bugzilla.suse.com/1085107"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1085239",
"url": "https://bugzilla.suse.com/1085239"
},
{
"category": "self",
"summary": "SUSE Bug 863764",
"url": "https://bugzilla.suse.com/863764"
},
{
"category": "self",
"summary": "SUSE Bug 963844",
"url": "https://bugzilla.suse.com/963844"
},
{
"category": "self",
"summary": "SUSE Bug 966170",
"url": "https://bugzilla.suse.com/966170"
},
{
"category": "self",
"summary": "SUSE Bug 966172",
"url": "https://bugzilla.suse.com/966172"
},
{
"category": "self",
"summary": "SUSE Bug 966328",
"url": "https://bugzilla.suse.com/966328"
},
{
"category": "self",
"summary": "SUSE Bug 969476",
"url": "https://bugzilla.suse.com/969476"
},
{
"category": "self",
"summary": "SUSE Bug 969477",
"url": "https://bugzilla.suse.com/969477"
},
{
"category": "self",
"summary": "SUSE Bug 973818",
"url": "https://bugzilla.suse.com/973818"
},
{
"category": "self",
"summary": "SUSE Bug 975772",
"url": "https://bugzilla.suse.com/975772"
},
{
"category": "self",
"summary": "SUSE Bug 983145",
"url": "https://bugzilla.suse.com/983145"
},
{
"category": "self",
"summary": "SUSE Bug 985025",
"url": "https://bugzilla.suse.com/985025"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13166 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15129 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15951 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15951/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16644 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16644/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16912 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16913 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16913/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17712 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17712/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17862 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17864 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17975 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17975/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18017 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18174 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18174/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18208 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000026 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000026/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5332 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5333 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5333/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8087 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8087/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-04-19T09:27:38Z",
"generator": {
"date": "2018-04-19T09:27:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0986-1",
"initial_release_date": "2018-04-19T09:27:38Z",
"revision_history": [
{
"date": "2018-04-19T09:27:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.4.120-3.8.1.noarch",
"product": {
"name": "kernel-devel-rt-4.4.120-3.8.1.noarch",
"product_id": "kernel-devel-rt-4.4.120-3.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.4.120-3.8.1.noarch",
"product": {
"name": "kernel-source-rt-4.4.120-3.8.1.noarch",
"product_id": "kernel-source-rt-4.4.120-3.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.4.120-3.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"product_id": "dlm-kmp-rt-4.4.120-3.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"product_id": "gfs2-kmp-rt-4.4.120-3.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.4.120-3.8.1.x86_64",
"product": {
"name": "kernel-rt-4.4.120-3.8.1.x86_64",
"product_id": "kernel-rt-4.4.120-3.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.4.120-3.8.1.x86_64",
"product": {
"name": "kernel-rt-base-4.4.120-3.8.1.x86_64",
"product_id": "kernel-rt-base-4.4.120-3.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.4.120-3.8.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.4.120-3.8.1.x86_64",
"product_id": "kernel-rt-devel-4.4.120-3.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.4.120-3.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.4.120-3.8.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.4.120-3.8.1.x86_64",
"product_id": "kernel-syms-rt-4.4.120-3.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.4.120-3.8.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.4.120-3.8.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.4.120-3.8.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.4.120-3.8.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch"
},
"product_reference": "kernel-devel-rt-4.4.120-3.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.4.120-3.8.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64"
},
"product_reference": "kernel-rt-4.4.120-3.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.4.120-3.8.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64"
},
"product_reference": "kernel-rt-base-4.4.120-3.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.4.120-3.8.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.4.120-3.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.4.120-3.8.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.4.120-3.8.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch"
},
"product_reference": "kernel-source-rt-4.4.120-3.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.4.120-3.8.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.4.120-3.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.4.120-3.8.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13166"
}
],
"notes": [
{
"category": "general",
"text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13166",
"url": "https://www.suse.com/security/cve/CVE-2017-13166"
},
{
"category": "external",
"summary": "SUSE Bug 1072865 for CVE-2017-13166",
"url": "https://bugzilla.suse.com/1072865"
},
{
"category": "external",
"summary": "SUSE Bug 1085447 for CVE-2017-13166",
"url": "https://bugzilla.suse.com/1085447"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-13166",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-13166",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "important"
}
],
"title": "CVE-2017-13166"
},
{
"cve": "CVE-2017-15129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15129"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15129",
"url": "https://www.suse.com/security/cve/CVE-2017-15129"
},
{
"category": "external",
"summary": "SUSE Bug 1074839 for CVE-2017-15129",
"url": "https://bugzilla.suse.com/1074839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-15129"
},
{
"cve": "CVE-2017-15951",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15951"
}
],
"notes": [
{
"category": "general",
"text": "The KEYS subsystem in the Linux kernel before 4.13.10 does not correctly synchronize the actions of updating versus finding a key in the \"negative\" state to avoid a race condition, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15951",
"url": "https://www.suse.com/security/cve/CVE-2017-15951"
},
{
"category": "external",
"summary": "SUSE Bug 1062840 for CVE-2017-15951",
"url": "https://bugzilla.suse.com/1062840"
},
{
"category": "external",
"summary": "SUSE Bug 1065615 for CVE-2017-15951",
"url": "https://bugzilla.suse.com/1065615"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "low"
}
],
"title": "CVE-2017-15951"
},
{
"cve": "CVE-2017-16644",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16644"
}
],
"notes": [
{
"category": "general",
"text": "The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16644",
"url": "https://www.suse.com/security/cve/CVE-2017-16644"
},
{
"category": "external",
"summary": "SUSE Bug 1067118 for CVE-2017-16644",
"url": "https://bugzilla.suse.com/1067118"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16644",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-16644",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16644",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-16644"
},
{
"cve": "CVE-2017-16912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16912"
}
],
"notes": [
{
"category": "general",
"text": "The \"get_pipe()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16912",
"url": "https://www.suse.com/security/cve/CVE-2017-16912"
},
{
"category": "external",
"summary": "SUSE Bug 1078673 for CVE-2017-16912",
"url": "https://bugzilla.suse.com/1078673"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16912",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-16912",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-16912"
},
{
"cve": "CVE-2017-16913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16913"
}
],
"notes": [
{
"category": "general",
"text": "The \"stub_recv_cmd_submit()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16913",
"url": "https://www.suse.com/security/cve/CVE-2017-16913"
},
{
"category": "external",
"summary": "SUSE Bug 1078672 for CVE-2017-16913",
"url": "https://bugzilla.suse.com/1078672"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16913",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-16913",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-16913"
},
{
"cve": "CVE-2017-17712",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17712"
}
],
"notes": [
{
"category": "general",
"text": "The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet-\u003ehdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17712",
"url": "https://www.suse.com/security/cve/CVE-2017-17712"
},
{
"category": "external",
"summary": "SUSE Bug 1073229 for CVE-2017-17712",
"url": "https://bugzilla.suse.com/1073229"
},
{
"category": "external",
"summary": "SUSE Bug 1073230 for CVE-2017-17712",
"url": "https://bugzilla.suse.com/1073230"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "important"
}
],
"title": "CVE-2017-17712"
},
{
"cve": "CVE-2017-17862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17862"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17862",
"url": "https://www.suse.com/security/cve/CVE-2017-17862"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17862",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-17862"
},
{
"cve": "CVE-2017-17864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17864"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17864",
"url": "https://www.suse.com/security/cve/CVE-2017-17864"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17864",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-17864"
},
{
"cve": "CVE-2017-17975",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17975"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c in the Linux kernel through 4.14.10 allows attackers to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfree of the usbtv data structure occurs during a usbtv_video_free call, but the usbtv_video_fail label\u0027s code attempts to both access and free this data structure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17975",
"url": "https://www.suse.com/security/cve/CVE-2017-17975"
},
{
"category": "external",
"summary": "SUSE Bug 1074426 for CVE-2017-17975",
"url": "https://bugzilla.suse.com/1074426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "low"
}
],
"title": "CVE-2017-17975"
},
{
"cve": "CVE-2017-18017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18017"
}
],
"notes": [
{
"category": "general",
"text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18017",
"url": "https://www.suse.com/security/cve/CVE-2017-18017"
},
{
"category": "external",
"summary": "SUSE Bug 1074488 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1074488"
},
{
"category": "external",
"summary": "SUSE Bug 1080255 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1080255"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 971126 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/971126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "important"
}
],
"title": "CVE-2017-18017"
},
{
"cve": "CVE-2017-18174",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18174"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18174",
"url": "https://www.suse.com/security/cve/CVE-2017-18174"
},
{
"category": "external",
"summary": "SUSE Bug 1080533 for CVE-2017-18174",
"url": "https://bugzilla.suse.com/1080533"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-18174"
},
{
"cve": "CVE-2017-18208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18208"
}
],
"notes": [
{
"category": "general",
"text": "The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18208",
"url": "https://www.suse.com/security/cve/CVE-2017-18208"
},
{
"category": "external",
"summary": "SUSE Bug 1083494 for CVE-2017-18208",
"url": "https://bugzilla.suse.com/1083494"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-18208",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18208",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-18208"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-1000026",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000026"
}
],
"notes": [
{
"category": "general",
"text": "Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM..",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000026",
"url": "https://www.suse.com/security/cve/CVE-2018-1000026"
},
{
"category": "external",
"summary": "SUSE Bug 1079384 for CVE-2018-1000026",
"url": "https://bugzilla.suse.com/1079384"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1000026",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1096723 for CVE-2018-1000026",
"url": "https://bugzilla.suse.com/1096723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "important"
}
],
"title": "CVE-2018-1000026"
},
{
"cve": "CVE-2018-5332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5332"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5332",
"url": "https://www.suse.com/security/cve/CVE-2018-5332"
},
{
"category": "external",
"summary": "SUSE Bug 1075621 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "low"
}
],
"title": "CVE-2018-5332"
},
{
"cve": "CVE-2018-5333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5333"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5333",
"url": "https://www.suse.com/security/cve/CVE-2018-5333"
},
{
"category": "external",
"summary": "SUSE Bug 1075617 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "low"
}
],
"title": "CVE-2018-5333"
},
{
"cve": "CVE-2018-8087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8087"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8087",
"url": "https://www.suse.com/security/cve/CVE-2018-8087"
},
{
"category": "external",
"summary": "SUSE Bug 1085053 for CVE-2018-8087",
"url": "https://bugzilla.suse.com/1085053"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.120-3.8.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.120-3.8.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.120-3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-19T09:27:38Z",
"details": "moderate"
}
],
"title": "CVE-2018-8087"
}
]
}
SUSE-SU-2018:0708-1
Vulnerability from csaf_suse - Published: 2018-03-16 11:53 - Updated: 2018-03-16 11:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ucode-intel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for ucode-intel fixes the following issues:\n\nThe Intel CPU microcode version was updated to version 20180312.\n\nThis update enables the IBPB+IBRS based mitigations of the Spectre v2 flaws (boo#1085207 CVE-2017-5715)\n\n- New Platforms\n\n - BDX-DE EGW A0 6-56-5:10 e000009\n - SKX B1 6-55-3:97 1000140\n\n- Updates\n\n - SNB D2 6-2a-7:12 29-\u003e2d\n - JKT C1 6-2d-6:6d 619-\u003e61c\n - JKT C2 6-2d-7:6d 710-\u003e713\n - IVB E2 6-3a-9:12 1c-\u003e1f\n - IVT C0 6-3e-4:ed 428-\u003e42c\n - IVT D1 6-3e-7:ed 70d-\u003e713\n - HSW Cx/Dx 6-3c-3:32 22-\u003e24\n - HSW-ULT Cx/Dx 6-45-1:72 20-\u003e23\n - CRW Cx 6-46-1:32 17-\u003e19\n - HSX C0 6-3f-2:6f 3a-\u003e3c\n - HSX-EX E0 6-3f-4:80 0f-\u003e11\n - BDW-U/Y E/F 6-3d-4:c0 25-\u003e2a\n - BDW-H E/G 6-47-1:22 17-\u003e1d\n - BDX-DE V0/V1 6-56-2:10 0f-\u003e15\n - BDW-DE V2 6-56-3:10 700000d-\u003e7000012\n - BDW-DE Y0 6-56-4:10 f00000a-\u003ef000011\n - SKL-U/Y D0 6-4e-3:c0 ba-\u003ec2\n - SKL R0 6-5e-3:36 ba-\u003ec2\n - KBL-U/Y H0 6-8e-9:c0 62-\u003e84\n - KBL B0 6-9e-9:2a 5e-\u003e84\n - CFL D0 6-8e-a:c0 70-\u003e84\n - CFL U0 6-9e-a:22 70-\u003e84\n - CFL B0 6-9e-b:02 72-\u003e84\n - SKX H0 6-55-4:b7 2000035-\u003e2000043\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-6-2018-479,SUSE-SLE-DESKTOP-12-SP2-2018-479,SUSE-SLE-DESKTOP-12-SP3-2018-479,SUSE-SLE-SAP-12-SP1-2018-479,SUSE-SLE-SERVER-12-2018-479,SUSE-SLE-SERVER-12-SP1-2018-479,SUSE-SLE-SERVER-12-SP2-2018-479,SUSE-SLE-SERVER-12-SP3-2018-479",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0708-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0708-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180708-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0708-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003819.html"
},
{
"category": "self",
"summary": "SUSE Bug 1085207",
"url": "https://bugzilla.suse.com/1085207"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for ucode-intel",
"tracking": {
"current_release_date": "2018-03-16T11:53:47Z",
"generator": {
"date": "2018-03-16T11:53:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0708-1",
"initial_release_date": "2018-03-16T11:53:47Z",
"revision_history": [
{
"date": "2018-03-16T11:53:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ucode-intel-20180312-13.17.1.x86_64",
"product": {
"name": "ucode-intel-20180312-13.17.1.x86_64",
"product_id": "ucode-intel-20180312-13.17.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 6",
"product": {
"name": "SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180312-13.17.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:ucode-intel-20180312-13.17.1.x86_64"
},
"product_reference": "ucode-intel-20180312-13.17.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180312-13.17.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:ucode-intel-20180312-13.17.1.x86_64"
},
"product_reference": "ucode-intel-20180312-13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180312-13.17.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180312-13.17.1.x86_64"
},
"product_reference": "ucode-intel-20180312-13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180312-13.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180312-13.17.1.x86_64"
},
"product_reference": "ucode-intel-20180312-13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180312-13.17.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180312-13.17.1.x86_64"
},
"product_reference": "ucode-intel-20180312-13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180312-13.17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180312-13.17.1.x86_64"
},
"product_reference": "ucode-intel-20180312-13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180312-13.17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:ucode-intel-20180312-13.17.1.x86_64"
},
"product_reference": "ucode-intel-20180312-13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180312-13.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180312-13.17.1.x86_64"
},
"product_reference": "ucode-intel-20180312-13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180312-13.17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180312-13.17.1.x86_64"
},
"product_reference": "ucode-intel-20180312-13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180312-13.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180312-13.17.1.x86_64"
},
"product_reference": "ucode-intel-20180312-13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180312-13.17.1.x86_64",
"SUSE OpenStack Cloud 6:ucode-intel-20180312-13.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180312-13.17.1.x86_64",
"SUSE OpenStack Cloud 6:ucode-intel-20180312-13.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180312-13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180312-13.17.1.x86_64",
"SUSE OpenStack Cloud 6:ucode-intel-20180312-13.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-16T11:53:47Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:1077-1
Vulnerability from csaf_suse - Published: 2018-04-25 12:14 - Updated: 2018-04-25 12:14Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kvm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kvm fixes the following issues:\n\n- This update has the next round of Spectre v2 related patches,\n which now integrates with corresponding changes in libvirt. A\n January 2018 release of qemu initially addressed the Spectre v2\n vulnerability for KVM guests by exposing the spec-ctrl feature\n for all x86 vcpu types, which was the quick and dirty approach,\n but not the proper solution. We remove that initial patch and now\n rely on patches from upstream. This update defines spec_ctrl and\n ibpb cpu feature flags as well as new cpu models which are clones\n of existing models with either -IBRS or -IBPB added to the end of\n the model name. These new vcpu models explicitly include the new\n feature(s), whereas the feature flags can be added to the cpu\n parameter as with other features. In short, for continued Spectre\n v2 protection, ensure that either the appropriate cpu feature\n flag is added to the QEMU command-line, or one of the new cpu\n models is used. Although migration from older versions is\n supported, the new cpu features won\u0027t be properly exposed to the\n guest until it is restarted with the cpu features explicitly\n added. A reboot is insufficient.\n- A warning patch is added which attempts to detect a migration\n from a qemu version which had the quick and dirty fix (it only\n detects certain cases, but hopefully is helpful.)\n For additional information on Spectre v2 as it relates to QEMU,\n see: https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/\n (CVE-2017-5715 bsc#1068032)\n- A patch is added to continue to detect Spectre v2 mitigation\n features (as shown by cpuid), and if found provide that feature\n to guests, even if running on older KVM (kernel) versions which\n do not yet expose that feature to QEMU. (bsc#1082276)\n These two patches will be removed when we can reasonably assume\n everyone is running with the appropriate updates.\n\n- Security fixes for the following CVE issues:\n (bsc#1076114 CVE-2018-5683)\n (bsc#1083291 CVE-2018-7550)\n- This patch is already included, add here for CVE track\n (bsc#1076179 CVE-2017-18030)\n\n- Toolchain changes have cause the built size of pxe-virtio.rom to\n exceed 64K. Tweak rarely used strings in code to reduce size of\n the binary so it fits again.\n\n- Eliminate bogus use of CPUID_7_0_EDX_PRED_CMD which we\u0027ve\n carried since the initial Spectre v2 patch was added. EDX bit\n 27 of CPUID Leaf 07H, Sub-leaf 0 provides status on STIBP, and\n not the PRED_CMD MSR. Exposing the STIBP CPUID feature bit to the\n guest is wrong in general, since the VM doesn\u0027t directly control\n the scheduling of physical hyperthreads. This is left strictly to\n the L0 hypervisor.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slessp4-kvm-13571",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1077-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1077-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181077-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1077-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003961.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1076114",
"url": "https://bugzilla.suse.com/1076114"
},
{
"category": "self",
"summary": "SUSE Bug 1076179",
"url": "https://bugzilla.suse.com/1076179"
},
{
"category": "self",
"summary": "SUSE Bug 1082276",
"url": "https://bugzilla.suse.com/1082276"
},
{
"category": "self",
"summary": "SUSE Bug 1083291",
"url": "https://bugzilla.suse.com/1083291"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18030 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5683 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5683/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7550 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7550/"
}
],
"title": "Security update for kvm",
"tracking": {
"current_release_date": "2018-04-25T12:14:56Z",
"generator": {
"date": "2018-04-25T12:14:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1077-1",
"initial_release_date": "2018-04-25T12:14:56Z",
"revision_history": [
{
"date": "2018-04-25T12:14:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-60.9.1.i586",
"product": {
"name": "kvm-1.4.2-60.9.1.i586",
"product_id": "kvm-1.4.2-60.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-60.9.1.s390x",
"product": {
"name": "kvm-1.4.2-60.9.1.s390x",
"product_id": "kvm-1.4.2-60.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-60.9.1.x86_64",
"product": {
"name": "kvm-1.4.2-60.9.1.x86_64",
"product_id": "kvm-1.4.2-60.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.i586"
},
"product_reference": "kvm-1.4.2-60.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.s390x"
},
"product_reference": "kvm-1.4.2-60.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.x86_64"
},
"product_reference": "kvm-1.4.2-60.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.i586"
},
"product_reference": "kvm-1.4.2-60.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.s390x"
},
"product_reference": "kvm-1.4.2-60.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.x86_64"
},
"product_reference": "kvm-1.4.2-60.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-18030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18030"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18030",
"url": "https://www.suse.com/security/cve/CVE-2017-18030"
},
{
"category": "external",
"summary": "SUSE Bug 1076179 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076179"
},
{
"category": "external",
"summary": "SUSE Bug 1076180 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T12:14:56Z",
"details": "low"
}
],
"title": "CVE-2017-18030"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T12:14:56Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-5683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5683"
}
],
"notes": [
{
"category": "general",
"text": "The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5683",
"url": "https://www.suse.com/security/cve/CVE-2018-5683"
},
{
"category": "external",
"summary": "SUSE Bug 1076114 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076114"
},
{
"category": "external",
"summary": "SUSE Bug 1076116 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T12:14:56Z",
"details": "moderate"
}
],
"title": "CVE-2018-5683"
},
{
"cve": "CVE-2018-7550",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7550"
}
],
"notes": [
{
"category": "general",
"text": "The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7550",
"url": "https://www.suse.com/security/cve/CVE-2018-7550"
},
{
"category": "external",
"summary": "SUSE Bug 1083291 for CVE-2018-7550",
"url": "https://bugzilla.suse.com/1083291"
},
{
"category": "external",
"summary": "SUSE Bug 1083292 for CVE-2018-7550",
"url": "https://bugzilla.suse.com/1083292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T12:14:56Z",
"details": "important"
}
],
"title": "CVE-2018-7550"
}
]
}
SUSE-SU-2018:0609-1
Vulnerability from csaf_suse - Published: 2018-03-05 16:46 - Updated: 2018-03-05 16:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via\n side effects of speculative execution, aka \u0027Spectre\u0027 and \u0027Meltdown\u0027 attacks\n (bsc#1074562, bsc#1068032)\n- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged\n users to cause a denial of service (out-of-bounds read and QEMU process crash)\n by leveraging improper memory address validation (bsc#1076116).\n- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest\n privileged users to cause a denial of service (out-of-bounds array access and\n QEMU process crash) via vectors related to negative pitch (bsc#1076180).\n- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded\n recursion, stack consumption, and hypervisor crash) or possibly gain privileges\n via crafted page-table stacking (bsc#1061081)\n- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host\n OS crash) or gain host OS privileges in shadow mode by mapping a certain\n auxiliary page (bsc#1070158).\n- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS\n crash) or gain host OS privileges by leveraging an incorrect mask for\n reference-count overflow checking in shadow mode (bsc#1070159).\n- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS\n crash) or gain host OS privileges by leveraging incorrect error handling for\n reference counting in shadow mode (bsc#1070160).\n- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host\n OS crash) if shadow mode and log-dirty mode are in place, because of an\n incorrect assertion related to M2P (bsc#1070163).\n- Added missing intermediate preemption checks for guest requesting removal of\n memory. This allowed malicious guest administrator to cause denial of service\n due to the high cost of this operation (bsc#1080635).\n- Because of XEN not returning the proper error messages when transitioning\n grant tables from v2 to v1 a malicious guest was able to cause DoS or\n potentially allowed for privilege escalation as well as information leaks\n (bsc#1080662).\n\nThis non-security issue was fixed:\n\n- bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100\n seconds. If many domUs shutdown in parallel the backends couldn\u0027t keep up\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-6-2018-415,SUSE-SLE-SAP-12-SP1-2018-415,SUSE-SLE-SERVER-12-SP1-2018-415",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0609-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0609-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180609-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0609-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003789.html"
},
{
"category": "self",
"summary": "SUSE Bug 1035442",
"url": "https://bugzilla.suse.com/1035442"
},
{
"category": "self",
"summary": "SUSE Bug 1061081",
"url": "https://bugzilla.suse.com/1061081"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1070158",
"url": "https://bugzilla.suse.com/1070158"
},
{
"category": "self",
"summary": "SUSE Bug 1070159",
"url": "https://bugzilla.suse.com/1070159"
},
{
"category": "self",
"summary": "SUSE Bug 1070160",
"url": "https://bugzilla.suse.com/1070160"
},
{
"category": "self",
"summary": "SUSE Bug 1070163",
"url": "https://bugzilla.suse.com/1070163"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1076116",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "self",
"summary": "SUSE Bug 1076180",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "self",
"summary": "SUSE Bug 1080635",
"url": "https://bugzilla.suse.com/1080635"
},
{
"category": "self",
"summary": "SUSE Bug 1080662",
"url": "https://bugzilla.suse.com/1080662"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15595 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17563 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17563/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17564 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17565 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17566 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18030 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5683 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5683/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-03-05T16:46:43Z",
"generator": {
"date": "2018-03-05T16:46:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0609-1",
"initial_release_date": "2018-03-05T16:46:43Z",
"revision_history": [
{
"date": "2018-03-05T16:46:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.5.5_24-22.43.1.x86_64",
"product": {
"name": "xen-4.5.5_24-22.43.1.x86_64",
"product_id": "xen-4.5.5_24-22.43.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.5.5_24-22.43.1.x86_64",
"product": {
"name": "xen-doc-html-4.5.5_24-22.43.1.x86_64",
"product_id": "xen-doc-html-4.5.5_24-22.43.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"product": {
"name": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"product_id": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.5.5_24-22.43.1.x86_64",
"product": {
"name": "xen-libs-4.5.5_24-22.43.1.x86_64",
"product_id": "xen-libs-4.5.5_24-22.43.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"product_id": "xen-libs-32bit-4.5.5_24-22.43.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.5.5_24-22.43.1.x86_64",
"product": {
"name": "xen-tools-4.5.5_24-22.43.1.x86_64",
"product_id": "xen-tools-4.5.5_24-22.43.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"product": {
"name": "xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"product_id": "xen-tools-domU-4.5.5_24-22.43.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 6",
"product": {
"name": "SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.5.5_24-22.43.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.5.5_24-22.43.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-doc-html-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64"
},
"product_reference": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.5.5_24-22.43.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-libs-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.5.5_24-22.43.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.5.5_24-22.43.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-tools-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.5.5_24-22.43.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.5.5_24-22.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.5.5_24-22.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-doc-html-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64"
},
"product_reference": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.5.5_24-22.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-libs-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.5.5_24-22.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.5.5_24-22.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-tools-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.5.5_24-22.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.5.5_24-22.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.5.5_24-22.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-doc-html-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64"
},
"product_reference": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.5.5_24-22.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-libs-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.5.5_24-22.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.5.5_24-22.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-tools-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.5.5_24-22.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
},
"product_reference": "xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15595"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15595",
"url": "https://www.suse.com/security/cve/CVE-2017-15595"
},
{
"category": "external",
"summary": "SUSE Bug 1061081 for CVE-2017-15595",
"url": "https://bugzilla.suse.com/1061081"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-15595",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T16:46:43Z",
"details": "important"
}
],
"title": "CVE-2017-15595"
},
{
"cve": "CVE-2017-17563",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17563"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17563",
"url": "https://www.suse.com/security/cve/CVE-2017-17563"
},
{
"category": "external",
"summary": "SUSE Bug 1070159 for CVE-2017-17563",
"url": "https://bugzilla.suse.com/1070159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T16:46:43Z",
"details": "moderate"
}
],
"title": "CVE-2017-17563"
},
{
"cve": "CVE-2017-17564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17564"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17564",
"url": "https://www.suse.com/security/cve/CVE-2017-17564"
},
{
"category": "external",
"summary": "SUSE Bug 1070160 for CVE-2017-17564",
"url": "https://bugzilla.suse.com/1070160"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17564",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T16:46:43Z",
"details": "moderate"
}
],
"title": "CVE-2017-17564"
},
{
"cve": "CVE-2017-17565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17565"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) if shadow mode and log-dirty mode are in place, because of an incorrect assertion related to M2P.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17565",
"url": "https://www.suse.com/security/cve/CVE-2017-17565"
},
{
"category": "external",
"summary": "SUSE Bug 1070163 for CVE-2017-17565",
"url": "https://bugzilla.suse.com/1070163"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17565",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T16:46:43Z",
"details": "moderate"
}
],
"title": "CVE-2017-17565"
},
{
"cve": "CVE-2017-17566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17566"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) or gain host OS privileges in shadow mode by mapping a certain auxiliary page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17566",
"url": "https://www.suse.com/security/cve/CVE-2017-17566"
},
{
"category": "external",
"summary": "SUSE Bug 1070158 for CVE-2017-17566",
"url": "https://bugzilla.suse.com/1070158"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17566",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T16:46:43Z",
"details": "moderate"
}
],
"title": "CVE-2017-17566"
},
{
"cve": "CVE-2017-18030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18030"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18030",
"url": "https://www.suse.com/security/cve/CVE-2017-18030"
},
{
"category": "external",
"summary": "SUSE Bug 1076179 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076179"
},
{
"category": "external",
"summary": "SUSE Bug 1076180 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T16:46:43Z",
"details": "low"
}
],
"title": "CVE-2017-18030"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T16:46:43Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T16:46:43Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T16:46:43Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-5683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5683"
}
],
"notes": [
{
"category": "general",
"text": "The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5683",
"url": "https://www.suse.com/security/cve/CVE-2018-5683"
},
{
"category": "external",
"summary": "SUSE Bug 1076114 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076114"
},
{
"category": "external",
"summary": "SUSE Bug 1076116 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.82-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.43.1.x86_64",
"SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.43.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-05T16:46:43Z",
"details": "moderate"
}
],
"title": "CVE-2018-5683"
}
]
}
SUSE-SU-2018:0213-1
Vulnerability from csaf_suse - Published: 2018-01-25 09:17 - Updated: 2018-01-25 09:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP2 Realtime kernel was updated to 4.4.104 to receive various security and bugfixes.\n\nThis update adds mitigations for various side channel attacks against\nmodern CPUs that could disclose content of otherwise unreadable memory\n(bnc#1068032).\n\n- CVE-2017-5753: Local attackers on systems with modern CPUs featuring\n deep instruction pipelining could use attacker controllable speculative\n execution over code patterns in the Linux Kernel to leak content from\n otherwise not readable memory in the same address space, allowing\n retrieval of passwords, cryptographic keys and other secrets.\n\n This problem is mitigated by adding speculative fencing on affected\n code paths throughout the Linux kernel.\n\n- CVE-2017-5715: Local attackers on systems with modern CPUs featuring\n branch prediction could use mispredicted branches to speculatively execute\n code patterns that in turn could be made to leak other non-readable\n content in the same address space, an attack similar to CVE-2017-5753.\n\n This problem is mitigated by disabling predictive branches, depending\n on CPU architecture either by firmware updates and/or fixes in the\n user-kernel privilege boundaries.\n\n This is done with help of Linux Kernel fixes on the Intel/AMD x86_64\n architectures.\n On x86_64, this requires also updates of the CPU microcode packages,\n delivered in seperate updates.\n\n As this feature can have a performance impact, it can be disabled\n using the \u0027nospec\u0027 kernel commandline option.\n\n\n- CVE-2017-5754: Local attackers on systems with modern CPUs featuring\n deep instruction pipelining could use code patterns in userspace to\n speculative executive code that would read otherwise read protected\n memory, an attack similar to CVE-2017-5753.\n\n This problem is mitigated by unmapping the Linux Kernel from the user\n address space during user code execution, following a approach called\n \u0027KAISER\u0027. The terms used here are \u0027KAISER\u0027 / \u0027Kernel Address Isolation\u0027\n and \u0027PTI\u0027 / \u0027Page Table Isolation\u0027.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-1000405: The Linux Kernel versions had a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_pmd()\u0027s logic - pmd can become dirty without going through a COW cycle. This bug is not as severe as the original \u0027Dirty cow\u0027 because an ext4 file (or any other regular file) cannot be mapped using THP. Nevertheless, it did allow us to overwrite read-only huge pages. For example, the zero huge page and sealed shmem files can be overwritten (since their mapping can be populated using THP). Note that after the first write page-fault to the zero page, it will be replaced with a new fresh (and zeroed) thp (bnc#1069496).\n- CVE-2017-1000410: The Linux kernel was affected by a vulnerability that lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. (bnc#1070535).\n- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).\n- CVE-2017-12193: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel mishandled node splitting, which allowed local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link creation operations (bnc#1066192).\n- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).\n- CVE-2017-16528: sound/core/seq_device.c in the Linux kernel allowed local users to cause a denial of service (snd_rawmidi_dev_seq_free use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066629).\n- CVE-2017-16536: The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066606).\n- CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066573).\n- CVE-2017-16645: The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067132).\n- CVE-2017-16646: drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel allowed local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067105).\n- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).\n- CVE-2017-16994: The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel mishandled holes in hugetlb ranges, which allowed local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call (bnc#1069996).\n- CVE-2017-17448: net/netfilter/nfnetlink_cthelper.c in the Linux kernel did not require the CAP_NET_ADMIN capability for new, get, and del operations, which allowed local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces (bnc#1071693).\n- CVE-2017-17449: The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel did not restrict observations of Netlink messages to a single net namespace, which allowed local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system (bnc#1071694).\n- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695).\n- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).\n- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).\n- CVE-2017-7482: Fixed an overflow when decoding a krb5 principal. (bnc#1046107).\n- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).\n\nThe following non-security bugs were fixed:\n\n- Add undefine _unique_build_ids (bsc#964063)\n- adm80211: return an error if adm8211_alloc_rings() fails (bsc#1031717).\n- adv7604: Initialize drive strength to default when using DT (bnc#1012382).\n- af_netlink: ensure that NLMSG_DONE never fails in dumps (bnc#1012382).\n- alsa: hda - Add HP ZBook 15u G3 Conexant CX20724 GPIO mute leds (bsc#1031717).\n- alsa: hda - Add MIC_NO_PRESENCE fixup for 2 HP machines (bsc#1031717).\n- alsa: hda - Add mute led support for HP EliteBook 840 G3 (bsc#1031717).\n- alsa: hda - Add mute led support for HP ProBook 440 G4 (bsc#1031717).\n- alsa: hda: Add Raven PCI ID (bnc#1012382).\n- alsa: hda - add support for docking station for HP 820 G2 (bsc#1031717).\n- alsa: hda - add support for docking station for HP 840 G3 (bsc#1031717).\n- alsa: hda - Apply ALC269_FIXUP_NO_SHUTUP on HDA_FIXUP_ACT_PROBE (bnc#1012382).\n- alsa: hda/ca0132 - Fix memory leak at error path (bsc#1031717).\n- alsa: hda - change the location for one mic on a Lenovo machine (bsc#1031717).\n- alsa: hda: Drop useless WARN_ON() (bsc#1031717).\n- alsa: hda - Fix click noises on Samsung Ativ Book 8 (bsc#1031717).\n- alsa: hda - fix headset mic detection issue on a Dell machine (bsc#1031717).\n- alsa: hda - fix headset mic problem for Dell machines with alc236 (bnc#1012382).\n- alsa: hda - fix headset mic problem for Dell machines with alc274 (bsc#1031717).\n- alsa: hda - Fix headset microphone detection for ASUS N551 and N751 (bsc#1031717).\n- alsa: hda - Fix mic regression by ASRock mobo fixup (bsc#1031717).\n- alsa: hda - Fix missing COEF init for ALC225/295/299 (bsc#1031717).\n- alsa: hda - Fix surround output pins for ASRock B150M mobo (bsc#1031717).\n- alsa: hda - No loopback on ALC299 codec (git-fixes).\n- alsa: hda - On-board speaker fixup on ACER Veriton (bsc#1031717).\n- alsa: hda/realtek - Add ALC256 HP depop function (bsc#1031717).\n- alsa: hda/realtek - Add default procedure for suspend and resume state (bsc#1031717).\n- alsa: hda/realtek: Add headset mic support for Intel NUC Skull Canyon (bsc#1031717).\n- alsa: hda/realtek - Add new codec ID ALC299 (bnc#1012382).\n- alsa: hda/realtek - Add support for Acer Aspire E5-475 headset mic (bsc#1031717).\n- alsa: hda/realtek - Add support for ALC1220 (bsc#1031717).\n- alsa: hda/realtek - Add support for ALC236/ALC3204 (bnc#1012382).\n- alsa: hda/realtek - Add support for headset MIC for ALC622 (bsc#1031717).\n- alsa: hda/realtek - ALC891 headset mode for Dell (bsc#1031717).\n- alsa: hda/realtek - change the location for one of two front microphones (bsc#1031717).\n- alsa: hda/realtek - Enable jack detection function for Intel ALC700 (bsc#1031717).\n- alsa: hda/realtek - Fix ALC275 no sound issue (bsc#1031717).\n- alsa: hda/realtek - Fix ALC700 family no sound issue (bsc#1031717).\n- alsa: hda/realtek - Fix Dell AIO LineOut issue (bsc#1031717).\n- alsa: hda/realtek - Fix headset and mic on several Asus laptops with ALC256 (bsc#1031717).\n- alsa: hda/realtek - Fix headset mic and speaker on Asus X441SA/X441UV (bsc#1031717).\n- alsa: hda/realtek - fix headset mic detection for MSI MS-B120 (bsc#1031717).\n- alsa: hda/realtek - Fix headset mic on several Asus laptops with ALC255 (bsc#1031717).\n- alsa: hda/realtek - Fix pincfg for Dell XPS 13 9370 (bsc#1031717).\n- alsa: hda/realtek - Fix speaker support for Asus AiO ZN270IE (bsc#1031717).\n- alsa: hda/realtek - Fix typo of pincfg for Dell quirk (bsc#1031717).\n- alsa: hda/realtek - New codec device ID for ALC1220 (bsc#1031717).\n- alsa: hda/realtek - New codecs support for ALC215/ALC285/ALC289 (bsc#1031717).\n- alsa: hda/realtek - New codec support for ALC257 (bsc#1031717).\n- alsa: hda/realtek - New codec support of ALC1220 (bsc#1031717).\n- alsa: hda/realtek - No loopback on ALC225/ALC295 codec (bsc#1031717).\n- alsa: hda/realtek - Remove ALC285 device ID (bsc#1031717).\n- alsa: hda/realtek - Support Dell headset mode for ALC3271 (bsc#1031717).\n- alsa: hda/realtek - Support headset mode for ALC234/ALC274/ALC294 (bsc#1031717).\n- alsa: hda/realtek - There is no loopback mixer in the ALC234/274/294 (bsc#1031717).\n- alsa: hda/realtek - Update headset mode for ALC225 (bsc#1031717).\n- alsa: hda/realtek - Update headset mode for ALC298 (bsc#1031717).\n- alsa: hda - Skip Realtek SKU check for Lenovo machines (bsc#1031717).\n- alsa: pcm: prevent UAF in snd_pcm_info (bsc#1031717).\n- alsa: pcm: update tstamp only if audio_tstamp changed (bsc#1031717).\n- alsa: rawmidi: Avoid racy info ioctl via ctl device (bsc#1031717).\n- alsa: seq: Avoid invalid lockdep class warning (bsc#1031717).\n- alsa: seq: Fix nested rwsem annotation for lockdep splat (bnc#1012382).\n- alsa: seq: Fix OSS sysex delivery in OSS emulation (bnc#1012382).\n- alsa: seq: Remove spurious WARN_ON() at timer check (bsc#1031717).\n- alsa: timer: Add missing mutex lock for compat ioctls (bnc#1012382).\n- alsa: timer: Remove kernel warning at compat ioctl error paths (bsc#1031717).\n- alsa: usb-audio: Add check return value for usb_string() (bsc#1031717).\n- alsa: usb-audio: Add sanity checks in v2 clock parsers (bsc#1031717).\n- alsa: usb-audio: Add sanity checks to FE parser (bsc#1031717).\n- alsa: usb-audio: Fix out-of-bound error (bsc#1031717).\n- alsa: usb-audio: Fix potential out-of-bound access at parsing SU (bsc#1031717).\n- alsa: usb-audio: Fix the missing ctl name suffix at parsing SU (bsc#1031717).\n- alsa: usb-audio: uac1: Invalidate ctl on interrupt (bsc#1031717).\n- alsa: vx: Do not try to update capture stream before running (bnc#1012382).\n- alsa: vx: Fix possible transfer overflow (bnc#1012382).\n- Always sign validate_negotiate_info reqs (bsc#1071009, fate#324404).\n- apei / ERST: Fix missing error handling in erst_reader() (bsc#1072556).\n- Apply generic ppc build fixes to vanilla (bsc#1070805)\n- arm64: dts: NS2: reserve memory for Nitro firmware (bnc#1012382).\n- arm64: ensure __dump_instr() checks addr_limit (bnc#1012382).\n- arm64: fix dump_instr when PAN and UAO are in use (bnc#1012382).\n- arm: 8715/1: add a private asm/unaligned.h (bnc#1012382).\n- arm: 8720/1: ensure dump_instr() checks addr_limit (bnc#1012382).\n- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bnc#1012382).\n- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bnc#1012382).\n- arm: crypto: reduce priority of bit-sliced AES cipher (bnc#1012382).\n- arm: dts: Fix am335x and dm814x scm syscon to probe children (bnc#1012382).\n- arm: dts: Fix compatible for ti81xx uarts for 8250 (bnc#1012382).\n- arm: dts: Fix omap3 off mode pull defines (bnc#1012382).\n- arm: dts: mvebu: pl310-cache disable double-linefill (bnc#1012382).\n- arm: dts: omap3: logicpd-torpedo-37xx-devkit: Fix MMC1 cd-gpio (bnc#1012382).\n- arm: Hide finish_arch_post_lock_switch() from modules (bsc#1068032).\n- arm: OMAP2+: Fix init for multiple quirks for the same SoC (bnc#1012382).\n- arm: omap2plus_defconfig: Fix probe errors on UARTs 5 and 6 (bnc#1012382).\n- arm: pxa: Do not rely on public mmc header to include leds.h (bnc#1012382).\n- asm/sections: add helpers to check for section data (bsc#1063026).\n- asoc: adau17x1: Workaround for noise bug in ADC (bnc#1012382).\n- asoc: cs42l56: Fix reset GPIO name in example DT binding (bsc#1031717).\n- asoc: davinci-mcasp: Fix an error handling path in \u0027davinci_mcasp_probe()\u0027 (bsc#1031717).\n- asoc: fsl_ssi: AC\u002797 ops need regmap, clock and cleaning up on failure (bsc#1031717).\n- asoc: rsnd: do not double free kctrl (bnc#1012382).\n- asoc: samsung: Fix possible double iounmap on s3c24xx driver probe failure (bsc#1031717).\n- asoc: twl4030: fix child-node lookup (bsc#1031717).\n- asoc: wm_adsp: Do not overrun firmware file buffer when reading region data (bnc#1012382).\n- asoc: wm_adsp: Fix validation of firmware and coeff lengths (bsc#1031717).\n- ata: ATA_BMDMA should depend on HAS_DMA (bnc#1012382).\n- ata: fixes kernel crash while tracing ata_eh_link_autopsy event (bnc#1012382).\n- ata: SATA_HIGHBANK should depend on HAS_DMA (bnc#1012382).\n- ata: SATA_MV should depend on HAS_DMA (bnc#1012382).\n- ath10k: convert warning about non-existent OTP board id to debug message (git-fixes).\n- ath10k: fix a warning during channel switch with multiple vaps (bsc#1031717).\n- ath10k: fix board data fetch error message (bsc#1031717).\n- ath10k: fix diag_read to collect data for larger memory (bsc#1031717).\n- ath10k: fix incorrect txpower set by P2P_DEVICE interface (bnc#1012382).\n- ath10k: fix potential memory leak in ath10k_wmi_tlv_op_pull_fw_stats() (bnc#1012382).\n- ath10k: free cached fw bin contents when get board id fails (bsc#1031717).\n- ath10k: ignore configuring the incorrect board_id (bnc#1012382).\n- ath10k: set CTS protection VDEV param only if VDEV is up (bnc#1012382).\n- ath9k_htc: check for underflow in ath9k_htc_rx_msg() (bsc#1031717).\n- ath9k: off by one in ath9k_hw_nvram_read_array() (bsc#1031717).\n- autofs: do not fail mount for transient error (bsc#1065180).\n- autofs: fix careless error in recent commit (bnc#1012382 bsc#1065180).\n- backlight: adp5520: Fix error handling in adp5520_bl_probe() (bnc#1012382).\n- backlight: lcd: Fix race condition during register (bnc#1012382).\n- bcache: check ca-\u003ealloc_thread initialized before wake up it (bnc#1012382).\n- bcache: Fix building error on MIPS (bnc#1012382).\n- blacklist.conf: Add ath10k, mmc and rtl8192u commits (bsc#1031717)\n- blacklist.conf: Add drm/i915 blacklist (bsc#1031717)\n- blacklist.conf: added misc commits (bsc#1031717)\n- blacklist.conf: Add misc entries (bsc#1031717)\n- blacklist.conf: blacklist not-applicable patch (bsc#1071231)\n- blacklist.conf: Update blacklist (bsc#1031717)\n- blacklist.conf: Update iwlwifi blacklist (bsc#1031717)\n- blacklist.conf: yet another serial entry (bsc#1031717)\n- block: Fix a race between blk_cleanup_queue() and timeout handling (FATE#319965, bsc#964944).\n- Bluetooth: btusb: fix QCA Rome suspend/resume (bnc#1012382).\n- bnxt_en: Call firmware to approve the random VF MAC address (bsc#963575 FATE#320144).\n- bnxt_en: Do not setup MAC address in bnxt_hwrm_func_qcaps() (bsc#963575 FATE#320144).\n- bnxt_en: Fix possible corrupted NVRAM parameters from firmware response (bsc#963575 FATE#320144).\n- bnxt_en: Fix VF PCIe link speed and width logic (bsc#963575 FATE#320144).\n- bnxt_en: Re-arrange bnxt_hwrm_func_qcaps() (bsc#963575 FATE#320144).\n- bnxt_en: use eth_hw_addr_random() (bsc#963575 FATE#320144).\n- bonding: discard lowest hash bit for 802.3ad layer3+4 (bnc#1012382).\n- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).\n- brcmfmac: remove setting IBSS mode when stopping AP (bnc#1012382).\n- bt8xx: fix memory leak (bnc#1012382).\n- btrfs: clear space cache inode generation always (bnc#1012382).\n- btrfs: Fix typo in may_commit_transaction Rather than comparing the result of the percpu comparison I was comparing the value of the percpu counter against 0 or 1.\n- btrfs: return the actual error value from from btrfs_uuid_tree_iterate (bnc#1012382).\n- can: c_can: do not indicate triple sampling support for D_CAN (bnc#1012382).\n- can: kvaser_usb: Correct return value in printout (bnc#1012382).\n- can: kvaser_usb: Ignore CMD_FLUSH_QUEUE_REPLY messages (bnc#1012382).\n- can: sun4i: fix loopback mode (bnc#1012382).\n- can: sun4i: handle overrun in RX FIFO (bnc#1012382).\n- carl9170: prevent speculative execution (bnc#1068032).\n- cdc_ncm: Set NTB format again after altsetting switch for Huawei devices (bnc#1012382).\n- ceph: unlock dangling spinlock in try_flush_caps() (bsc#1065639).\n- cgroup, net_cls: iterate the fds of only the tasks which are being migrated (bnc#1064926).\n- Check cmdline_find_option() retval properly and use boot_cpu_has().\n- cifs: add build_path_from_dentry_optional_prefix() (fate#323482)\n- cifs: Add capability to decrypt big read responses (FATE#324404). Allow to decrypt transformed packets that are bigger than the big buffer size. In particular it is used for read responses that can only exceed the big buffer size.\n- cifs: Add capability to transform requests before sending (FATE#324404). This will allow us to do protocol specific tranformations of packets before sending to the server. For SMB3 it can be used to support encryption.\n- cifs: Add copy into pages callback for a read operation (FATE#324404). Since we have two different types of reads (pagecache and direct) we need to process such responses differently after decryption of a packet. The change allows to specify a callback that copies a read payload data into preallocated pages.\n- cifs: Add mid handle callback (FATE#324404). We need to process read responses differently because the data should go directly into preallocated pages. This can be done by specifying a mid handle callback.\n- cifs: Add soft dependencies (FATE#324404). List soft dependencies of cifs so that mkinitrd and dracut can include the required helper modules.\n- cifs: Add transform header handling callbacks (FATE#324404). We need to recognize and parse transformed packets in demultiplex thread to find a corresponsing mid and process it further.\n- cifs: add use_ipc flag to SMB2_ioctl() (fate#323482)\n- cifs: Allow to switch on encryption with seal mount option (FATE#324404). This allows users to inforce encryption for SMB3 shares if a server supports it.\n- cifs: check MaxPathNameComponentLength != 0 before using it (bnc#1012382).\n- cifs: Decrypt and process small encrypted packets (FATE#324404). Allow to decrypt transformed packets, find a corresponding mid and process as usual further.\n- cifs: do not bother with kmap on read_pages side (FATE#324404). just do ITER_BVEC recvmsg\n- cifs: Enable encryption during session setup phase (FATE#324404). In order to allow encryption on SMB connection we need to exchange a session key and generate encryption and decryption keys.\n- cifs: Encrypt SMB3 requests before sending (FATE#324404). This change allows to encrypt packets if it is required by a server for SMB sessions or tree connections.\n- cifs: Fix some return values in case of error in \u0027crypt_message\u0027 (fate#324404).\n- cifs: Fix sparse warnings (fate#323482)\n- cifs: implement get_dfs_refer for SMB2+ (fate#323482)\n- cifs: let ses-\u003eipc_tid hold smb2 TreeIds (fate#323482)\n- cifs: Make send_cancel take rqst as argument (FATE#324404).\n- cifs: Make SendReceive2() takes resp iov (FATE#324404). Now SendReceive2 frees the first iov and returns a response buffer in it that increases a code complexity. Simplify this by making a caller responsible for freeing request buffer itself and returning a response buffer in a separate iov.\n- cifs: move DFS response parsing out of SMB1 code (fate#323482)\n- cifs: no need to wank with copying and advancing iovec on recvmsg side either (FATE#324404).\n- cifs: Only select the required crypto modules (FATE#324404). The sha256 and cmac crypto modules are only needed for SMB2+, so move the select statements to config CIFS_SMB2. Also select CRYPTO_AES there as SMB2+ needs it.\n- cifs: Prepare for encryption support (first part). Add decryption and encryption key generation. (FATE#324404).\n- cifs_readv_receive: use cifs_read_from_socket() (FATE#324404).\n- cifs: remove any preceding delimiter from prefix_path (fate#323482)\n- cifs: Send RFC1001 length in a separate iov (FATE#324404). In order to simplify further encryption support we need to separate RFC1001 length and SMB2 header when sending a request. Put the length field in iov[0] and the rest of the packet into following iovs.\n- cifs: Separate RFC1001 length processing for SMB2 read (FATE#324404). Allocate and initialize SMB2 read request without RFC1001 length field to directly call cifs_send_recv() rather than SendReceive2() in a read codepath.\n- cifs: Separate SMB2 header structure (FATE#324404). In order to support compounding and encryption we need to separate RFC1001 length field and SMB2 header structure because the protocol treats them differently. This change will allow to simplify parsing of such complex SMB2 packets further.\n- cifs: Separate SMB2 sync header processing (FATE#324404). Do not process RFC1001 length in smb2_hdr_assemble() because it is not a part of SMB2 header. This allows to cleanup the code and adds a possibility combine several SMB2 packets into one for compounding.\n- cifs: set signing flag in SMB2+ TreeConnect if needed (fate#323482)\n- cifs: Simplify SMB2 and SMB311 dependencies (FATE#324404). * CIFS_SMB2 depends on CIFS, which depends on INET and selects NLS. So these dependencies do not need to be repeated for CIFS_SMB2. * CIFS_SMB311 depends on CIFS_SMB2, which depends on INET. So this dependency does not need to be repeated for CIFS_SMB311.\n- cifs: use DFS pathnames in SMB2+ Create requests (fate#323482)\n- clk: ti: dra7-atl-clock: fix child-node lookups (bnc#1012382).\n- clk: ti: dra7-atl-clock: Fix of_node reference counting (bnc#1012382).\n- cma: fix calculation of aligned offset (VM Functionality, bsc#1050060).\n- coda: fix \u0027kernel memory exposure attempt\u0027 in fsync (bnc#1012382).\n- crypto: vmx - disable preemption to enable vsx in aes_ctr.c (bnc#1012382).\n- crypto: x86/sha1-mb - fix panic due to unaligned access (bnc#1012382).\n- cw1200: prevent speculative execution (bnc#1068032).\n- cx231xx: Fix I2C on Internal Master 3 Bus (bnc#1012382).\n- cxgb4: Fix error codes in c4iw_create_cq() (bsc#1021424).\n- cxl: Fix DAR check \u0026 use REGION_ID instead of opencoding (bsc#1066223).\n- cxl: Fix leaking pid refs in some error paths (bsc#1066223).\n- cxl: Force context lock during EEH flow (bsc#1066223).\n- cxl: Prevent adapter reset if an active context exists (bsc#1066223).\n- cxl: Route eeh events to all drivers in cxl_pci_error_detected() (bsc#1066223).\n- Disable IPMI fix patches due to regression (bsc#1071833)\n- dmaengine: dmatest: warn user when dma test times out (bnc#1012382).\n- dmaengine: zx: set DMA_CYCLIC cap_mask bit (bnc#1012382).\n- dm bufio: fix integer overflow when limiting maximum cache size (bnc#1012382).\n- dm: fix race between dm_get_from_kobject() and __dm_destroy() (bnc#1012382).\n- drivers: dma-mapping: Do not leave an invalid area-\u003epages pointer in dma_common_contiguous_remap() (Git-fixes, bsc#1065692).\n- drm/amdgpu: when dpm disabled, also need to stop/start vce (bnc#1012382).\n- drm/amdkfd: NULL dereference involving create_process() (bsc#1031717).\n- drm: Apply range restriction after color adjustment when allocation (bnc#1012382).\n- drm/armada: Fix compile fail (bnc#1012382).\n- drm: drm_minor_register(): Clean up debugfs on failure (bnc#1012382).\n- drm: gma500: fix logic error (bsc#1031717).\n- drm/i915/bxt: set min brightness from VBT (bsc#1031717).\n- drm/i915: Do not try indexed reads to alternate slave addresses (bsc#1031717).\n- drm/i915: fix backlight invert for non-zero minimum brightness (bsc#1031717).\n- drm/i915: Prevent zero length \u0027index\u0027 write (bsc#1031717).\n- drm/i915: Read timings from the correct transcoder in intel_crtc_mode_get() (bsc#1031717).\n- drm/msm: fix an integer overflow test (bnc#1012382).\n- drm/msm: Fix potential buffer overflow issue (bnc#1012382).\n- drm/nouveau/gr: fallback to legacy paths during firmware lookup (bsc#1031717).\n- drm/omap: Fix error handling path in \u0027omap_dmm_probe()\u0027 (bsc#1031717).\n- drm/panel: simple: Add missing panel_simple_unprepare() calls (bsc#1031717).\n- drm/radeon: fix atombios on big endian (bnc#1012382).\n- drm/sti: sti_vtg: Handle return NULL error from devm_ioremap_nocache (bnc#1012382).\n- drm/vc4: Fix leak of HDMI EDID (bsc#1031717).\n- drm/vmwgfx: Fix Ubuntu 17.10 Wayland black screen issue (bnc#1012382).\n- e1000e: Avoid receiver overrun interrupt bursts (bsc#969470 FATE#319819).\n- e1000e: Fix e1000_check_for_copper_link_ich8lan return value (bsc#1073809).\n- e1000e: Fix error path in link detection (bnc#1012382).\n- e1000e: Fix return value test (bnc#1012382).\n- e1000e: Separate signaling for link check/link up (bnc#1012382).\n- ecryptfs: fix dereference of NULL user_key_payload (bnc#1012382).\n- eCryptfs: use after free in ecryptfs_release_messaging() (bsc#1012829).\n- eeprom: at24: check at24_read/write arguments (bnc#1012382).\n- epoll: avoid calling ep_call_nested() from ep_poll_safewake() (bsc#1056427).\n- epoll: remove ep_call_nested() from ep_eventpoll_poll() (bsc#1056427).\n- ext4: cleanup goto next group (bsc#1066285).\n- ext4: do not use stripe_width if it is not set (bnc#1012382).\n- ext4: fix interaction between i_size, fallocate, and delalloc after a crash (bnc#1012382).\n- ext4: fix stripe-unaligned allocations (bnc#1012382).\n- ext4: reduce lock contention in __ext4_new_inode (bsc#1066285).\n- extcon: palmas: Check the parent instance to prevent the NULL (bnc#1012382).\n- exynos4-is: fimc-is: Unmap region obtained by of_iomap() (bnc#1012382).\n- fealnx: Fix building error on MIPS (bnc#1012382).\n- fix a page leak in vhost_scsi_iov_to_sgl() error recovery (bnc#1012382).\n- Fix leak of validate_negotiate_info resp (bsc#1071009, fate#324404).\n- Fix NULL pointer deref in SMB2_tcon() (bsc#1071009, fate#324404).\n- Fix serial console on SNI RM400 machines (bsc#1031717).\n- Fix tracing sample code warning (bnc#1012382).\n- Fix validate_negotiate_info uninitialized mem (bsc#1071009, fate#324404).\n- fm10k: request reset when mbx-\u003estate changes (bnc#1012382).\n- fm10k: Use smp_rmb rather than read_barrier_depends (bnc#1012382).\n- fs/9p: Compare qid.path in v9fs_test_inode (bsc#1012829).\n- fscrypt: lock mutex before checking for bounce page pool (bnc#1012382).\n- fs: prevent speculative execution (bnc#1068032).\n- fuse: fix READDIRPLUS skipping an entry (bnc#1012382).\n- genwqe: Take R/W permissions into account when dealing with memory pages (bsc#1073090).\n- gpu: drm: mgag200: mgag200_main:- Handle error from pci_iomap (bnc#1012382).\n- hid: elo: clear BTN_LEFT mapping (bsc#1065866).\n- hsi: ssi_protocol: double free in ssip_pn_xmit() (bsc#1031717).\n- i2c: cadance: fix ctrl/addr reg write order (bsc#1031717).\n- i2c: imx: Use correct function to write to register (bsc#1031717).\n- i2c: riic: correctly finish transfers (bnc#1012382).\n- i2c: riic: fix restart condition (git-fixes).\n- i40e: Use smp_rmb rather than read_barrier_depends (bnc#1012382).\n- i40evf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).\n- ib/core: Fix calculation of maximum RoCE MTU (bsc#1022595 FATE#322350).\n- ib/core: Namespace is mandatory input for address resolution (bsc#1022595 FATE#322350).\n- ib/ipoib: Change list_del to list_del_init in the tx object (bnc#1012382).\n- ib/ipoib: Clean error paths in add port (bsc#1022595 FATE#322350).\n- ib/ipoib: Prevent setting negative values to max_nonsrq_conn_qp (bsc#1022595 FATE#322350).\n- ib/ipoib: Remove double pointer assigning (bsc#1022595 FATE#322350).\n- ib/ipoib: Set IPOIB_NEIGH_TBL_FLUSH after flushed completion initialization (bsc#1022595 FATE#322350).\n- ib/mlx5: Fix RoCE Address Path fields (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- ibmvnic: Add netdev_dbg output for debugging (fate#323285).\n- ibmvnic: Add vnic client data to login buffer (bsc#1069942).\n- ibmvnic: Convert vnic server reported statistics to cpu endian (fate#323285).\n- ibmvnic: Enable scatter-gather support (bsc#1066382).\n- ibmvnic: Enable TSO support (bsc#1066382).\n- ibmvnic: Feature implementation of Vital Product Data (VPD) for the ibmvnic driver (bsc#1069942).\n- ibmvnic: Fix calculation of number of TX header descriptors (bsc#1066382).\n- ibmvnic: fix dma_mapping_error call (bsc#1069942).\n- ibmvnic: Fix failover error path for non-fatal resets (bsc#1066382).\n- ibmvnic: Implement .get_channels (fate#323285).\n- ibmvnic: Implement .get_ringparam (fate#323285).\n- ibmvnic: Implement per-queue statistics reporting (fate#323285).\n- ibmvnic: Include header descriptor support for ARP packets (bsc#1073912).\n- ibmvnic: Increase maximum number of RX/TX queues (bsc#1073912).\n- ibmvnic: Let users change net device features (bsc#1066382).\n- ibmvnic: Rename IBMVNIC_MAX_TX_QUEUES to IBMVNIC_MAX_QUEUES (bsc#1073912).\n- ibmvnic: Update reset infrastructure to support tunable parameters (bsc#1066382).\n- ib/srp: Avoid that a cable pull can trigger a kernel crash (bsc#1022595 FATE#322350).\n- ib/srpt: Do not accept invalid initiator port names (bnc#1012382).\n- ib/uverbs: Fix device cleanup (bsc#1022595 FATE#322350).\n- ib/uverbs: Fix NULL pointer dereference during device removal (bsc#1022595 FATE#322350).\n- igb: close/suspend race in netif_device_detach (bnc#1012382).\n- igb: Fix hw_dbg logging in igb_update_flash_i210 (bnc#1012382).\n- igb: reset the PHY before reading the PHY ID (bnc#1012382).\n- igb: Use smp_rmb rather than read_barrier_depends (bnc#1012382).\n- igbvf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).\n- iio: dummy: events: Add missing break (bsc#1031717).\n- iio: light: fix improper return value (bnc#1012382).\n- iio: trigger: free trigger resource correctly (bnc#1012382).\n- ima: do not update security.ima if appraisal status is not INTEGRITY_PASS (bnc#1012382).\n- input: ar1021_i2c - fix too long name in driver\u0027s device table (bsc#1031717).\n- input: edt-ft5x06 - fix setting gain, offset, and threshold via device tree (bsc#1031717).\n- input: elan_i2c - add ELAN060C to the ACPI table (bnc#1012382).\n- input: elan_i2c - add ELAN0611 to the ACPI table (bnc#1012382).\n- input: gtco - fix potential out-of-bound access (bnc#1012382).\n- input: mpr121 - handle multiple bits change of status register (bnc#1012382).\n- input: mpr121 - set missing event capability (bnc#1012382).\n- input: ti_am335x_tsc - fix incorrect step config for 5 wire touchscreen (bsc#1031717).\n- input: twl4030-pwrbutton - use correct device for irq request (bsc#1031717).\n- input: ucb1400_ts - fix suspend and resume handling (bsc#1031717).\n- input: uinput - avoid crash when sending FF request to device going away (bsc#1031717).\n- iommu/arm-smmu-v3: Clear prior settings when updating STEs (bnc#1012382).\n- iommu/vt-d: Do not register bus-notifier under dmar_global_lock (bsc#1069793).\n- ip6_gre: only increase err_count for some certain type icmpv6 in ip6gre_err (bnc#1012382).\n- ipip: only increase err_count for some certain type icmp in ipip_err (bnc#1012382).\n- ipmi: fix unsigned long underflow (bnc#1012382).\n- ipmi: Pick up slave address from SMBIOS on an ACPI device (bsc#1070006).\n- ipmi: Prefer ACPI system interfaces over SMBIOS ones (bsc#1070006).\n- ipmi_si: Clean up printks (bsc#1070006).\n- ipmi_si: fix memory leak on new_smi (bsc#1070006).\n- ipsec: do not ignore crypto err in ah4 input (bnc#1012382).\n- ipv6: flowlabel: do not leave opt-\u003etot_len with garbage (bnc#1012382).\n- ipv6: only call ip6_route_dev_notify() once for NETDEV_UNREGISTER (bnc#1012382).\n- ipv6: prevent speculative execution (bnc#1068032).\n- ipvs: make drop_entry protection effective for SIP-pe (bsc#1056365).\n- isa: Prevent NULL dereference in isa_bus driver callbacks (bsc#1031717).\n- iscsi-target: Fix non-immediate TMR reference leak (bnc#1012382).\n- isofs: fix timestamps beyond 2027 (bnc#1012382).\n- iwlwifi: mvm: fix the coex firmware API (bsc#1031717).\n- iwlwifi: mvm: return -ENODATA when reading the temperature with the FW down (bsc#1031717).\n- iwlwifi: mvm: set the RTS_MIMO_PROT bit in flag mask when sending sta to fw (bsc#1031717).\n- iwlwifi: split the regulatory rules when the bandwidth flags require it (bsc#1031717).\n- ixgbe: add mask for 64 RSS queues (bnc#1012382).\n- ixgbe: do not disable FEC from the driver (bnc#1012382).\n- ixgbe: fix AER error handling (bnc#1012382).\n- ixgbe: Fix skb list corruption on Power systems (bnc#1012382).\n- ixgbe: handle close/suspend race with netif_device_detach/present (bnc#1012382).\n- ixgbe: Reduce I2C retry count on X550 devices (bnc#1012382).\n- ixgbevf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).\n- kabi fix for new hash_cred function (bsc#1012917).\n- kABI: protect struct regulator_dev (kabi).\n- kABI: protect structs rt_rq+root_domain (kabi).\n- kABI: protect typedef rds_rdma_cookie_t (kabi).\n- kaiser: add \u0027nokaiser\u0027 boot option, using ALTERNATIVE.\n- kaiser: align addition to x86/mm/Makefile.\n- kaiser: asm/tlbflush.h handle noPGE at lower level.\n- kaiser: cleanups while trying for gold link.\n- kaiser: Disable on Xen PV.\n- kaiser: do not set _PAGE_NX on pgd_none.\n- kaiser: drop is_atomic arg to kaiser_pagetable_walk().\n- kaiser: enhanced by kernel and user PCIDs.\n- kaiser: ENOMEM if kaiser_pagetable_walk() NULL.\n- kaiser: fix build and FIXME in alloc_ldt_struct().\n- kaiser: fix perf crashes.\n- kaiser: fix regs to do_nmi() ifndef CONFIG_KAISER.\n- kaiser: fix unlikely error in alloc_ldt_struct().\n- kaiser: KAISER depends on SMP.\n- kaiser: kaiser_flush_tlb_on_return_to_user() check PCID.\n- kaiser: kaiser_remove_mapping() move along the pgd.\n- kaiser: Kernel Address Isolation.\n- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush.\n- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush user.\n- kaiser: name that 0x1000 KAISER_SHADOW_PGD_OFFSET.\n- kaiser: paranoid_entry pass cr3 need to paranoid_exit.\n- kaiser: PCID 0 for kernel and 128 for user.\n- kaiser: _pgd_alloc() without __GFP_REPEAT to avoid stalls.\n- kaiser: stack map PAGE_SIZE at THREAD_SIZE-PAGE_SIZE.\n- kaiser: tidied up asm/kaiser.h somewhat.\n- kaiser: tidied up kaiser_add/remove_mapping slightly.\n- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.\n- kaiser: vmstat show NR_KAISERTABLE as nr_overhead.\n- kaiser: x86_cr3_pcid_noflush and x86_cr3_pcid_user.\n- kernel-docs: unpack the source instead of using kernel-source (bsc#1057199).\n- kernel/sysctl.c: remove duplicate UINT_MAX check on do_proc_douintvec_conv() (bsc#1066470).\n- kernel/watchdog: Prevent false positives with turbo modes (bnc#1063516).\n- keys: do not revoke uninstantiated key in request_key_auth_new() (bsc#1031717).\n- keys: fix cred refcount leak in request_key_auth_new() (bsc#1031717).\n- keys: fix key refcount leak in keyctl_assume_authority() (bsc#1031717).\n- keys: fix key refcount leak in keyctl_read_key() (bsc#1031717).\n- keys: fix NULL pointer dereference during ASN.1 parsing [ver #2] (bnc#1012382).\n- keys: fix out-of-bounds read during ASN.1 parsing (bnc#1012382).\n- keys: return full count in keyring_read() if buffer is too small (bnc#1012382).\n- keys: trusted: fix writing past end of buffer in trusted_read() (bnc#1012382).\n- keys: trusted: sanitize all key material (bnc#1012382).\n- kvm: nVMX: set IDTR and GDTR limits when loading L1 host state (bnc#1012382).\n- kvm: PPC: Book 3S: XICS: correct the real mode ICP rejecting counter (bnc#1012382).\n- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).\n- kvm: SVM: obey guest PAT (bnc#1012382).\n- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).\n- kvm: x86: Exit to user-mode on #UD intercept when emulator requires (bnc#1012382).\n- kvm: x86: inject exceptions produced by x86_decode_insn (bnc#1012382).\n- kvm: x86: pvclock: Handle first-time write to pvclock-page contains random junk (bnc#1012382).\n- l2tp: check ps-\u003esock before running pppol2tp_session_ioctl() (bnc#1012382).\n- libertas: Fix lbs_prb_rsp_limit_set() (bsc#1031717).\n- lib/mpi: call cond_resched() from mpi_powm() loop (bnc#1012382).\n- libnvdimm, namespace: fix label initialization to use valid seq numbers (bnc#1012382).\n- libnvdimm, namespace: make \u0027resource\u0027 attribute only readable by root (bnc#1012382).\n- libnvdimm, pfn: make \u0027resource\u0027 attribute only readable by root (FATE#319858).\n- lib/ratelimit.c: use deferred printk() version (bsc#979928).\n- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).\n- mac80211: agg-tx: call drv_wake_tx_queue in proper context (bsc#1031717).\n- mac80211: do not compare TKIP TX MIC key in reinstall prevention (bsc#1066472).\n- mac80211: do not send SMPS action frame in AP mode when not needed (bsc#1031717).\n- mac80211: Fix addition of mesh configuration element (git-fixes).\n- mac80211: Fix BW upgrade for TDLS peers (bsc#1031717).\n- mac80211: fix mgmt-tx abort cookie and leak (bsc#1031717).\n- mac80211_hwsim: Fix memory leak in hwsim_new_radio_nl() (bsc#1031717).\n- mac80211: Remove invalid flag operations in mesh TSF synchronization (bnc#1012382).\n- mac80211: Remove unused \u0027beaconint_us\u0027 variable (bsc#1031717).\n- mac80211: Remove unused \u0027i\u0027 variable (bsc#1031717).\n- mac80211: Remove unused \u0027len\u0027 variable (bsc#1031717).\n- mac80211: Remove unused \u0027rates_idx\u0027 variable (bsc#1031717).\n- mac80211: Remove unused \u0027sband\u0027 and \u0027local\u0027 variables (bsc#1031717).\n- mac80211: Remove unused \u0027struct ieee80211_rx_status\u0027 ptr (bsc#1031717).\n- mac80211: Suppress NEW_PEER_CANDIDATE event if no room (bnc#1012382).\n- mac80211: TDLS: always downgrade invalid chandefs (bsc#1031717).\n- mac80211: TDLS: change BW calculation for WIDER_BW peers (bsc#1031717).\n- mac80211: use constant time comparison with keys (bsc#1066471).\n- media: au0828: fix RC_CORE dependency (bsc#1031717).\n- media: Do not do DMA on stack for firmware upload in the AS102 driver (bnc#1012382).\n- media: em28xx: calculate left volume level correctly (bsc#1031717).\n- media: mceusb: fix memory leaks in error path (bsc#1031717).\n- media: rc: check for integer overflow (bnc#1012382).\n- media: v4l2-ctrl: Fix flags field on Control events (bnc#1012382).\n- megaraid_sas: Do not fire MR_DCMD_PD_LIST_QUERY to controllers which do not support it (bsc#1027301).\n- mei: return error on notification request to a disconnected client (bnc#1012382).\n- mfd: ab8500-sysctrl: Handle probe deferral (bnc#1012382).\n- mfd: axp20x: Fix axp288 PEK_DBR and PEK_DBF irqs being swapped (bnc#1012382).\n- misc: panel: properly restore atomic counter on error path (bnc#1012382).\n- mmc: block: return error on failed mmc_blk_get() (bsc#1031717).\n- mmc: core: Do not leave the block driver in a suspended state (bnc#1012382).\n- mmc: core/mmci: restore pre/post_req behaviour (bsc#1031717).\n- mmc: dw_mmc: rockchip: Set the drive phase properly (bsc#1031717).\n- mm: check the return value of lookup_page_ext for all call sites (bnc#1068982).\n- mmc: host: omap_hsmmc: avoid possible overflow of timeout value (bsc#1031717).\n- mmc: host: omap_hsmmc: checking for NULL instead of IS_ERR() (bsc#1031717).\n- mmc: mediatek: Fixed size in dma_free_coherent (bsc#1031717).\n- mmc: s3cmci: include linux/interrupt.h for tasklet_struct (bnc#1012382).\n- mmc: sd: limit SD card power limit according to cards capabilities (bsc#1031717).\n- mm, hwpoison: fixup \u0027mm: check the return value of lookup_page_ext for all call sites\u0027 (bnc#1012382).\n- mm/madvise.c: fix madvise() infinite loop under special circumstances (bnc#1070964).\n- mm/mmu_context, sched/core: Fix mmu_context.h assumption (bsc#1068032).\n- mm/page_alloc.c: broken deferred calculation (bnc#1068980).\n- mm, page_alloc: fix potential false positive in __zone_watermark_ok (Git-fixes, bsc#1068978).\n- mm/page_ext.c: check if page_ext is not prepared (bnc#1068982).\n- mm/page_owner: avoid null pointer dereference (bnc#1068982).\n- mm/pagewalk.c: report holes in hugetlb ranges (bnc#1012382).\n- mtd: nand: Fix writing mtdoops to nand flash (bnc#1012382).\n- net: 3com: typhoon: typhoon_init_one: fix incorrect return values (bnc#1012382).\n- net: 3com: typhoon: typhoon_init_one: make return values more specific (bnc#1012382).\n- net/9p: Switch to wait_event_killable() (bnc#1012382).\n- net: Allow IP_MULTICAST_IF to set index to L3 slave (bnc#1012382).\n- net: cdc_ether: fix divide by 0 on bad descriptors (bnc#1012382).\n- net: cdc_ncm: GetNtbFormat endian fix (git-fixes).\n- net: dsa: select NET_SWITCHDEV (bnc#1012382).\n- netfilter/ipvs: clear ipvs_property flag when SKB net namespace changed (bnc#1012382).\n- netfilter: nf_tables: fix oob access (bnc#1012382).\n- netfilter: nft_meta: deal with PACKET_LOOPBACK in netdev family (bnc#1012382).\n- netfilter: nft_queue: use raw_smp_processor_id() (bnc#1012382).\n- net: ibm: ibmvnic: constify vio_device_id (fate#323285).\n- netlink: add a start callback for starting a netlink dump (bnc#1012382).\n- net: mpls: prevent speculative execution (bnc#1068032).\n- net: qmi_wwan: fix divide by 0 on bad descriptors (bnc#1012382).\n- net/sctp: Always set scope_id in sctp_inet6_skb_msgname (bnc#1012382).\n- net/unix: do not show information about sockets from other namespaces (bnc#1012382).\n- nfc: fix device-allocation error return (bnc#1012382).\n- nfsd: deal with revoked delegations appropriately (bnc#1012382).\n- nfsd: Fix another OPEN stateid race (bnc#1012382).\n- nfsd: Fix stateid races between OPEN and CLOSE (bnc#1012382).\n- nfsd: Make init_open_stateid() a bit more whole (bnc#1012382).\n- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).\n- nfs: Fix typo in nomigration mount option (bnc#1012382).\n- nfs: Fix ugly referral attributes (bnc#1012382).\n- nfs: improve shinking of access cache (bsc#1012917).\n- nfs: revalidate \u0027.\u0027 etc correctly on \u0027open\u0027 (bsc#1068951).\n- nfs: revalidate \u0027.\u0027 etc correctly on \u0027open\u0027 (git-fixes). Fix References tag.\n- nfsv4: always set NFS_LOCK_LOST when a lock is lost (bsc#1068951).\n- nilfs2: fix race condition that causes file system corruption (bnc#1012382).\n- nvme: Fix memory order on async queue deletion (bnc#1012382).\n- ocfs2: fstrim: Fix start offset of first cluster group during fstrim (bnc#1012382).\n- ocfs2: should wait dio before inode lock in ocfs2_setattr() (bnc#1012382).\n- p54: prevent speculative execution (bnc#1068032).\n- packet: avoid panic in packet_getsockopt() (bnc#1012382).\n- parisc: Fix validity check of pointer size argument in new CAS implementation (bnc#1012382).\n- pci: Apply _HPX settings only to relevant devices (bnc#1012382).\n- pci: mvebu: Handle changes to the bridge windows while enabled (bnc#1012382).\n- perf tools: Fix build failure on perl script context (bnc#1012382).\n- perf tools: Only increase index if perf_evsel__new_idx() succeeds (bnc#1012382).\n- perf/x86/intel/bts: Fix exclusive event reference leak (git-fixes d2878d642a4ed).\n- phy: increase size of MII_BUS_ID_SIZE and bus_id (bnc#1012382).\n- pkcs#7: fix unitialized boolean \u0027want\u0027 (bnc#1012382).\n- platform/x86: acer-wmi: setup accelerometer when ACPI device was found (bsc#1031717).\n- platform/x86: hp-wmi: Do not shadow error values (bnc#1012382).\n- platform/x86: hp-wmi: Fix detection for dock and tablet mode (bnc#1012382).\n- platform/x86: hp-wmi: Fix error value for hp_wmi_tablet_state (bnc#1012382).\n- platform/x86: intel_mid_thermal: Fix module autoload (bnc#1012382).\n- platform/x86: sony-laptop: Fix error handling in sony_nc_setup_rfkill() (bsc#1031717).\n- pm / OPP: Add missing of_node_put(np) (bnc#1012382).\n- power: bq27xxx_battery: Fix bq27541 AveragePower register address (bsc#1031717).\n- power: bq27xxx: fix reading for bq27000 and bq27010 (bsc#1031717).\n- powercap: Fix an error code in powercap_register_zone() (bsc#1031717).\n- power: ipaq-micro-battery: freeing the wrong variable (bsc#1031717).\n- powerpc/64: Fix race condition in setting lock bit in idle/wakeup code (bsc#1066223).\n- powerpc/barrier: add gmb.\n- powerpc/bpf/jit: Disable classic BPF JIT on ppc64le (bsc#1066223).\n- powerpc/corenet: explicitly disable the SDHC controller on kmcoge4 (bnc#1012382).\n- powerpc: Correct instruction code for xxlor instruction (bsc#1066223).\n- powerpc: Fix VSX enabling/flushing to also test MSR_FP and MSR_VEC (bsc#1066223).\n- powerpc/mm: Fix check of multiple 16G pages from device tree (bsc#1066223).\n- powerpc/mm: Fix virt_addr_valid() etc. on 64-bit hash (bsc#1066223).\n- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201, bsc#1066223).\n- powerpc/mm/hash: Free the subpage_prot_table correctly (bsc#1066223).\n- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1066223).\n- powerpc/numa: Fix whitespace in hot_add_drconf_memory_max() (bsc#1066223).\n- powerpc/opal: Fix EBUSY bug in acquiring tokens (bsc#1066223).\n- powerpc/perf: Remove PPMU_HAS_SSLOT flag for Power8 (bsc#1066223).\n- powerpc/powernv/ioda: Fix endianness when reading TCEs (bsc#1066223).\n- powerpc/powernv: Make opal_event_shutdown() callable from IRQ context (bsc#1066223).\n- powerpc/pseries/vio: Dispose of virq mapping on vdevice unregister (bsc#1067888).\n- powerpc/pseries/vio: Dispose of virq mapping on vdevice unregister (bsc#1067888).\n- powerpc: Secure memory rfi flush (bsc#1068032).\n- powerpc/signal: Properly handle return value from uprobe_deny_signal() (bsc#1066223).\n- powerpc/sysrq: Fix oops whem ppmu is not registered (bsc#1066223).\n- power: supply: bq27xxx_battery: Fix register map for BQ27510 and BQ27520 (\u0027bsc#1069270\u0027).\n- power: supply: isp1704: Fix unchecked return value of devm_kzalloc (bsc#1031717).\n- power: supply: lp8788: prevent out of bounds array access (bsc#1031717).\n- power_supply: tps65217-charger: Fix NULL deref during property export (bsc#1031717).\n- ppp: fix race in ppp device destruction (bnc#1012382).\n- Prevent timer value 0 for MWAITX (bsc#1065717).\n- printk/console: Always disable boot consoles that use init memory before it is freed (bsc#1063026).\n- printk/console: Enhance the check for consoles using init memory (bsc#1063026).\n- printk: include \u003casm/sections.h\u003e instead of \u003casm-generic/sections.h\u003e (bsc#1063026).\n- printk: only unregister boot consoles when necessary (bsc#1063026).\n- pti: unbreak EFI (bsc#1074709).\n- ptrace: Add a new thread access check (bsc#1068032).\n- qla2xxx: prevent speculative execution (bnc#1068032).\n- quota: Check for register_shrinker() failure (bsc#1012829).\n- r8169: Do not increment tx_dropped in TX ring cleaning (bsc#1031717).\n- rbd: use GFP_NOIO for parent stat and data requests (bnc#1012382).\n- rdma/uverbs: Prevent leak of reserved field (bsc#1022595 FATE#322350).\n- rds: RDMA: return appropriate error on rdma map failures (bnc#1012382).\n- Redo encryption backport to fix pkt signing (bsc#1071009, fate#324404).\n- regulator: core: Limit propagation of parent voltage count and list (bsc#1070145).\n- regulator: fan53555: fix I2C device ids (bnc#1012382).\n- Revert \u0027crypto: xts - Add ECB dependency\u0027 (bnc#1012382).\n- Revert \u0027drm: bridge: add DT bindings for TI ths8135\u0027 (bnc#1012382).\n- Revert \u0027drm/radeon: dont switch vt on suspend\u0027 (bnc#1012382).\n- Revert \u0027ipsec: Fix aborted xfrm policy dump crash\u0027 (kabi).\n- Revert \u0027netlink: add a start callback for starting a netlink dump\u0027 (kabi).\n- Revert \u0027phy: increase size of MII_BUS_ID_SIZE and bus_id\u0027 (kabi).\n- Revert \u0027sctp: do not peel off an assoc from one netns to another one\u0027 (bnc#1012382).\n- Revert \u0027uapi: fix linux/rds.h userspace compilation errors\u0027 (bnc#1012382).\n- rpm/kernel-binary.spec.in: add the kernel-binary dependencies to kernel-binary-base (bsc#1060333).\n- rpm/kernel-binary.spec.in: Correct supplements for recent SLE products (bsc#1067494)\n- rpm/kernel-binary.spec.in: only rewrite modules.dep if non-zero in size (bsc#1056979).\n- rtc: ds1307: Fix relying on reset value for weekday (bsc#1031717).\n- rtc: ds1374: wdt: Fix issue with timeout scaling from secs to wdt ticks (bsc#1031717).\n- rtc: ds1374: wdt: Fix stop/start ioctl always returning -EINVAL (bsc#1031717).\n- rtc: rtc-nuc900: fix loop timeout test (bsc#1031717).\n- rtc: sa1100: fix unbalanced clk_prepare_enable/clk_disable_unprepare (bsc#1031717).\n- rt/fs/dcache: Convert s_anon_lock to a raw spinlock for RT\n- rtlwifi: fix uninitialized rtlhal-\u003elast_suspend_sec time (bnc#1012382).\n- rtlwifi: rtl8192ee: Fix memory leak when loading firmware (bnc#1012382).\n- rtlwifi: rtl8821ae: Fix HW_VAR_NAV_UPPER operation (bsc#1031717).\n- s390: add ppa to system call and program check path (bsc#1068032).\n- s390/dasd: check for device error pointer within state change interrupts (bnc#1012382).\n- s390/disassembler: add missing end marker for e7 table (bnc#1012382).\n- s390/disassembler: correct disassembly lines alignment (bsc#1070825).\n- s390/disassembler: increase show_code buffer size (bnc#1012382).\n- s390: fix transactional execution control register handling (bnc#1012382).\n- s390: introduce CPU alternatives.\n- s390: introduce CPU alternatives (bsc#1068032).\n- s390/kbuild: enable modversions for symbols exported from asm (bnc#1012382).\n- s390/qeth: issue STARTLAN as first IPA command (bnc#1012382).\n- s390/runtime instrumention: fix possible memory corruption (bnc#1012382).\n- s390/spinlock: add gmb memory barrier\n- s390/spinlock: add gmb memory barrier (bsc#1068032).\n- s390/spinlock: add ppa to system call path Signoff the s390 patches.\n- sched/core: Add switch_mm_irqs_off() and use it in the scheduler (bsc#1068032).\n- sched/core: Idle_task_exit() shouldn\u0027t use switch_mm_irqs_off() (bsc#1068032).\n- sched: Make resched_cpu() unconditional (bnc#1012382).\n- sched/rt: Do not pull from current CPU if only one CPU to pull (bnc#1022476).\n- sched/rt: Simplify the IPI based RT balancing logic (bnc#1012382).\n- scsi: aacraid: Process Error for response I/O (bnc#1012382).\n- scsi_devinfo: cleanly zero-pad devinfo strings (bsc#1062941).\n- scsi_dh_alua: skip RTPG for devices only supporting active/optimized (bsc#1064311).\n- scsi: ipr: Fix scsi-mq lockdep issue (bsc#1066213).\n- scsi: ipr: Set no_report_opcodes for RAID arrays (bsc#1066213).\n- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1056003).\n- scsi: lpfc: Add missing memory barrier (bnc#1012382).\n- scsi: lpfc: Clear the VendorVersion in the PLOGI/PLOGI ACC payload (bnc#1012382).\n- scsi: lpfc: Correct host name in symbolic_name field (bnc#1012382).\n- scsi: lpfc: Correct issue leading to oops during link reset (bnc#1012382).\n- scsi: lpfc: FCoE VPort enable-disable does not bring up the VPort (bnc#1012382).\n- scsi_scan: Exit loop if TUR to LUN0 fails with 0x05/0x25 (bsc#1063043). This is specific to FUJITSU ETERNUS_DX* targets. They can return \u0027Illegal Request - Logical unit not supported\u0027 and processing should leave the timeout loop in this case.\n- scsi: scsi_devinfo: fixup string compare (bsc#1062941).\n- scsi: scsi_devinfo: handle non-terminated strings (bsc#1062941).\n- scsi: ses: check return code from ses_recv_diag() (bsc#1039616).\n- scsi: ses: Fixup error message \u0027failed to get diagnostic page 0xffffffea\u0027 (bsc#1039616).\n- scsi: ses: Fix wrong page error (bsc#1039616).\n- scsi: ses: make page2 support optional (bsc#1039616).\n- scsi: sg: Re-fix off by one in sg_fill_request_table() (bnc#1012382).\n- scsi: ufs: add capability to keep auto bkops always enabled (bnc#1012382).\n- scsi: ufs-qcom: Fix module autoload (bnc#1012382).\n- scsi: virtio_scsi: let host do exception handling (bsc#1060682).\n- scsi: zfcp: fix erp_action use-before-initialize in REC action trace (bnc#1012382).\n- sctp: add the missing sock_owned_by_user check in sctp_icmp_redirect (bnc#1012382).\n- sctp: do not peel off an assoc from one netns to another one (bnc#1012382).\n- sctp: do not peel off an assoc from one netns to another one (bnc#1012382).\n- sctp: reset owner sk for data chunks on out queues when migrating a sock (bnc#1012382).\n- security/keys: add CONFIG_KEYS_COMPAT to Kconfig (bnc#1012382).\n- selftests: firmware: add empty string and async tests (bnc#1012382).\n- selftests: firmware: send expected errors to /dev/null (bnc#1012382).\n- serial: 8250_fintek: Fix rs485 disablement on invalid ioctl() (bsc#1031717).\n- serial: 8250_uniphier: fix serial port index in private data (bsc#1031717).\n- serial: omap: Fix EFR write on RTS deassertion (bnc#1012382).\n- serial: Remove unused port type (bsc#1066045).\n- serial: sh-sci: Fix register offsets for the IRDA serial port (bnc#1012382).\n- smb2: Fix share type handling (bnc#1074392).\n- smb3: parsing for new snapshot timestamp mount parm (FATE#324404). New mount option \u0027snapshot=\u003ctime\u003e\u0027 to allow mounting an earlier version of the remote volume (if such a snapshot exists on the server). Note that eventually specifying a snapshot time of 1 will allow the user to mount the oldest snapshot. A subsequent patch add the processing for that and another for actually specifying the \u0027time warp\u0027 create context on SMB2/SMB3 open. Check to make sure SMB2 negotiated, and ensure that we use a different tcon if mount same share twice but with different snaphshot times\n- spi: SPI_FSL_DSPI should depend on HAS_DMA (bnc#1012382).\n- spi: uapi: spidev: add missing ioctl header (bnc#1012382).\n- staging: iio: cdc: fix improper return value (bnc#1012382).\n- staging: lustre: hsm: stack overrun in hai_dump_data_field (bnc#1012382).\n- staging: lustre: llite: do not invoke direct_IO for the EOF case (bnc#1012382).\n- staging: lustre: ptlrpc: skip lock if export failed (bnc#1012382).\n- staging: r8712u: Fix Sparse warning in rtl871x_xmit.c (bnc#1012382).\n- staging: rtl8188eu: fix incorrect ERROR tags from logs (bnc#1012382).\n- staging: rtl8712: fixed little endian problem (bnc#1012382).\n- staging: rtl8712u: Fix endian settings for structs describing network packets (bnc#1012382).\n- sunrpc: add auth_unix hash_cred() function (bsc#1012917).\n- sunrpc: add generic_auth hash_cred() function (bsc#1012917).\n- sunrpc: add hash_cred() function to rpc_authops struct (bsc#1012917).\n- sunrpc: add RPCSEC_GSS hash_cred() function (bsc#1012917).\n- sunrpc: Fix tracepoint storage issues with svc_recv and svc_rqst_status (bnc#1012382).\n- sunrpc: replace generic auth_cred hash with auth-specific function (bsc#1012917).\n- sunrpc: use supplimental groups in auth hash (bsc#1012917).\n- target: fix ALUA state file path truncation (bsc#1071231).\n- target: Fix node_acl demo-mode + uncached dynamic shutdown regression (bnc#1012382).\n- target: fix PR state file path truncation (bsc#1071231).\n- target: Fix QUEUE_FULL + SCSI task attribute handling (bnc#1012382).\n- target/iscsi: Fix iSCSI task reassignment handling (bnc#1012382).\n- tcp/dccp: fix ireq-\u003eopt races (bnc#1012382).\n- tcp/dccp: fix lockdep splat in inet_csk_route_req() (bnc#1012382).\n- tcp/dccp: fix other lockdep splats accessing ireq_opt (bnc#1012382).\n- tcp: do not mangle skb-\u003ecb[] in tcp_make_synack() (bnc#1012382).\n- tcp: fix tcp_mtu_probe() vs highest_sack (bnc#1012382).\n- test: firmware_class: report errors properly on failure (bnc#1012382).\n- thermal/int340x: prevent speculative execution (bnc#1068032).\n- tipc: fix link attribute propagation bug (bnc#1012382).\n- tools: firmware: check for distro fallback udev cancel rule (bnc#1012382).\n- tracing/samples: Fix creation and deletion of simple_thread_fn creation (bnc#1012382).\n- tun: allow positive return values on dev_get_valid_name() call (bnc#1012382).\n- tun: call dev_get_valid_name() before register_netdevice() (bnc#1012382).\n- tun/tap: sanitize TUNSETSNDBUF input (bnc#1012382).\n- uapi: fix linux/rds.h userspace compilation error (bnc#1012382).\n- uapi: fix linux/rds.h userspace compilation errors (bnc#1012382).\n- udf: prevent speculative execution (bnc#1068032).\n- usb: Add delay-init quirk for Corsair K70 LUX keyboards (bnc#1012382).\n- usb: hcd: initialize hcd-\u003eflags to 0 when rm hcd (bnc#1012382).\n- usb: host: fix incorrect updating of offset (bsc#1047487).\n- usb: serial: garmin_gps: fix I/O after failed probe and remove (bnc#1012382).\n- usb: serial: garmin_gps: fix memory leak on probe errors (bnc#1012382).\n- usb: serial: qcserial: add pid/vid for Sierra Wireless EM7355 fw update (bnc#1012382).\n- usb: usbfs: compute urb-\u003eactual_length for isochronous (bnc#1012382).\n- usb: usbtest: fix NULL pointer dereference (bnc#1012382).\n- usb: xhci: Handle error condition in xhci_stop_device() (bnc#1012382).\n- userns: prevent speculative execution (bnc#1068032).\n- uvcvideo: prevent speculative execution (bnc#1068032).\n- vfs: expedite unmount (bsc#1024412).\n- video: fbdev: pmag-ba-fb: Remove bad `__init\u0027 annotation (bnc#1012382).\n- video: udlfb: Fix read EDID timeout (bsc#1031717).\n- vlan: fix a use-after-free in vlan_device_event() (bnc#1012382).\n- vsock: use new wait API for vsock_stream_sendmsg() (bnc#1012382).\n- vxlan: correctly handle ipv6.disable module parameter (bsc#1072962).\n- workqueue: Fix NULL pointer dereference (bnc#1012382).\n- workqueue: replace pool-\u003emanager_arb mutex with a flag (bnc#1012382).\n- x86/boot: Add early cmdline parsing for options with arguments.\n- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).\n- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).\n- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).\n- x86/CPU: Check speculation control CPUID bit (bsc#1068032).\n- x86/decoder: Add new TEST instruction pattern (bnc#1012382).\n- x86/efi-bgrt: Fix kernel panic when mapping BGRT data (bnc#1012382).\n- x86/efi-bgrt: Replace early_memremap() with memremap() (bnc#1012382).\n- x86/efi: Build our own page table structures (bnc#1012382).\n- x86/efi: Hoist page table switching code into efi_call_virt() (bnc#1012382).\n- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).\n- x86/entry: Add a function to overwrite the RSB (bsc#1068032).\n- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).\n- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).\n- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).\n- x86/idle: Toggle IBRS when going idle (bsc#1068032).\n- x86/kaiser: Check boottime cmdline params.\n- x86/kaiser: Move feature detection up (bsc#1068032).\n- x86/kaiser: Reenable PARAVIRT.\n- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.\n- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).\n- x86/kvm: Flush IBP when switching VMs (bsc#1068032).\n- x86/kvm: Pad RSB on VM transition (bsc#1068032).\n- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).\n- x86/MCE/AMD: Always give panic severity for UC errors in kernel context (git-fixes bf80bbd7dcf5).\n- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).\n- x86/microcode/intel: Disable late loading on model 79 (bnc#1012382).\n- x86/mm/64: Fix reboot interaction with CR4.PCIDE (bsc#1068032).\n- x86/mm: Add a \u0027noinvpcid\u0027 boot option to turn off INVPCID (bsc#1068032).\n- x86/mm: Add INVPCID helpers (bsc#1068032).\n- x86/mm: Add the \u0027nopcid\u0027 boot option to turn off PCID (bsc#1068032).\n- x86/mm: Build arch/x86/mm/tlb.c even on !SMP (bsc#1068032).\n- x86/mm: Enable CR4.PCIDE on supported systems (bsc#1068032).\n- x86/mm: Fix INVPCID asm constraint (bsc#1068032).\n- x86/mm: If INVPCID is available, use it to flush global mappings (bsc#1068032).\n- x86/mm: Make flush_tlb_mm_range() more predictable (bsc#1068032).\n- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).\n- x86/mm/pat: Ensure cpa-\u003epfn only contains page frame numbers (bnc#1012382).\n- x86/mm: Reimplement flush_tlb_page() using flush_tlb_mm_range() (bsc#1068032).\n- x86/mm: Remove flush_tlb() and flush_tlb_current_task() (bsc#1068032).\n- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code (bsc#1068032).\n- x86/mm, sched/core: Turn off IRQs in switch_mm() (bsc#1068032).\n- x86/mm, sched/core: Uninline switch_mm() (bsc#1068032).\n- x86/mm: Set IBPB upon context switch (bsc#1068032).\n- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).\n- x86/oprofile/ppro: Do not use __this_cpu*() in preemptible context (bnc#1012382).\n- x86/paravirt: Dont patch flush_tlb_single (bsc#1068032).\n- x86/spec: Add IBRS control functions (bsc#1068032).\n- x86/spec: Add \u0027nospec\u0027 chicken bit (bsc#1068032).\n- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).\n- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).\n- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).\n- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).\n- x86/svm: Add code to clear registers on VM exit (bsc#1068032).\n- x86/svm: Clobber the RSB on VM exit (bsc#1068032).\n- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).\n- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).\n- x86/uaccess, sched/preempt: Verify access_ok() context (bnc#1012382).\n- xen: do not print error message in case of missing Xenstore entry (bnc#1012382).\n- xen/events: events_fifo: Do not use {get,put}_cpu() in xen_evtchn_fifo_init() (bnc#1065600).\n- xen: fix booting ballooned down hvm guest (bnc#1065600).\n- xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1012382).\n- xen/manage: correct return value check on xenbus_scanf() (bnc#1012382).\n- xen-netback: fix error handling output (bnc#1065600).\n- xen: x86: mark xen_find_pt_base as __init (bnc#1065600).\n- xen: xenbus driver must not accept invalid transaction ids (bnc#1012382).\n- zd1211rw: fix NULL-deref at probe (bsc#1031717).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-RT-12-SP2-2018-145",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0213-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0213-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180213-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0213-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html"
},
{
"category": "self",
"summary": "SUSE Bug 1010201",
"url": "https://bugzilla.suse.com/1010201"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1012829",
"url": "https://bugzilla.suse.com/1012829"
},
{
"category": "self",
"summary": "SUSE Bug 1012917",
"url": "https://bugzilla.suse.com/1012917"
},
{
"category": "self",
"summary": "SUSE Bug 1021424",
"url": "https://bugzilla.suse.com/1021424"
},
{
"category": "self",
"summary": "SUSE Bug 1022476",
"url": "https://bugzilla.suse.com/1022476"
},
{
"category": "self",
"summary": "SUSE Bug 1022595",
"url": "https://bugzilla.suse.com/1022595"
},
{
"category": "self",
"summary": "SUSE Bug 1024412",
"url": "https://bugzilla.suse.com/1024412"
},
{
"category": "self",
"summary": "SUSE Bug 1027301",
"url": "https://bugzilla.suse.com/1027301"
},
{
"category": "self",
"summary": "SUSE Bug 1031717",
"url": "https://bugzilla.suse.com/1031717"
},
{
"category": "self",
"summary": "SUSE Bug 1039616",
"url": "https://bugzilla.suse.com/1039616"
},
{
"category": "self",
"summary": "SUSE Bug 1046107",
"url": "https://bugzilla.suse.com/1046107"
},
{
"category": "self",
"summary": "SUSE Bug 1047487",
"url": "https://bugzilla.suse.com/1047487"
},
{
"category": "self",
"summary": "SUSE Bug 1050060",
"url": "https://bugzilla.suse.com/1050060"
},
{
"category": "self",
"summary": "SUSE Bug 1050231",
"url": "https://bugzilla.suse.com/1050231"
},
{
"category": "self",
"summary": "SUSE Bug 1056003",
"url": "https://bugzilla.suse.com/1056003"
},
{
"category": "self",
"summary": "SUSE Bug 1056365",
"url": "https://bugzilla.suse.com/1056365"
},
{
"category": "self",
"summary": "SUSE Bug 1056427",
"url": "https://bugzilla.suse.com/1056427"
},
{
"category": "self",
"summary": "SUSE Bug 1056979",
"url": "https://bugzilla.suse.com/1056979"
},
{
"category": "self",
"summary": "SUSE Bug 1057199",
"url": "https://bugzilla.suse.com/1057199"
},
{
"category": "self",
"summary": "SUSE Bug 1060333",
"url": "https://bugzilla.suse.com/1060333"
},
{
"category": "self",
"summary": "SUSE Bug 1060682",
"url": "https://bugzilla.suse.com/1060682"
},
{
"category": "self",
"summary": "SUSE Bug 1061756",
"url": "https://bugzilla.suse.com/1061756"
},
{
"category": "self",
"summary": "SUSE Bug 1062941",
"url": "https://bugzilla.suse.com/1062941"
},
{
"category": "self",
"summary": "SUSE Bug 1063026",
"url": "https://bugzilla.suse.com/1063026"
},
{
"category": "self",
"summary": "SUSE Bug 1063043",
"url": "https://bugzilla.suse.com/1063043"
},
{
"category": "self",
"summary": "SUSE Bug 1063516",
"url": "https://bugzilla.suse.com/1063516"
},
{
"category": "self",
"summary": "SUSE Bug 1064311",
"url": "https://bugzilla.suse.com/1064311"
},
{
"category": "self",
"summary": "SUSE Bug 1064926",
"url": "https://bugzilla.suse.com/1064926"
},
{
"category": "self",
"summary": "SUSE Bug 1065180",
"url": "https://bugzilla.suse.com/1065180"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065639",
"url": "https://bugzilla.suse.com/1065639"
},
{
"category": "self",
"summary": "SUSE Bug 1065692",
"url": "https://bugzilla.suse.com/1065692"
},
{
"category": "self",
"summary": "SUSE Bug 1065717",
"url": "https://bugzilla.suse.com/1065717"
},
{
"category": "self",
"summary": "SUSE Bug 1065866",
"url": "https://bugzilla.suse.com/1065866"
},
{
"category": "self",
"summary": "SUSE Bug 1066045",
"url": "https://bugzilla.suse.com/1066045"
},
{
"category": "self",
"summary": "SUSE Bug 1066192",
"url": "https://bugzilla.suse.com/1066192"
},
{
"category": "self",
"summary": "SUSE Bug 1066213",
"url": "https://bugzilla.suse.com/1066213"
},
{
"category": "self",
"summary": "SUSE Bug 1066223",
"url": "https://bugzilla.suse.com/1066223"
},
{
"category": "self",
"summary": "SUSE Bug 1066285",
"url": "https://bugzilla.suse.com/1066285"
},
{
"category": "self",
"summary": "SUSE Bug 1066382",
"url": "https://bugzilla.suse.com/1066382"
},
{
"category": "self",
"summary": "SUSE Bug 1066470",
"url": "https://bugzilla.suse.com/1066470"
},
{
"category": "self",
"summary": "SUSE Bug 1066471",
"url": "https://bugzilla.suse.com/1066471"
},
{
"category": "self",
"summary": "SUSE Bug 1066472",
"url": "https://bugzilla.suse.com/1066472"
},
{
"category": "self",
"summary": "SUSE Bug 1066573",
"url": "https://bugzilla.suse.com/1066573"
},
{
"category": "self",
"summary": "SUSE Bug 1066606",
"url": "https://bugzilla.suse.com/1066606"
},
{
"category": "self",
"summary": "SUSE Bug 1066629",
"url": "https://bugzilla.suse.com/1066629"
},
{
"category": "self",
"summary": "SUSE Bug 1067105",
"url": "https://bugzilla.suse.com/1067105"
},
{
"category": "self",
"summary": "SUSE Bug 1067132",
"url": "https://bugzilla.suse.com/1067132"
},
{
"category": "self",
"summary": "SUSE Bug 1067494",
"url": "https://bugzilla.suse.com/1067494"
},
{
"category": "self",
"summary": "SUSE Bug 1067888",
"url": "https://bugzilla.suse.com/1067888"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068671",
"url": "https://bugzilla.suse.com/1068671"
},
{
"category": "self",
"summary": "SUSE Bug 1068951",
"url": "https://bugzilla.suse.com/1068951"
},
{
"category": "self",
"summary": "SUSE Bug 1068978",
"url": "https://bugzilla.suse.com/1068978"
},
{
"category": "self",
"summary": "SUSE Bug 1068980",
"url": "https://bugzilla.suse.com/1068980"
},
{
"category": "self",
"summary": "SUSE Bug 1068982",
"url": "https://bugzilla.suse.com/1068982"
},
{
"category": "self",
"summary": "SUSE Bug 1069270",
"url": "https://bugzilla.suse.com/1069270"
},
{
"category": "self",
"summary": "SUSE Bug 1069496",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "self",
"summary": "SUSE Bug 1069702",
"url": "https://bugzilla.suse.com/1069702"
},
{
"category": "self",
"summary": "SUSE Bug 1069793",
"url": "https://bugzilla.suse.com/1069793"
},
{
"category": "self",
"summary": "SUSE Bug 1069942",
"url": "https://bugzilla.suse.com/1069942"
},
{
"category": "self",
"summary": "SUSE Bug 1069996",
"url": "https://bugzilla.suse.com/1069996"
},
{
"category": "self",
"summary": "SUSE Bug 1070006",
"url": "https://bugzilla.suse.com/1070006"
},
{
"category": "self",
"summary": "SUSE Bug 1070145",
"url": "https://bugzilla.suse.com/1070145"
},
{
"category": "self",
"summary": "SUSE Bug 1070535",
"url": "https://bugzilla.suse.com/1070535"
},
{
"category": "self",
"summary": "SUSE Bug 1070767",
"url": "https://bugzilla.suse.com/1070767"
},
{
"category": "self",
"summary": "SUSE Bug 1070771",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "self",
"summary": "SUSE Bug 1070805",
"url": "https://bugzilla.suse.com/1070805"
},
{
"category": "self",
"summary": "SUSE Bug 1070825",
"url": "https://bugzilla.suse.com/1070825"
},
{
"category": "self",
"summary": "SUSE Bug 1070964",
"url": "https://bugzilla.suse.com/1070964"
},
{
"category": "self",
"summary": "SUSE Bug 1071009",
"url": "https://bugzilla.suse.com/1071009"
},
{
"category": "self",
"summary": "SUSE Bug 1071231",
"url": "https://bugzilla.suse.com/1071231"
},
{
"category": "self",
"summary": "SUSE Bug 1071693",
"url": "https://bugzilla.suse.com/1071693"
},
{
"category": "self",
"summary": "SUSE Bug 1071694",
"url": "https://bugzilla.suse.com/1071694"
},
{
"category": "self",
"summary": "SUSE Bug 1071695",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "self",
"summary": "SUSE Bug 1071833",
"url": "https://bugzilla.suse.com/1071833"
},
{
"category": "self",
"summary": "SUSE Bug 1072556",
"url": "https://bugzilla.suse.com/1072556"
},
{
"category": "self",
"summary": "SUSE Bug 1072962",
"url": "https://bugzilla.suse.com/1072962"
},
{
"category": "self",
"summary": "SUSE Bug 1073090",
"url": "https://bugzilla.suse.com/1073090"
},
{
"category": "self",
"summary": "SUSE Bug 1073792",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "self",
"summary": "SUSE Bug 1073809",
"url": "https://bugzilla.suse.com/1073809"
},
{
"category": "self",
"summary": "SUSE Bug 1073874",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "self",
"summary": "SUSE Bug 1073912",
"url": "https://bugzilla.suse.com/1073912"
},
{
"category": "self",
"summary": "SUSE Bug 1074392",
"url": "https://bugzilla.suse.com/1074392"
},
{
"category": "self",
"summary": "SUSE Bug 1074709",
"url": "https://bugzilla.suse.com/1074709"
},
{
"category": "self",
"summary": "SUSE Bug 963575",
"url": "https://bugzilla.suse.com/963575"
},
{
"category": "self",
"summary": "SUSE Bug 964063",
"url": "https://bugzilla.suse.com/964063"
},
{
"category": "self",
"summary": "SUSE Bug 964944",
"url": "https://bugzilla.suse.com/964944"
},
{
"category": "self",
"summary": "SUSE Bug 966170",
"url": "https://bugzilla.suse.com/966170"
},
{
"category": "self",
"summary": "SUSE Bug 966172",
"url": "https://bugzilla.suse.com/966172"
},
{
"category": "self",
"summary": "SUSE Bug 969470",
"url": "https://bugzilla.suse.com/969470"
},
{
"category": "self",
"summary": "SUSE Bug 979928",
"url": "https://bugzilla.suse.com/979928"
},
{
"category": "self",
"summary": "SUSE Bug 989261",
"url": "https://bugzilla.suse.com/989261"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000405 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000410 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000410/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11600 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12193 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15115 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16528 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16528/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16536 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16536/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16537 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16645 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16646 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16939 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16939/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16994 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16994/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17448 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17449 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17805 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17806 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7482 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7482/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8824 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8824/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-01-25T09:17:00Z",
"generator": {
"date": "2018-01-25T09:17:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0213-1",
"initial_release_date": "2018-01-25T09:17:00Z",
"revision_history": [
{
"date": "2018-01-25T09:17:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.4.104-24.1.noarch",
"product": {
"name": "kernel-devel-rt-4.4.104-24.1.noarch",
"product_id": "kernel-devel-rt-4.4.104-24.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.4.104-24.1.noarch",
"product": {
"name": "kernel-source-rt-4.4.104-24.1.noarch",
"product_id": "kernel-source-rt-4.4.104-24.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.4.104-24.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"product": {
"name": "cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"product_id": "cluster-network-kmp-rt-4.4.104-24.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.4.104-24.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.4.104-24.1.x86_64",
"product_id": "dlm-kmp-rt-4.4.104-24.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.4.104-24.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.4.104-24.1.x86_64",
"product_id": "gfs2-kmp-rt-4.4.104-24.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.4.104-24.1.x86_64",
"product": {
"name": "kernel-rt-4.4.104-24.1.x86_64",
"product_id": "kernel-rt-4.4.104-24.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.4.104-24.1.x86_64",
"product": {
"name": "kernel-rt-base-4.4.104-24.1.x86_64",
"product_id": "kernel-rt-base-4.4.104-24.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.4.104-24.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.4.104-24.1.x86_64",
"product_id": "kernel-rt-devel-4.4.104-24.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.4.104-24.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.4.104-24.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.4.104-24.1.x86_64",
"product_id": "kernel-syms-rt-4.4.104-24.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.4.104-24.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.4.104-24.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.4.104-24.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.4.104-24.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-rt-4.4.104-24.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64"
},
"product_reference": "cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.4.104-24.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.4.104-24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.4.104-24.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.4.104-24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.4.104-24.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch"
},
"product_reference": "kernel-devel-rt-4.4.104-24.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.4.104-24.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64"
},
"product_reference": "kernel-rt-4.4.104-24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.4.104-24.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64"
},
"product_reference": "kernel-rt-base-4.4.104-24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.4.104-24.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.4.104-24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.4.104-24.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.4.104-24.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch"
},
"product_reference": "kernel-source-rt-4.4.104-24.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.4.104-24.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.4.104-24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.4.104-24.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.4.104-24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-1000405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000405"
}
],
"notes": [
{
"category": "general",
"text": "The Linux Kernel versions 2.6.38 through 4.14 have a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_pmd()\u0027s logic - pmd can become dirty without going through a COW cycle. This bug is not as severe as the original \"Dirty cow\" because an ext4 file (or any other regular file) cannot be mapped using THP. Nevertheless, it does allow us to overwrite read-only huge pages. For example, the zero huge page and sealed shmem files can be overwritten (since their mapping can be populated using THP). Note that after the first write page-fault to the zero page, it will be replaced with a new fresh (and zeroed) thp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000405",
"url": "https://www.suse.com/security/cve/CVE-2017-1000405"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2017-1000405",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1070307 for CVE-2017-1000405",
"url": "https://bugzilla.suse.com/1070307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "important"
}
],
"title": "CVE-2017-1000405"
},
{
"cve": "CVE-2017-1000410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000410"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel version 3.3-rc1 and later is affected by a vulnerability lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. This info leak is a result of uninitialized stack variables that may be returned to an attacker in their uninitialized state. By manipulating the code flows that precede the handling of these configuration messages, an attacker can also gain some control over which data will be held in the uninitialized stack variables. This can allow him to bypass KASLR, and stack canaries protection - as both pointers and stack canaries may be leaked in this manner. Combining this vulnerability (for example) with the previously disclosed RCE vulnerability in L2CAP configuration parsing (CVE-2017-1000251) may allow an attacker to exploit the RCE against kernels which were built with the above mitigations. These are the specifics of this vulnerability: In the function l2cap_parse_conf_rsp and in the function l2cap_parse_conf_req the following variable is declared without initialization: struct l2cap_conf_efs efs; In addition, when parsing input configuration parameters in both of these functions, the switch case for handling EFS elements may skip the memcpy call that will write to the efs variable: ... case L2CAP_CONF_EFS: if (olen == sizeof(efs)) memcpy(\u0026efs, (void *)val, olen); ... The olen in the above if is attacker controlled, and regardless of that if, in both of these functions the efs variable would eventually be added to the outgoing configuration request that is being built: l2cap_add_conf_opt(\u0026ptr, L2CAP_CONF_EFS, sizeof(efs), (unsigned long) \u0026efs); So by sending a configuration request, or response, that contains an L2CAP_CONF_EFS element, but with an element length that is not sizeof(efs) - the memcpy to the uninitialized efs variable can be avoided, and the uninitialized variable would be returned to the attacker (16 bytes).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000410",
"url": "https://www.suse.com/security/cve/CVE-2017-1000410"
},
{
"category": "external",
"summary": "SUSE Bug 1070535 for CVE-2017-1000410",
"url": "https://bugzilla.suse.com/1070535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "low"
}
],
"title": "CVE-2017-1000410"
},
{
"cve": "CVE-2017-11600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11600"
}
],
"notes": [
{
"category": "general",
"text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11600",
"url": "https://www.suse.com/security/cve/CVE-2017-11600"
},
{
"category": "external",
"summary": "SUSE Bug 1050231 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1050231"
},
{
"category": "external",
"summary": "SUSE Bug 1096564 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1096564"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "important"
}
],
"title": "CVE-2017-11600"
},
{
"cve": "CVE-2017-12193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12193"
}
],
"notes": [
{
"category": "general",
"text": "The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.13.11 mishandles node splitting, which allows local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link creation operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12193",
"url": "https://www.suse.com/security/cve/CVE-2017-12193"
},
{
"category": "external",
"summary": "SUSE Bug 1066192 for CVE-2017-12193",
"url": "https://bugzilla.suse.com/1066192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-12193"
},
{
"cve": "CVE-2017-15115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15115"
}
],
"notes": [
{
"category": "general",
"text": "The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15115",
"url": "https://www.suse.com/security/cve/CVE-2017-15115"
},
{
"category": "external",
"summary": "SUSE Bug 1068671 for CVE-2017-15115",
"url": "https://bugzilla.suse.com/1068671"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15115",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15115"
},
{
"cve": "CVE-2017-16528",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16528"
}
],
"notes": [
{
"category": "general",
"text": "sound/core/seq_device.c in the Linux kernel before 4.13.4 allows local users to cause a denial of service (snd_rawmidi_dev_seq_free use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16528",
"url": "https://www.suse.com/security/cve/CVE-2017-16528"
},
{
"category": "external",
"summary": "SUSE Bug 1066629 for CVE-2017-16528",
"url": "https://bugzilla.suse.com/1066629"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16528",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16528"
},
{
"cve": "CVE-2017-16536",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16536"
}
],
"notes": [
{
"category": "general",
"text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16536",
"url": "https://www.suse.com/security/cve/CVE-2017-16536"
},
{
"category": "external",
"summary": "SUSE Bug 1066606 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1066606"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16536"
},
{
"cve": "CVE-2017-16537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16537"
}
],
"notes": [
{
"category": "general",
"text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16537",
"url": "https://www.suse.com/security/cve/CVE-2017-16537"
},
{
"category": "external",
"summary": "SUSE Bug 1066573 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1066573"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16537"
},
{
"cve": "CVE-2017-16645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16645"
}
],
"notes": [
{
"category": "general",
"text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16645",
"url": "https://www.suse.com/security/cve/CVE-2017-16645"
},
{
"category": "external",
"summary": "SUSE Bug 1067132 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1067132"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16645"
},
{
"cve": "CVE-2017-16646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16646"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16646",
"url": "https://www.suse.com/security/cve/CVE-2017-16646"
},
{
"category": "external",
"summary": "SUSE Bug 1067105 for CVE-2017-16646",
"url": "https://bugzilla.suse.com/1067105"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16646",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16646"
},
{
"cve": "CVE-2017-16939",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16939"
}
],
"notes": [
{
"category": "general",
"text": "The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16939",
"url": "https://www.suse.com/security/cve/CVE-2017-16939"
},
{
"category": "external",
"summary": "SUSE Bug 1069702 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1069702"
},
{
"category": "external",
"summary": "SUSE Bug 1069708 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1069708"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1120260 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1120260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16939"
},
{
"cve": "CVE-2017-16994",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16994"
}
],
"notes": [
{
"category": "general",
"text": "The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16994",
"url": "https://www.suse.com/security/cve/CVE-2017-16994"
},
{
"category": "external",
"summary": "SUSE Bug 1069996 for CVE-2017-16994",
"url": "https://bugzilla.suse.com/1069996"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "low"
}
],
"title": "CVE-2017-16994"
},
{
"cve": "CVE-2017-17448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17448"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17448",
"url": "https://www.suse.com/security/cve/CVE-2017-17448"
},
{
"category": "external",
"summary": "SUSE Bug 1071693 for CVE-2017-17448",
"url": "https://bugzilla.suse.com/1071693"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17448"
},
{
"cve": "CVE-2017-17449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17449"
}
],
"notes": [
{
"category": "general",
"text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17449",
"url": "https://www.suse.com/security/cve/CVE-2017-17449"
},
{
"category": "external",
"summary": "SUSE Bug 1071694 for CVE-2017-17449",
"url": "https://bugzilla.suse.com/1071694"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17449"
},
{
"cve": "CVE-2017-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17450"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17450",
"url": "https://www.suse.com/security/cve/CVE-2017-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1071695 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "external",
"summary": "SUSE Bug 1074033 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1074033"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17450"
},
{
"cve": "CVE-2017-17805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17805"
}
],
"notes": [
{
"category": "general",
"text": "The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17805",
"url": "https://www.suse.com/security/cve/CVE-2017-17805"
},
{
"category": "external",
"summary": "SUSE Bug 1073792 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "important"
}
],
"title": "CVE-2017-17805"
},
{
"cve": "CVE-2017-17806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17806"
}
],
"notes": [
{
"category": "general",
"text": "The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17806",
"url": "https://www.suse.com/security/cve/CVE-2017-17806"
},
{
"category": "external",
"summary": "SUSE Bug 1073874 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "low"
}
],
"title": "CVE-2017-17806"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-7482",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7482"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before version 4.12, Kerberos 5 tickets decoded when using the RXRPC keys incorrectly assumes the size of a field. This could lead to the size-remaining variable wrapping and the data pointer going over the end of the buffer. This could possibly lead to memory corruption and possible privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7482",
"url": "https://www.suse.com/security/cve/CVE-2017-7482"
},
{
"category": "external",
"summary": "SUSE Bug 1046107 for CVE-2017-7482",
"url": "https://bugzilla.suse.com/1046107"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-7482",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7482"
},
{
"cve": "CVE-2017-8824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8824"
}
],
"notes": [
{
"category": "general",
"text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8824",
"url": "https://www.suse.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "SUSE Bug 1070771 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "external",
"summary": "SUSE Bug 1076734 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1076734"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.104-24.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.104-24.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.104-24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-25T09:17:00Z",
"details": "important"
}
],
"title": "CVE-2017-8824"
}
]
}
SUSE-SU-2018:0861-1
Vulnerability from csaf_suse - Published: 2018-04-03 14:46 - Updated: 2018-04-03 14:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2017-5715: Fixes for speculative side channel attacks aka \u0027SpectreAttack\u0027 (var2) (bsc#1079869).\n- CVE-2018-6764: Fixed guest executable code injection via libnss_dns.so loaded by libvirt_lxc before init (bsc#1080042).\n- CVE-2018-1064: Fixed denial of service when reading from guest agent (bsc#1083625).\n\n\nNon-security issues fixed:\n\n- Error starting domain: internal error: No usable sysfs TPM cancel file could be found (bsc#1078808).\n- SUSE Linux Enterprise 11 SP4 hvm converted to pvhvm. Unless vm memory is on gig boundary, vm won\u0027t boot (bsc#1082041).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP2-2018-576,SUSE-SLE-RPI-12-SP2-2018-576,SUSE-SLE-SDK-12-SP2-2018-576,SUSE-SLE-SERVER-12-SP2-2018-576,SUSE-SLE-WE-12-SP2-2018-576",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0861-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0861-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180861-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0861-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003862.html"
},
{
"category": "self",
"summary": "SUSE Bug 1078808",
"url": "https://bugzilla.suse.com/1078808"
},
{
"category": "self",
"summary": "SUSE Bug 1079869",
"url": "https://bugzilla.suse.com/1079869"
},
{
"category": "self",
"summary": "SUSE Bug 1080042",
"url": "https://bugzilla.suse.com/1080042"
},
{
"category": "self",
"summary": "SUSE Bug 1082041",
"url": "https://bugzilla.suse.com/1082041"
},
{
"category": "self",
"summary": "SUSE Bug 1083625",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1064 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6764 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6764/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-04-03T14:46:34Z",
"generator": {
"date": "2018-04-03T14:46:34Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0861-1",
"initial_release_date": "2018-04-03T14:46:34Z",
"revision_history": [
{
"date": "2018-04-03T14:46:34Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-client-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-client-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-client-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-daemon-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-daemon-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-daemon-config-network-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-daemon-lxc-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-daemon-qemu-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-doc-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-doc-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-lock-sanlock-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-nss-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-nss-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-nss-2.0.0-27.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-devel-2.0.0-27.34.1.aarch64",
"product": {
"name": "libvirt-devel-2.0.0-27.34.1.aarch64",
"product_id": "libvirt-devel-2.0.0-27.34.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-devel-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-devel-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-client-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-client-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-client-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-daemon-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-daemon-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-doc-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-doc-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-doc-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-nss-2.0.0-27.34.1.ppc64le",
"product": {
"name": "libvirt-nss-2.0.0-27.34.1.ppc64le",
"product_id": "libvirt-nss-2.0.0-27.34.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-devel-2.0.0-27.34.1.s390x",
"product_id": "libvirt-devel-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-2.0.0-27.34.1.s390x",
"product_id": "libvirt-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-client-2.0.0-27.34.1.s390x",
"product_id": "libvirt-client-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-daemon-2.0.0-27.34.1.s390x",
"product_id": "libvirt-daemon-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"product_id": "libvirt-daemon-config-network-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"product_id": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"product_id": "libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"product_id": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"product_id": "libvirt-daemon-driver-network-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"product_id": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"product_id": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"product_id": "libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"product_id": "libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"product_id": "libvirt-daemon-lxc-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"product_id": "libvirt-daemon-qemu-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-doc-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-doc-2.0.0-27.34.1.s390x",
"product_id": "libvirt-doc-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"product_id": "libvirt-lock-sanlock-2.0.0-27.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-nss-2.0.0-27.34.1.s390x",
"product": {
"name": "libvirt-nss-2.0.0-27.34.1.s390x",
"product_id": "libvirt-nss-2.0.0-27.34.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-client-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-client-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-32bit-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-client-32bit-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-client-32bit-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-config-network-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-lxc-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-qemu-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-xen-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-doc-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-doc-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-devel-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-devel-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-devel-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-daemon-hooks-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-lock-sanlock-2.0.0-27.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-nss-2.0.0-27.34.1.x86_64",
"product": {
"name": "libvirt-nss-2.0.0-27.34.1.x86_64",
"product_id": "libvirt-nss-2.0.0-27.34.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-client-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-client-32bit-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-doc-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-client-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-doc-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-nss-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-devel-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-devel-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-devel-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-devel-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-client-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-client-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-client-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-client-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-doc-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-doc-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-doc-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-doc-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-nss-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-nss-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-nss-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-nss-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-client-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-client-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-client-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-client-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-doc-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-doc-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-doc-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-doc-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.34.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64"
},
"product_reference": "libvirt-nss-2.0.0-27.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le"
},
"product_reference": "libvirt-nss-2.0.0-27.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x"
},
"product_reference": "libvirt-nss-2.0.0-27.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-nss-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-2.0.0-27.34.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64"
},
"product_reference": "libvirt-client-32bit-2.0.0-27.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-03T14:46:34Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1064"
}
],
"notes": [
{
"category": "general",
"text": "libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1064",
"url": "https://www.suse.com/security/cve/CVE-2018-1064"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1088147"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-03T14:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2018-1064"
},
{
"cve": "CVE-2018-6764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6764"
}
],
"notes": [
{
"category": "general",
"text": "util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which allows local guest OS users to bypass an intended container protection mechanism and execute arbitrary commands via a crafted NSS module.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6764",
"url": "https://www.suse.com/security/cve/CVE-2018-6764"
},
{
"category": "external",
"summary": "SUSE Bug 1080042 for CVE-2018-6764",
"url": "https://bugzilla.suse.com/1080042"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2018-6764",
"url": "https://bugzilla.suse.com/1088147"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libvirt-devel-2.0.0-27.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:libvirt-client-32bit-2.0.0-27.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-03T14:46:34Z",
"details": "low"
}
],
"title": "CVE-2018-6764"
}
]
}
SUSE-SU-2018:1658-1
Vulnerability from csaf_suse - Published: 2018-06-12 15:36 - Updated: 2018-06-12 15:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).\n- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-2018-1129",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1658-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1658-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181658-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1658-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1092631",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-06-12T15:36:05Z",
"generator": {
"date": "2018-06-12T15:36:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1658-1",
"initial_release_date": "2018-06-12T15:36:05Z",
"revision_history": [
{
"date": "2018-06-12T15:36:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.4.4_32-22.68.1.x86_64",
"product": {
"name": "xen-4.4.4_32-22.68.1.x86_64",
"product_id": "xen-4.4.4_32-22.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.4.4_32-22.68.1.x86_64",
"product": {
"name": "xen-doc-html-4.4.4_32-22.68.1.x86_64",
"product_id": "xen-doc-html-4.4.4_32-22.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"product": {
"name": "xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"product_id": "xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_32-22.68.1.x86_64",
"product": {
"name": "xen-libs-4.4.4_32-22.68.1.x86_64",
"product_id": "xen-libs-4.4.4_32-22.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"product_id": "xen-libs-32bit-4.4.4_32-22.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.4.4_32-22.68.1.x86_64",
"product": {
"name": "xen-tools-4.4.4_32-22.68.1.x86_64",
"product_id": "xen-tools-4.4.4_32-22.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_32-22.68.1.x86_64",
"product": {
"name": "xen-tools-domU-4.4.4_32-22.68.1.x86_64",
"product_id": "xen-tools-domU-4.4.4_32-22.68.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_32-22.68.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64"
},
"product_reference": "xen-4.4.4_32-22.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_32-22.68.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_32-22.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_32-22.68.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64"
},
"product_reference": "xen-libs-4.4.4_32-22.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_32-22.68.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_32-22.68.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64"
},
"product_reference": "xen-tools-4.4.4_32-22.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_32-22.68.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_32-22.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-12T15:36:05Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-12T15:36:05Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-12T15:36:05Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-12T15:36:05Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:0482-1
Vulnerability from csaf_suse - Published: 2018-02-19 19:17 - Updated: 2018-02-19 19:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP2 Realtime kernel was updated to 4.4.114 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).\n\n The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).\n- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).\n- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).\n- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a \u0027pointer leak (bnc#1073928).\n- CVE-2017-17712: The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel has a race condition in inet-\u003ehdrincl that leads to uninitialized stack pointer usage; this allowed a local user to execute code and gain privileges (bnc#1073229 1073230).\n- CVE-2017-15129: A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel The function get_net_ns_by_id() in net/core/net_namespace.c did not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely (bnc#1074839).\n- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).\n- CVE-2018-1000004: In the Linux kernel a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).\n\nThe following non-security bugs were fixed:\n\n- 509: fix printing uninitialized stack memory when OID is empty (bsc#1075078).\n- 8021q: fix a memory leak for VLAN 0 device (bnc#1012382).\n- acpi / scan: Prefer devices without _HID/_CID for _ADR matching (bnc#1012382).\n- af_key: fix buffer overread in parse_exthdrs() (bnc#1012382).\n- af_key: fix buffer overread in verify_address_len() (bnc#1012382).\n- afs: Adjust mode bits processing (bnc#1012382).\n- afs: Connect up the CB.ProbeUuid (bnc#1012382).\n- afs: Fix afs_kill_pages() (bnc#1012382).\n- afs: Fix missing put_page() (bnc#1012382).\n- afs: Fix page leak in afs_write_begin() (bnc#1012382).\n- afs: Fix the maths in afs_fs_store_data() (bnc#1012382).\n- afs: Flush outstanding writes when an fd is closed (bnc#1012382).\n- afs: Migrate vlocation fields to 64-bit (bnc#1012382).\n- afs: Populate and use client modification time (bnc#1012382).\n- afs: Populate group ID from vnode status (bnc#1012382).\n- afs: Prevent callback expiry timer overflow (bnc#1012382).\n- alpha: fix build failures (bnc#1012382).\n- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1031717).\n- alsa: aloop: Fix racy hw constraints adjustment (bsc#1031717).\n- alsa: aloop: Release cable upon open error path (bsc#1031717).\n- alsa: hda - Apply headphone noise quirk for another Dell XPS 13 variant (bsc#1031717).\n- alsa: hda - Apply the existing quirk to iMac 14,1 (bsc#1031717).\n- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1031717).\n- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1031717).\n- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1031717).\n- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1031717).\n- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1031717).\n- arc: uaccess: dont use \u0027l\u0027 gcc inline asm constraint modifier (bnc#1012382).\n- arm64: Add hypervisor safe helper for checking constant capabilities (bsc#1068032).\n- arm64: Add macros to read/write system registers (bsc#1068032).\n- arm64: add macro to extract ESR_ELx.EC (bsc#1068032).\n- arm64: Add skeleton to harden the branch predictor against aliasing attacks (bsc#1068032).\n- arm64: Add trace_hardirqs_off annotation in ret_to_user (bsc#1068032).\n- arm64: alternative: add auto-nop infrastructure (bsc#1068032).\n- arm64: barriers: introduce nops and __nops macros for NOP sequences (bsc#1068032).\n- arm64: cpu_errata: Allow an erratum to be match for all revisions of a core (bsc#1068032).\n- arm64: cpufeature: Add scope for capability check (bsc#1068032).\n- arm64/cpufeature: do not use mutex in bringup path (bsc#1068032).\n- arm64: cpufeature: Pass capability structure to -\u003eenable callback (bsc#1068032).\n- arm64: debug: remove unused local_dbg_{enable, disable} macros (bsc#1068032).\n- arm64: Disable kpti for non broadcast TLB HW (bsc#1068032).\n- arm64: Disable TTBR0_EL1 during normal kernel execution (bsc#1068032).\n- arm64: do not pull uaccess.h into *.S (bsc#1068032).\n- arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: entry: Add exception trampoline page for exceptions from EL0 (bsc#1068032).\n- arm64: entry: Add fake CPU feature for unmapping the kernel at EL0 (bsc#1068032).\n- arm64: entry: Explicitly pass exception level to kernel_ventry macro (bsc#1068032).\n- arm64: entry: Hook up entry trampoline to exception vectors (bsc#1068032).\n- arm64: entry: remove pointless SPSR mode check (bsc#1068032).\n- arm64: entry.S convert el0_sync (bsc#1068032).\n- arm64: entry.S: convert el1_sync (bsc#1068032).\n- arm64: entry.S: convert elX_irq (bsc#1068032).\n- arm64: entry.S: move SError handling into a C function for future expansion (bsc#1068032).\n- arm64: entry.S: Remove disable_dbg (bsc#1068032).\n- arm64: explicitly mask all exceptions (bsc#1068032).\n- arm64: factor out entry stack manipulation (bsc#1068032).\n- arm64: factor out PAGE_* and CONT_* definitions (bsc#1068032).\n- arm64: Factor out PAN enabling/disabling into separate uaccess_* macros (bsc#1068032).\n- arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm macro (bsc#1068032).\n- arm64: factor work_pending state machine to C (bsc#1068032).\n- arm64: Fix circular include of asm/lse.h through linux/jump_label.h (bsc#1068032).\n- arm64: Fix compilation (bsc#1068032).\n- arm64: fpsimd: Prevent registers leaking from dead tasks (bnc#1012382).\n- arm64: Handle el1 synchronous instruction aborts cleanly (bsc#1068032).\n- arm64: head.S: get rid of x25 and x26 with \u0027global\u0027 scope (bsc#1068032).\n- arm64: Implement branch predictor hardening for affected Cortex-A CPUs (bsc#1068032).\n- arm64: Initialise high_memory global variable earlier (bnc#1012382).\n- arm64: introduce an order for exceptions (bsc#1068032).\n- arm64: introduce mov_q macro to move a constant into a 64-bit register (bsc#1068032).\n- arm64: Introduce uaccess_{disable,enable} functionality based on TTBR0_EL1 (bsc#1068032).\n- arm64: kaslr: Put kernel vectors address in separate data page (bsc#1068032).\n- arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 (bsc#1068032).\n- arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry (bsc#1068032).\n- arm64: kill ESR_LNX_EXEC (bsc#1068032).\n- arm64: kpti: Fix the interaction between ASID switching and software PAN (bsc#1068032).\n- arm64: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bnc#1012382).\n- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).\n- arm64: kvm: Survive unknown traps from guests (bnc#1012382).\n- arm64: kvm: Use per-CPU vector when BP hardening is enabled (bsc#1068032).\n- arm64: Mask all exceptions during kernel_exit (bsc#1068032).\n- arm64: mm: Add arm64_kernel_unmapped_at_el0 helper (bsc#1068032).\n- arm64: mm: Allocate ASIDs in pairs (bsc#1068032).\n- arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: mm: hardcode rodata=true (bsc#1068032).\n- arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR (bsc#1068032).\n- arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI (bsc#1068032).\n- arm64: mm: Map entry trampoline into trampoline and kernel page tables (bsc#1068032).\n- arm64: mm: Move ASID from TTBR0 to TTBR1 (bsc#1068032).\n- arm64: mm: Rename post_ttbr0_update_workaround (bsc#1068032).\n- arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: mm: Use non-global mappings for kernel space (bsc#1068032).\n- arm64: Move BP hardening to check_and_switch_context (bsc#1068032).\n- arm64: Move post_ttbr_update_workaround to C code (bsc#1068032).\n- arm64: Move the async/fiq helpers to explicitly set process context flags (bsc#1068032).\n- arm64: Store struct thread_info in sp_el0 (bsc#1068032).\n- arm64: SW PAN: Point saved ttbr0 at the zero page when switching to init_mm (bsc#1068032).\n- arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb (bsc#1068032).\n- arm64: swp emulation: bound LL/SC retries before rescheduling (bsc#1068032).\n- arm64: sysreg: allow write_sysreg to use XZR (bsc#1068032).\n- arm64: sysreg: Fix unprotected macro argmuent in write_sysreg (bsc#1068032).\n- arm64: Take into account ID_AA64PFR0_EL1.CSV3 (bsc#1068032).\n- arm64: tlbflush.h: add __tlbi() macro (bsc#1068032).\n- arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks (bsc#1068032).\n- arm64: use alternative auto-nop (bsc#1068032).\n- arm64: use RET instruction for exiting the trampoline (bsc#1068032).\n- arm64: Use static keys for CPU features (bsc#1068032).\n- arm64: xen: Enable user access before a privcmd hvc call (bsc#1068032).\n- arm: avoid faulting on qemu (bnc#1012382).\n- arm: BUG if jumping to usermode address in kernel mode (bnc#1012382).\n- arm-ccn: perf: Prevent module unload while PMU is in use (bnc#1012382).\n- arm: dma-mapping: disallow dma_get_sgtable() for non-kernel managed memory (bnc#1012382).\n- arm: dts: am335x-evmsk: adjust mmc2 param to allow suspend (bnc#1012382).\n- arm: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7 (bnc#1012382).\n- arm: dts: ti: fix pci bus dtc warnings (bnc#1012382).\n- arm: kprobes: Align stack to 8-bytes in test code (bnc#1012382).\n- arm: kprobes: Fix the return address of multiple kretprobes (bnc#1012382).\n- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).\n- arm: kvm: Survive unknown traps from guests (bnc#1012382).\n- arm: OMAP1: DMA: Correct the number of logical channels (bnc#1012382).\n- arm: OMAP2+: Fix device node reference counts (bnc#1012382).\n- arm: OMAP2+: gpmc-onenand: propagate error on initialization failure (bnc#1012382).\n- arm: OMAP2+: Release device node after it is no longer needed (bnc#1012382).\n- asm-prototypes: Clear any CPP defines before declaring the functions (git-fixes).\n- asn.1: check for error from ASN1_OP_END__ACT actions (bnc#1012382).\n- asn.1: fix out-of-bounds read when parsing indefinite length item (bnc#1012382).\n- ath9k: fix tx99 potential info leak (bnc#1012382).\n- atm: horizon: Fix irq release error (bnc#1012382).\n- audit: ensure that \u0027audit=1\u0027 actually enables audit for PID 1 (bnc#1012382).\n- axonram: Fix gendisk handling (bnc#1012382).\n- backlight: pwm_bl: Fix overflow condition (bnc#1012382).\n- bcache: add a comment in journal bucket reading (bsc#1076110).\n- bcache: Avoid nested function definition (bsc#1076110).\n- bcache: check return value of register_shrinker (bsc#1076110).\n- bcache: debug: avoid accessing .bi_io_vec directly (bsc#1076110).\n- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).\n- bcache: documentation updates and corrections (bsc#1076110).\n- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).\n- bcache: do not write back data if reading it failed (bsc#1076110).\n- bcache: explicitly destroy mutex while exiting (bnc#1012382).\n- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).\n- bcache: fix sequential large write IO bypass (bsc#1076110).\n- bcache: fix wrong cache_misses statistics (bnc#1012382).\n- bcache: gc does not work when triggering by manual command (bsc#1076110, bsc#1038078).\n- bcache: implement PI controller for writeback rate (bsc#1076110).\n- bcache: increase the number of open buckets (bsc#1076110).\n- bcache: only permit to recovery read error when cache device is clean (bnc#1012382 bsc#1043652).\n- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110).\n- bcache: pr_err: more meaningful error message when nr_stripes is invalid (bsc#1076110).\n- bcache: rearrange writeback main thread ratelimit (bsc#1076110).\n- bcache: recover data from backing when data is clean (bnc#1012382 bsc#1043652).\n- bcache: register_bcache(): call blkdev_put() when cache_alloc() fails (bsc#1076110).\n- bcache: Remove deprecated create_workqueue (bsc#1076110).\n- bcache: Remove redundant block_size assignment (bsc#1076110).\n- bcache: Remove redundant parameter for cache_alloc() (bsc#1076110).\n- bcache: Remove redundant set_capacity (bsc#1076110).\n- bcache: remove unused parameter (bsc#1076110).\n- bcache: rewrite multiple partitions support (bsc#1076110, bsc#1038085, bsc#1019784).\n- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).\n- bcache: silence static checker warning (bsc#1076110).\n- bcache: smooth writeback rate control (bsc#1076110).\n- bcache: switch to using blk_queue_write_cache() (bsc#1076110).\n- bcache.txt: standardize document format (bsc#1076110).\n- bcache: update bio-\u003ebi_opf bypass/writeback REQ_ flag hints (bsc#1076110).\n- bcache: update bucket_in_use in real time (bsc#1076110).\n- bcache: Update continue_at() documentation (bsc#1076110).\n- bcache: update document info (bsc#1076110).\n- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).\n- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).\n- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).\n- bcache: writeback rate shouldn\u0027t artifically clamp (bsc#1076110).\n- be2net: restore properly promisc mode after queues reconfiguration (bsc#963844 FATE#320192).\n- block: export bio_free_pages to other modules (bsc#1076110).\n- block: wake up all tasks blocked in get_request() (bnc#1012382).\n- bluetooth: btusb: driver to enable the usb-wakeup feature (bnc#1012382).\n- bnx2x: do not rollback VF MAC/VLAN filters we did not configure (bnc#1012382).\n- bnx2x: fix possible overrun of VFPF multicast addresses array (bnc#1012382).\n- bnx2x: prevent crash when accessing PTP with interface down (bnc#1012382).\n- btrfs: account for pinned bytes in should_alloc_chunk (bsc#1066842).\n- btrfs: add missing memset while reading compressed inline extents (bnc#1012382).\n- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).\n- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).\n- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: gs_usb: fix return value of the \u0027set_bittiming\u0027 callback (bnc#1012382).\n- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bnc#1012382).\n- can: kvaser_usb: free buf in error paths (bnc#1012382).\n- can: kvaser_usb: ratelimit errors if incomplete messages are received (bnc#1012382).\n- can: peak: fix potential bug in packet fragmentation (bnc#1012382).\n- can: ti_hecc: Fix napi poll return value for repoll (bnc#1012382).\n- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- cdc-acm: apply quirk for card reader (bsc#1060279).\n- cdrom: factor out common open_for_* code (bsc#1048585).\n- cdrom: wait for tray to close (bsc#1048585).\n- ceph: drop negative child dentries before try pruning inode\u0027s alias (bnc#1012382).\n- ceph: more accurate statfs (bsc#1077068).\n- clk: imx6: refine hdmi_isfr\u0027s parent to make HDMI work on i.MX6 SoCs w/o VPU (bnc#1012382).\n- clk: mediatek: add the option for determining PLL source clock (bnc#1012382).\n- clk: tegra: Fix cclk_lp divisor register (bnc#1012382).\n- cpuidle: fix broadcast control when broadcast can not be entered (bnc#1012382).\n- cpuidle: powernv: Pass correct drv-\u003ecpumask for registration (bnc#1012382).\n- cpuidle: Validate cpu_dev in cpuidle_add_sysfs() (bnc#1012382).\n- crypto: algapi - fix NULL dereference in crypto_remove_spawns() (bnc#1012382).\n- crypto: chacha20poly1305 - validate the digest size (bnc#1012382).\n- crypto: crypto4xx - increase context and scatter ring buffer elements (bnc#1012382).\n- crypto: deadlock between crypto_alg_sem/rtnl_mutex/genl_mutex (bnc#1012382).\n- crypto: mcryptd - protect the per-CPU queue with a lock (bnc#1012382).\n- crypto: n2 - cure use after free (bnc#1012382).\n- crypto: pcrypt - fix freeing pcrypt instances (bnc#1012382).\n- crypto: s5p-sss - Fix completing crypto request in IRQ handler (bnc#1012382).\n- crypto: tcrypt - fix buffer lengths in test_aead_speed() (bnc#1012382).\n- cxl: Check if vphb exists before iterating over AFU devices (bsc#1066223).\n- dax: Pass detailed error code from __dax_fault() (bsc#1072484).\n- dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state (bnc#1012382).\n- delay: add poll_event_interruptible (bsc#1048585).\n- dmaengine: dmatest: move callback wait queue to thread context (bnc#1012382).\n- dmaengine: Fix array index out of bounds warning in __get_unmap_pool() (bnc#1012382).\n- dmaengine: pl330: fix double lock (bnc#1012382).\n- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bnc#1012382).\n- dm btree: fix serious bug in btree_split_beneath() (bnc#1012382).\n- dm bufio: fix shrinker scans when (nr_to_scan \u003c retain_target) (bnc#1012382).\n- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bnc#1012382).\n- drivers: base: cacheinfo: fix boot error message when acpi is enabled (bnc#1012382).\n- drivers: base: cacheinfo: fix x86 with CONFIG_OF enabled (bnc#1012382).\n- drivers/firmware: Expose psci_get_version through psci_ops structure (bsc#1068032).\n- drivers/md/bcache/util.h: remove duplicate inclusion of blkdev.h (bsc#1076110).\n- drivers: net: xgene: Fix hardware checksum setting (bsc#1078526).\n- drm/amd/amdgpu: fix console deadlock if late init failed (bnc#1012382).\n- drm: extra printk() wrapper macros (bnc#1012382).\n- drm/exynos/decon5433: set STANDALONE_UPDATE_F on output enablement (bnc#1012382).\n- drm/exynos: gem: Drop NONCONTIG flag for buffers allocated without IOMMU (bnc#1012382).\n- drm/omap: fix dmabuf mmap for dma_alloc\u0027ed buffers (bnc#1012382).\n- drm/radeon: reinstate oland workaround for sclk (bnc#1012382).\n- drm/radeon/si: add dpm quirk for Oland (bnc#1012382).\n- drm/vmwgfx: Potential off by one in vmw_view_add() (bnc#1012382).\n- dynamic-debug-howto: fix optional/omitted ending line number to be LARGE instead of 0 (bnc#1012382).\n- edac, i5000, i5400: Fix definition of NRECMEMB register (bnc#1012382).\n- edac, i5000, i5400: Fix use of MTR_DRAM_WIDTH macro (bnc#1012382).\n- edac, sb_edac: Fix missing break in switch (bnc#1012382).\n- efi/esrt: Cleanup bad memory map log messages (bnc#1012382).\n- efi: Move some sysfs files to be read-only by root (bnc#1012382).\n- eventpoll.h: add missing epoll event masks (bnc#1012382).\n- ext4: fix crash when a directory\u0027s i_size is too small (bnc#1012382).\n- ext4: Fix ENOSPC handling in DAX page fault handle (bsc#1072484).\n- ext4: fix fdatasync(2) after fallocate(2) operation (bnc#1012382).\n- fbdev: controlfb: Add missing modes to fix out of bounds access (bnc#1012382).\n- Fix build error in vma.c (bnc#1012382).\n- fjes: Fix wrong netdevice feature flags (bnc#1012382).\n- flow_dissector: properly cap thoff field (bnc#1012382).\n- fm10k: ensure we process SM mbx when processing VF mbx (bnc#1012382).\n- fork: clear thread stack upon allocation (bsc#1077560). Conflicts: \tseries.conf\n- fscache: Fix the default for fscache_maybe_release_page() (bnc#1012382).\n- futex: Prevent overflow by strengthen input validation (bnc#1012382).\n- gcov: disable for COMPILE_TEST (bnc#1012382).\n- gfs2: Take inode off order_write list when setting jdata flag (bnc#1012382).\n- gpio: altera: Use handle_level_irq when configured as a level_high (bnc#1012382).\n- hid: chicony: Add support for another ASUS Zen AiO keyboard (bnc#1012382).\n- hid: xinmo: fix for out of range for THT 2P arcade controller (bnc#1012382).\n- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1012382).\n- hv: kvp: Avoid reading past allocated blocks from KVP file (bnc#1012382).\n- hwmon: (asus_atk0110) fix uninitialized data access (bnc#1012382).\n- i40e: Do not enable NAPI on q_vectors that have no rings (bnc#1012382).\n- ib/hfi1: Correct defered count after processing qp_wait_list (git-fixes).\n- ib/hfi1: Fix rnr_timer addition (git-fixes).\n- ib/hfi1: Handle kzalloc failure in init_pervl_scs (git-fixes).\n- ib/hfi1: Move iowait_init() to priv allocate (git-fixes).\n- ib/hfi1: Prevent kernel QP post send hard lockups (git-fixes).\n- ib/hfi1: Reset QSFP on every run through channel tuning (git-fixes).\n- ib/ipoib: Fix lockdep issue found on ipoib_ib_dev_heavy_flush (git-fixes).\n- ib/ipoib: Grab rtnl lock on heavy flush when calling ndo_open/stop (bnc#1012382).\n- ib/mlx4: Increase maximal message size under UD QP (bnc#1012382).\n- ib/mlx5: Assign send CQ and recv CQ of UMR QP (bnc#1012382).\n- ibmvnic: Allocate and request vpd in init_resources (bsc#1076872).\n- ibmvnic: Do not handle RX interrupts when not up (bsc#1075066).\n- ibmvnic: Fix IP offload control buffer (bsc#1076899).\n- ibmvnic: Fix IPv6 packet descriptors (bsc#1076899).\n- ibmvnic: Fix pending MAC address changes (bsc#1075627).\n- ibmvnic: Modify buffer size and number of queues on failover (bsc#1076872).\n- ibmvnic: Revert to previous mtu when unsupported value requested (bsc#1076872).\n- ibmvnic: Wait for device response when changing MAC (bsc#1078681).\n- ib/qib: Remove qpt_mask global (git-fixes).\n- ib/rdmavt: restore IRQs on error path in rvt_create_ah() (git-fixes).\n- ib/srpt: Disable RDMA access by the initiator (bnc#1012382).\n- igb: check memory allocation failure (bnc#1012382).\n- ima: fix hash algorithm initialization (bnc#1012382).\n- inet: frag: release spinlock before calling icmp_send() (bnc#1012382).\n- input: 88pm860x-ts - fix child-node lookup (bnc#1012382).\n- input: elantech - add new icbody type 15 (bnc#1012382).\n- input: i8042 - add TUXEDO BU1406 (N24_25BU) to the nomux list (bnc#1012382).\n- input: trackpoint - force 3 buttons if 0 button is reported (bnc#1012382).\n- input: twl4030-vibra - fix sibling-node lookup (bnc#1012382).\n- input: twl6040-vibra - fix child-node lookup (bnc#1012382).\n- input: twl6040-vibra - fix DT node memory management (bnc#1012382).\n- intel_th: pci: Add Gemini Lake support (bnc#1012382).\n- iommu/arm-smmu-v3: Do not free page table ops twice (bnc#1012382).\n- iommu/vt-d: Fix scatterlist offset handling (bnc#1012382).\n- ip6_tunnel: disable dst caching if tunnel is dual-stack (bnc#1012382).\n- ipmi: Stop timers before cleaning up the module (bnc#1012382).\n- ipv4: Fix use-after-free when flushing FIB tables (bnc#1012382).\n- ipv4: igmp: guard against silly MTU values (bnc#1012382).\n- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (bnc#1012382).\n- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (bnc#1012382).\n- ipv6: fix possible mem leaks in ipv6_make_skb() (bnc#1012382).\n- ipv6: fix udpv6 sendmsg crash caused by too small MTU (bnc#1012382).\n- ipv6: ip6_make_skb() needs to clear cork.base.dst (git-fixes).\n- ipv6: mcast: better catch silly mtu values (bnc#1012382).\n- ipv6: reorder icmpv6_init() and ip6_mr_init() (bnc#1012382).\n- ipvlan: fix ipv6 outbound device (bnc#1012382).\n- ipvlan: remove excessive packet scrubbing (bsc#1070799).\n- irda: vlsi_ir: fix check for DMA mapping errors (bnc#1012382).\n- irqchip/crossbar: Fix incorrect type of register size (bnc#1012382).\n- iscsi-target: fix memory leak in lio_target_tiqn_addtpg() (bnc#1012382).\n- iscsi-target: Make TASK_REASSIGN use proper se_cmd-\u003ecmd_kref (bnc#1012382).\n- isdn: kcapi: avoid uninitialized data (bnc#1012382).\n- iw_cxgb4: Only validate the MSN for successful completions (bnc#1012382).\n- ixgbe: fix use of uninitialized padding (bnc#1012382).\n- jump_label: Invoke jump_label_test() via early_initcall() (bnc#1012382).\n- jump_label: Make it possible for arches to invoke jump_label_init() earlier (bsc#1068032).\n- jump_labels: Allow array initialisers (bsc#1068032).\n- Kabi: Keep KVM stable after enable s390 wire up bpb feature (bsc#1076806).\n- kABI: protect struct bpf_map (kabi).\n- kABI: protect struct ipv6_pinfo (kabi).\n- kABI: protect struct t10_alua_tg_pt_gp (kabi).\n- kABI: protect struct usbip_device (kabi).\n- kabi/severities: do not care about stuff_RSB\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382).\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382).\n- kbuild: add \u0027-fno-stack-check\u0027 to kernel build options (bnc#1012382).\n- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).\n- kbuild: pkg: use --transform option to prefix paths in tar (bnc#1012382).\n- kdb: Fix handling of kallsyms_symbol_next() return value (bnc#1012382).\n- kernel/acct.c: fix the acct-\u003eneedcheck check in check_free_space() (bnc#1012382).\n- kernel: make groups_sort calling a responsibility group_info allocators (bnc#1012382).\n- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals (bnc#1012382).\n- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL (bnc#1012382).\n- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() (bnc#1012382).\n- keys: add missing permission check for request_key() destination (bnc#1012382).\n- kprobes/x86: Disable preemption in ftrace-based jprobes (bnc#1012382).\n- kpti: Rename to PAGE_TABLE_ISOLATION (bnc#1012382).\n- kpti: Report when enabled (bnc#1012382).\n- kvm: arm/arm64: Fix occasional warning from the timer work function (bnc#1012382 bsc#988524).\n- kvm: Fix stack-out-of-bounds read in write_mmio (bnc#1012382).\n- kvm: nVMX: reset nested_run_pending if the vCPU is going to be reset (bnc#1012382).\n- kvm: nVMX: VMCLEAR should not cause the vCPU to shut down (bnc#1012382).\n- kvm: pci-assign: do not map smm memory slot pages in vt-d page tables (bnc#1012382).\n- kvm: s390: Enable all facility bits that are known good for passthrough (bsc#1076806).\n- kvm: s390: wire up bpb feature (bsc#1076806).\n- kvm: VMX: Fix enable VPID conditions (bnc#1012382).\n- kvm: VMX: remove I/O port 0x80 bypass on Intel hosts (bnc#1012382).\n- kvm: vmx: Scrub hardware GPRs at VM-exit (bnc#1012382).\n- kvm: x86: Add memory barrier on vmcs field lookup (bnc#1012382).\n- kvm: x86: correct async page present tracepoint (bnc#1012382).\n- kvm: X86: Fix load RFLAGS w/o the fixed bit (bnc#1012382).\n- kvm: x86: fix RSM when pciD is non-zero (bnc#1012382).\n- l2tp: cleanup l2tp_tunnel_delete calls (bnc#1012382).\n- lan78xx: Fix failure in USB Full Speed (bnc#1012382).\n- libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (bnc#1012382).\n- libata: drop WARN from protocol error in ata_sff_qc_issue() (bnc#1012382).\n- lib/genalloc.c: make the avail variable an atomic_long_t (bnc#1012382).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bnc#1012382).\n- md-cluster: free md_cluster_info if node leave cluster (bnc#1012382).\n- media: dvb: i2c transfers over usb cannot be done from stack (bnc#1012382).\n- mfd: cros ec: spi: Do not send first message too soon (bnc#1012382).\n- mfd: twl4030-audio: Fix sibling-node lookup (bnc#1012382).\n- mfd: twl6040: Fix child-node lookup (bnc#1012382).\n- MIPS: Also verify sizeof `elf_fpreg_t\u0027 with PTRACE_SETREGSET (bnc#1012382).\n- MIPS: AR7: ensure the port type\u0027s FCR value is used (bnc#1012382).\n- MIPS: Consistently handle buffer counter with PTRACE_SETREGSET (bnc#1012382).\n- MIPS: Disallow outsized PTRACE_SETREGSET NT_PRFPREG regset accesses (bnc#1012382).\n- MIPS: Factor out NT_PRFPREG regset access helpers (bnc#1012382).\n- MIPS: Fix an FCSR access API regression with NT_PRFPREG and MSA (bnc#1012382).\n- MIPS: Guard against any partial write attempt with PTRACE_SETREGSET (bnc#1012382).\n- MIPS: math-emu: Fix final emulation phase for certain instructions (bnc#1012382).\n- MIPS: Validate PR_SET_FP_MODE prctl(2) requests against the ABI of the task (bnc#1012382).\n- mlxsw: reg: Fix SPVMLR max record count (bnc#1012382).\n- mlxsw: reg: Fix SPVM max record count (bnc#1012382).\n- mm: avoid returning VM_FAULT_RETRY from -\u003epage_mkwrite handlers (bnc#1012382).\n- mmc: mediatek: Fixed bug where clock frequency could be set wrong (bnc#1012382).\n- mm: drop unused pmdp_huge_get_and_clear_notify() (bnc#1012382).\n- mm: Handle 0 flags in _calc_vm_trans() macro (bnc#1012382).\n- mm: Introduce lm_alias (bsc#1068032).\n- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1012382).\n- mm/mprotect: add a cond_resched() inside change_pmd_range() (bnc#1077871).\n- mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP (bnc#1012382).\n- module: set __jump_table alignment to 8 (bnc#1012382).\n- more bio_map_user_iov() leak fixes (bnc#1012382).\n- net: Allow neigh contructor functions ability to modify the primary_key (bnc#1012382).\n- net/appletalk: Fix kernel memory disclosure (bnc#1012382).\n- net: bcmgenet: correct MIB access of UniMAC RUNT counters (bnc#1012382).\n- net: bcmgenet: correct the RBUF_OVFL_CNT and RBUF_ERR_CNT MIB values (bnc#1012382).\n- net: bcmgenet: power down internal phy if open or resume fails (bnc#1012382).\n- net: bcmgenet: Power up the internal PHY before probing the MII (bnc#1012382).\n- net: bcmgenet: reserved phy revisions must be checked first (bnc#1012382).\n- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks (bnc#1012382).\n- net: core: fix module type in sock_diag_bind (bnc#1012382).\n- net: Do not allow negative values for busy_read and busy_poll sysctl interfaces (bnc#1012382).\n- net: fec: fix multicast filtering hardware setup (bnc#1012382).\n- netfilter: bridge: honor frag_max_size when refragmenting (bnc#1012382).\n- netfilter: do not track fragmented packets (bnc#1012382).\n- netfilter: ipvs: Fix inappropriate output of procfs (bnc#1012382).\n- netfilter: nfnetlink_queue: fix secctx memory leak (bnc#1012382).\n- netfilter: nfnetlink_queue: fix timestamp attribute (bsc#1074134).\n- netfilter: nfnl_cthelper: fix a race when walk the nf_ct_helper_hash table (bnc#1012382).\n- netfilter: nfnl_cthelper: Fix memory leak (bnc#1012382).\n- netfilter: nfnl_cthelper: fix runtime expectation policy updates (bnc#1012382).\n- net: Fix double free and memory corruption in get_net_ns_by_id() (bnc#1012382).\n- net: igmp: fix source address check for IGMPv3 reports (bnc#1012382).\n- net: igmp: Use correct source address on IGMPv3 reports (bnc#1012382).\n- net: initialize msg.msg_flags in recvfrom (bnc#1012382).\n- net: ipv4: fix for a race condition in raw_sendmsg (bnc#1012382).\n- net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y (bnc#1012382).\n- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (bnc#1012382).\n- net: mvneta: clear interface link status on port disable (bnc#1012382).\n- net/packet: fix a race in packet_bind() and packet_notifier() (bnc#1012382).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bnc#1012382).\n- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround (bnc#1012382).\n- net: qdisc_pkt_len_init() should be more robust (bnc#1012382).\n- net: qmi_wwan: add Sierra EM7565 1199:9091 (bnc#1012382).\n- net: qmi_wwan: Add USB IDs for MDM6600 modem on Motorola Droid 4 (bnc#1012382).\n- net: reevalulate autoflowlabel setting after sysctl setting (bnc#1012382).\n- net: Resend IGMP memberships upon peer notification (bnc#1012382).\n- net: sctp: fix array overrun read on sctp_timer_tbl (bnc#1012382).\n- net: stmmac: enable EEE in MII, GMII or RGMII only (bnc#1012382).\n- net: systemport: Pad packet before inserting TSB (bnc#1012382).\n- net: systemport: Utilize skb_put_padto() (bnc#1012382).\n- net: tcp: close sock if net namespace is exiting (bnc#1012382).\n- net: wimax/i2400m: fix NULL-deref at probe (bnc#1012382).\n- nfsd: auth: Fix gid sorting when rootsquash enabled (bnc#1012382).\n- nfsd: fix nfsd_minorversion(.., NFSD_AVAIL) (bnc#1012382).\n- nfsd: fix nfsd_reset_versions for NFSv4 (bnc#1012382).\n- nfs: Do not take a reference on fl-\u003efl_file for LOCK operation (bnc#1012382).\n- nfs: Fix a typo in nfs_rename() (bnc#1012382).\n- nfsv4.1 respect server\u0027s max size in CREATE_SESSION (bnc#1012382).\n- nfsv4: Fix client recovery when server reboots multiple times (bnc#1012382).\n- nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick() (bnc#1012382).\n- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) (bnc#1012382).\n- openrisc: fix issue handling 8 byte get_user calls (bnc#1012382).\n- packet: fix crash in fanout_demux_rollover() (bnc#1012382).\n- parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel (bnc#1012382).\n- parisc: Hide Diva-built-in serial aux and graphics card (bnc#1012382).\n- partially revert tipc improve link resiliency when rps is activated (bsc#1068038).\n- pci/aer: Report non-fatal errors only to the affected endpoint (bnc#1012382).\n- pci: Avoid bus reset if bridge itself is broken (bnc#1012382).\n- pci: Create SR-IOV virtfn/physfn links before attaching driver (bnc#1012382).\n- pci: Detach driver before procfs \u0026 sysfs teardown on device remove (bnc#1012382).\n- pci/pme: Handle invalid data when reading Root Status (bnc#1012382).\n- pci / pm: Force devices to D0 in pci_pm_thaw_noirq() (bnc#1012382).\n- perf symbols: Fix symbols__fixup_end heuristic for corner cases (bnc#1012382).\n- perf test attr: Fix ignored test case result (bnc#1012382).\n- perf: xgene: Add APM X-Gene SoC Performance Monitoring Unit driver (bsc#1036737).\n- perf: xgene: Add support for SoC PMU version 3 (bsc#1076809).\n- perf: xgene: Include module.h (bsc#1076809).\n- perf: xgene: Move PMU leaf functions into function pointer structure (bsc#1076809).\n- perf: xgene: Parse PMU subnode from the match table (bsc#1076809).\n- perf: xgene: Remove unnecessary managed resources cleanup (bsc#1076809).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bnc#1012382).\n- pinctrl: adi2: Fix Kconfig build problem (bnc#1012382).\n- pinctrl: st: add irq_request/release_resources callbacks (bnc#1012382).\n- pipe: avoid round_pipe_size() nr_pages overflow on 32-bit (bnc#1012382).\n- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075087).\n- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075087).\n- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032, bsc#1075087).\n- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075087).\n- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075087).\n- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075087).\n- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).\n- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075087).\n- powerpc/ipic: Fix status get and status clear (bnc#1012382).\n- powerpc/perf: Dereference BHRB entries safely (bsc#1066223).\n- powerpc/perf/hv-24x7: Fix incorrect comparison in memord (bnc#1012382).\n- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032, bsc#1075087).\n- powerpc/powernv/cpufreq: Fix the frequency read by /proc/cpuinfo (bnc#1012382).\n- powerpc/powernv/ioda2: Gracefully fail if too many TCE levels requested (bnc#1012382).\n- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075087).\n- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075087).\n- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032, bsc#1075087).\n- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).\n- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: prevent crash when changing flush type to fallback after system boot (bsc#1068032, bsc#1075087).\n- ppp: Destroy the mutex when cleanup (bnc#1012382).\n- pppoe: take -\u003eneeded_headroom of lower device into account on xmit (bnc#1012382).\n- pti: unbreak EFI (bsc#1074709).\n- r8152: fix the list rx_done may be used without initialization (bnc#1012382).\n- r8152: prevent the driver from transmitting packets with carrier off (bnc#1012382).\n- r8169: fix memory corruption on retrieval of hardware statistics (bnc#1012382).\n- raid5: Set R5_Expanded on parity devices as well as data (bnc#1012382).\n- ravb: Remove Rx overflow log messages (bnc#1012382).\n- rbd: set max_segments to USHRT_MAX (bnc#1012382).\n- rdma/cma: Avoid triggering undefined behavior (bnc#1012382).\n- rdma/iser: Fix possible mr leak on device removal event (bnc#1012382).\n- rds: Fix NULL pointer dereference in __rds_rdma_map (bnc#1012382).\n- rds: Heap OOB write in rds_message_alloc_sgs() (bnc#1012382).\n- rds: null pointer dereference in rds_atomic_free_op (bnc#1012382).\n- regulator: core: Rely on regulator_dev_release to free constraints (bsc#1074847).\n- regulator: da9063: Return an error code on probe failure (bsc#1074847).\n- regulator: pwm: Fix regulator ramp delay for continuous mode (bsc#1074847).\n- regulator: Try to resolve regulators supplies on registration (bsc#1074847).\n- Revert \u0027arm64: alternatives: add enable parameter to conditional asm macros\u0027 (bsc#1068032).\n- Revert \u0027Bluetooth: btusb: driver to enable the usb-wakeup feature\u0027 (bnc#1012382).\n- Revert \u0027drm/armada: Fix compile fail\u0027 (bnc#1012382).\n- Revert \u0027kaiser: vmstat show NR_KAISERTABLE as nr_overhead\u0027 (kabi).\n- Revert \u0027lib/genalloc.c: make the avail variable an atomic_long_t\u0027 (kabi).\n- Revert \u0027module: Add retpoline tag to VERMAGIC\u0027 (bnc#1012382 kabi).\n- Revert \u0027ocfs2: should wait dio before inode lock in ocfs2_setattr()\u0027 (bnc#1012382).\n- Revert \u0027s390/kbuild: enable modversions for symbols exported from asm\u0027 (bnc#1012382).\n- Revert \u0027sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks\u0027 (kabi).\n- Revert \u0027scsi: libsas: align sata_device\u0027s rps_resp on a cacheline\u0027 (kabi).\n- Revert \u0027spi: SPI_FSL_DSPI should depend on HAS_DMA\u0027 (bnc#1012382).\n- Revert \u0027userfaultfd: selftest: vm: allow to build in vm/ directory\u0027 (bnc#1012382).\n- Revert \u0027x86/efi: Build our own page table structures\u0027 (bnc#1012382).\n- Revert \u0027x86/efi: Hoist page table switching code into efi_call_virt()\u0027 (bnc#1012382).\n- Revert \u0027x86/mm/pat: Ensure cpa-\u003epfn only contains page frame numbers\u0027 (bnc#1012382).\n- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075087).\n- ring-buffer: Mask out the info bits when returning buffer page length (bnc#1012382).\n- route: also update fnhe_genid when updating a route cache (bnc#1012382).\n- route: update fnhe_expires for redirect when the fnhe exists (bnc#1012382).\n- rtc: cmos: Initialize hpet timer before irq is registered (bsc#1077592).\n- rtc: pcf8563: fix output clock rate (bnc#1012382).\n- rtc: pl031: make interrupt optional (bnc#1012382).\n- rtc: set the alarm to the next expiring timer (bnc#1012382).\n- s390: always save and restore all registers on context switch (bnc#1012382).\n- s390: fix compat system call table (bnc#1012382).\n- s390/pci: do not require AIS facility (bnc#1012382).\n- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1012382).\n- s390/runtime instrumentation: simplify task exit handling (bnc#1012382).\n- sch_dsmark: fix invalid skb_cow() usage (bnc#1012382).\n- sched/deadline: Make sure the replenishment timer fires in the next period (bnc#1012382).\n- sched/deadline: Throttle a constrained deadline task activated after the deadline (bnc#1012382).\n- sched/deadline: Use deadline instead of period when calculating overflow (bnc#1012382).\n- sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks (bnc#1012382).\n- sched/deadline: Zero out positive runtime after throttling constrained tasks (git-fixes).\n- scsi: bfa: integer overflow in debugfs (bnc#1012382).\n- scsi: check for device state in __scsi_remove_target() (bsc#1072589).\n- scsi: cxgb4i: fix Tx skb leak (bnc#1012382).\n- scsi: fixup kernel warning during rmmod() (bsc#1052360).\n- scsi: hpsa: cleanup sas_phy structures in sysfs when unloading (bnc#1012382).\n- scsi: hpsa: destroy sas transport properties before scsi_host (bnc#1012382).\n- scsi: libsas: align sata_device\u0027s rps_resp on a cacheline (bnc#1012382).\n- scsi: lpfc: Fix crash during Hardware error recovery on SLI3 adapters (bnc#1012382).\n- scsi: lpfc: Fix PT2PT PRLI reject (bnc#1012382).\n- scsi: lpfc: Fix secure firmware updates (bnc#1012382).\n- scsi: lpfc: PLOGI failures during NPIV testing (bnc#1012382).\n- scsi: mpt3sas: Fix IO error occurs on pulling out a drive from RAID1 volume created on two SATA drive (bnc#1012382).\n- scsi: sd: change allow_restart to bool in sysfs interface (bnc#1012382).\n- scsi: sd: change manage_start_stop to bool in sysfs interface (bnc#1012382).\n- scsi: sg: disable SET_FORCE_LOW_DMA (bnc#1012382).\n- scsi: sr: wait for the medium to become ready (bsc#1048585).\n- sctp: do not allow the v4 socket to bind a v4mapped v6 address (bnc#1012382).\n- sctp: do not free asoc when it is already dead in sctp_sendmsg (bnc#1012382).\n- sctp: Replace use of sockets_allocated with specified macro (bnc#1012382).\n- sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf (bnc#1012382).\n- sctp: use the right sk after waking up from wait_buf sleep (bnc#1012382).\n- selftest/powerpc: Fix false failures for skipped tests (bnc#1012382).\n- selftests/x86: Add test_vsyscall (bnc#1012382).\n- selftests/x86/ldt_get: Add a few additional tests for limits (bnc#1012382).\n- serial: 8250_pci: Add Amazon pci serial device ID (bnc#1012382).\n- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bnc#1012382).\n- Set supported_modules_check 1 (bsc#1072163).\n- sfc: do not warn on successful change of MAC (bnc#1012382).\n- sh_eth: fix SH7757 GEther initialization (bnc#1012382).\n- sh_eth: fix TSU resource handling (bnc#1012382).\n- sit: update frag_off info (bnc#1012382).\n- sock: free skb in skb_complete_tx_timestamp on error (bnc#1012382).\n- sparc64/mm: set fields in deferred pages (bnc#1012382).\n- spi_ks8995: fix \u0027BUG: key accdaa28 not in .data!\u0027 (bnc#1012382).\n- spi: sh-msiof: Fix DMA transfer size check (bnc#1012382).\n- spi: xilinx: Detect stall with Unknown commands (bnc#1012382).\n- staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl (bnc#1012382).\n- sunrpc: Fix rpc_task_begin trace point (bnc#1012382).\n- sunxi-rsb: Include OF based modalias in device uevent (bnc#1012382).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- sysrq : fix Show Regs call trace on ARM (bnc#1012382).\n- target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK (bnc#1012382).\n- target/file: Do not return error for UNMAP if length is zero (bnc#1012382).\n- target: fix ALUA transition timeout handling (bnc#1012382).\n- target:fix condition return in core_pr_dump_initiator_port() (bnc#1012382).\n- target: fix race during implicit transition work flushes (bnc#1012382).\n- target/iscsi: Fix a race condition in iscsit_add_reject_from_cmd() (bnc#1012382).\n- target: Use system workqueue for ALUA transitions (bnc#1012382).\n- tcp: correct memory barrier usage in tcp_check_space() (bnc#1012382).\n- tcp: fix under-evaluated ssthresh in TCP Vegas (bnc#1012382).\n- tcp md5sig: Use skb\u0027s saddr when replying to an incoming segment (bnc#1012382).\n- tcp: __tcp_hdrlen() helper (bnc#1012382).\n- tg3: Fix rx hang on MTU change with 5717/5719 (bnc#1012382).\n- thermal/drivers/step_wise: Fix temperature regulation misbehavior (bnc#1012382).\n- thermal: hisilicon: Handle return value of clk_prepare_enable (bnc#1012382).\n- tipc: fix cleanup at module unload (bnc#1012382).\n- tipc: fix memory leak in tipc_accept_from_sock() (bnc#1012382).\n- tipc: improve link resiliency when rps is activated (bsc#1068038).\n- tracing: Allocate mask_str buffer dynamically (bnc#1012382).\n- tracing: Fix converting enum\u0027s from the map in trace_event_eval_update() (bnc#1012382).\n- tracing: Fix crash when it fails to alloc ring buffer (bnc#1012382).\n- tracing: Fix possible double free on failure of allocating trace buffer (bnc#1012382).\n- tracing: Remove extra zeroing out of the ring buffer page (bnc#1012382).\n- tty fix oops when rmmod 8250 (bnc#1012382).\n- uas: Always apply US_FL_NO_ATA_1X quirk to Seagate devices (bnc#1012382).\n- uas: ignore UAS for Norelsys NS1068(X) chips (bnc#1012382).\n- udf: Avoid overflow when session starts at large offset (bnc#1012382).\n- um: link vmlinux with -no-pie (bnc#1012382).\n- usb: Add device quirk for Logitech HD Pro Webcam C925e (bnc#1012382).\n- usb: add RESET_RESUME for ELSA MicroLink 56K (bnc#1012382).\n- USB: core: Add type-specific length check of BOS descriptors (bnc#1012382).\n- USB: core: prevent malicious bNumInterfaces overflow (bnc#1012382).\n- USB: devio: Prevent integer overflow in proc_do_submiturb() (bnc#1012382).\n- USB: Fix off by one in type-specific length check of BOS SSP capability (git-fixes).\n- USB: fix usbmon BUG trigger (bnc#1012382).\n- usb: gadget: configs: plug memory leak (bnc#1012382).\n- usb: gadget: ffs: Forbid usb_ep_alloc_request from sleeping (bnc#1012382).\n- USB: gadgetfs: Fix a potential memory leak in \u0027dev_config()\u0027 (bnc#1012382).\n- usb: gadget: f_uvc: Sanity check wMaxPacketSize for SuperSpeed (bnc#1012382).\n- usb: gadget: udc: remove pointer dereference after free (bnc#1012382).\n- usb: hub: Cycle HUB power when initialization fails (bnc#1012382).\n- USB: Increase usbfs transfer limit (bnc#1012382).\n- usbip: Fix implicit fallthrough warning (bnc#1012382).\n- usbip: Fix potential format overflow in userspace tools (bnc#1012382).\n- usbip: fix stub_rx: get_pipe() to validate endpoint number (bnc#1012382).\n- usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input (bnc#1012382).\n- usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer (bnc#1012382).\n- usbip: fix usbip bind writing random string after command in match_busid (bnc#1012382).\n- usbip: prevent leaking socket pointer address in messages (bnc#1012382).\n- usbip: prevent vhci_hcd driver from leaking a socket pointer address (bnc#1012382).\n- usbip: remove kernel addresses from usb device and urb debug msgs (bnc#1012382).\n- usbip: stub: stop printing kernel pointer addresses in messages (bnc#1012382).\n- usbip: vhci: stop printing kernel pointer addresses in messages (bnc#1012382).\n- usb: misc: usb3503: make sure reset is low for at least 100us (bnc#1012382).\n- usb: musb: da8xx: fix babble condition handling (bnc#1012382).\n- usb: phy: isp1301: Add OF device ID table (bnc#1012382).\n- usb: phy: isp1301: Fix build warning when CONFIG_OF is disabled (git-fixes).\n- usb: phy: tahvo: fix error handling in tahvo_usb_probe() (bnc#1012382).\n- usb: quirks: Add no-lpm quirk for KY-688 USB 3.1 Type-C Hub (bnc#1012382).\n- USB: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ (bnc#1012382).\n- USB: serial: cp210x: add new device ID ELV ALC 8xxx (bnc#1012382).\n- USB: serial: ftdi_sio: add id for Airbus DS P8GR (bnc#1012382).\n- USB: serial: option: adding support for YUGA CLM920-NC5 (bnc#1012382).\n- USB: serial: option: add Quectel BG96 id (bnc#1012382).\n- USB: serial: option: add support for Telit ME910 PID 0x1101 (bnc#1012382).\n- USB: serial: qcserial: add Sierra Wireless EM7565 (bnc#1012382).\n- USB: uas and storage: Add US_FL_BROKEN_FUA for another JMicron JMS567 ID (bnc#1012382).\n- USB: usbfs: Filter flags passed in from user space (bnc#1012382).\n- usb: usbip: Fix possible deadlocks reported by lockdep (bnc#1012382).\n- usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 (bnc#1012382).\n- usb: xhci: fix panic in xhci_free_virt_devices_depth_first (bnc#1012382).\n- userfaultfd: selftest: vm: allow to build in vm/ directory (bnc#1012382).\n- userfaultfd: shmem: __do_fault requires VM_FAULT_NOPAGE (bnc#1012382).\n- video: fbdev: au1200fb: Release some resources if a memory allocation fails (bnc#1012382).\n- video: fbdev: au1200fb: Return an error code if a memory allocation fails (bnc#1012382).\n- virtio: release virtio index when fail to device_register (bnc#1012382).\n- vmxnet3: repair memory leak (bnc#1012382).\n- vsyscall: Fix permissions for emulate mode with KAISER/PTI (bnc#1012382).\n- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend (bnc#1012382).\n- vti6: Do not report path MTU below IPV6_MIN_MTU (bnc#1012382).\n- vti6: fix device register to report IFLA_INFO_KIND (bnc#1012382).\n- workqueue: trigger WARN if queue_delayed_work() is called with NULL @wq (bnc#1012382).\n- writeback: fix memory leak in wb_queue_work() (bnc#1012382).\n- X.509: fix buffer overflow detection in sprint_oid() (bsc#1075078).\n- X.509: reject invalid BIT STRING for subjectPublicKey (bnc#1012382).\n- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).\n- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).\n- x86/alternatives: Add missing \u0027\\n\u0027 at end of ALTERNATIVE inline asm (bnc#1012382).\n- x86/alternatives: Fix optimize_nops() checking (bnc#1012382).\n- x86/apic/vector: Fix off by one in error path (bnc#1012382).\n- x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels (bnc#1012382).\n- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).\n- x86/cpu: Factor out application of forced CPU caps (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).\n- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/cpu: Merge bugs.c and bugs_64.c (bnc#1012382).\n- x86/cpu, x86/pti: Do not enable PTI on AMD processors (bnc#1012382).\n- x86/Documentation: Add PTI description (bnc#1012382).\n- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt() (bnc#1012382).\n- x86/hpet: Prevent might sleep splat on resume (bnc#1012382).\n- x86/kasan: Clear kasan_zero_page after TLB flush (bnc#1012382).\n- x86/kasan: Write protect kasan zero shadow (bnc#1012382).\n- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bnc#1012382).\n- x86/microcode/intel: Extend BDW late-loading with a revision check (bnc#1012382).\n- x86/microcode/intel: Fix BDW late-loading revision check (bnc#1012382).\n- x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier (git-fixes).\n- x86/mm: Disable pciD on 32-bit kernels (bnc#1012382).\n- x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bnc#1012382).\n- x86/pti: Document fix wrong index (bnc#1012382).\n- x86/pti/efi: broken conversion from efi to kernel page table (bnc#1012382).\n- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/smpboot: Remove stale TLB flush invocations (bnc#1012382).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n- x86/tlb: Drop the _GPL from the cpu_tlbstate export (bnc#1012382).\n- x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly() (bnc#1012382).\n- xen-netfront: avoid crashing on resume after a failure in talk_to_netback() (bnc#1012382).\n- xen-netfront: Improve error handling during initialization (bnc#1012382).\n- xfrm: Copy policy family in clone_policy (bnc#1012382).\n- xfs: add configurable error support to metadata buffers (bsc#1068569).\n- xfs: add configuration handlers for specific errors (bsc#1068569).\n- xfs: add configuration of error failure speed (bsc#1068569).\n- xfs: add \u0027fail at unmount\u0027 error handling configuration (bsc#1068569).\n- xfs: Add infrastructure needed for error propagation during buffer IO failure (bsc#1068569).\n- xfs: address kabi for xfs buffer retry infrastructure (kabi).\n- xfs: configurable error behavior via sysfs (bsc#1068569).\n- xfs: fix incorrect extent state in xfs_bmap_add_extent_unwritten_real (bnc#1012382).\n- xfs: fix log block underflow during recovery cycle verification (bnc#1012382).\n- xfs: fix up inode32/64 (re)mount handling (bsc#1069160).\n- xfs: introduce metadata IO error class (bsc#1068569).\n- xfs: introduce table-based init for error behaviors (bsc#1068569).\n- xfs: Properly retry failed inode items in case of error during buffer writeback (bsc#1068569).\n- xfs: remove xfs_trans_ail_delete_bulk (bsc#1068569).\n- xhci: Do not add a virt_dev to the devs array before it\u0027s fully allocated (bnc#1012382).\n- xhci: Fix ring leak in failure path of xhci_alloc_virt_device() (bnc#1012382).\n- xhci: plat: Register shutdown for xhci_plat (bnc#1012382).\n- zram: set physical queue limits to avoid array out of bounds accesses (bnc#1012382).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-RT-12-SP2-2018-327",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0482-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0482-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180482-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0482-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-February/003742.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1019784",
"url": "https://bugzilla.suse.com/1019784"
},
{
"category": "self",
"summary": "SUSE Bug 1031717",
"url": "https://bugzilla.suse.com/1031717"
},
{
"category": "self",
"summary": "SUSE Bug 1036737",
"url": "https://bugzilla.suse.com/1036737"
},
{
"category": "self",
"summary": "SUSE Bug 1038078",
"url": "https://bugzilla.suse.com/1038078"
},
{
"category": "self",
"summary": "SUSE Bug 1038085",
"url": "https://bugzilla.suse.com/1038085"
},
{
"category": "self",
"summary": "SUSE Bug 1043652",
"url": "https://bugzilla.suse.com/1043652"
},
{
"category": "self",
"summary": "SUSE Bug 1048585",
"url": "https://bugzilla.suse.com/1048585"
},
{
"category": "self",
"summary": "SUSE Bug 1052360",
"url": "https://bugzilla.suse.com/1052360"
},
{
"category": "self",
"summary": "SUSE Bug 1060279",
"url": "https://bugzilla.suse.com/1060279"
},
{
"category": "self",
"summary": "SUSE Bug 1066223",
"url": "https://bugzilla.suse.com/1066223"
},
{
"category": "self",
"summary": "SUSE Bug 1066842",
"url": "https://bugzilla.suse.com/1066842"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068038",
"url": "https://bugzilla.suse.com/1068038"
},
{
"category": "self",
"summary": "SUSE Bug 1068569",
"url": "https://bugzilla.suse.com/1068569"
},
{
"category": "self",
"summary": "SUSE Bug 1068984",
"url": "https://bugzilla.suse.com/1068984"
},
{
"category": "self",
"summary": "SUSE Bug 1069160",
"url": "https://bugzilla.suse.com/1069160"
},
{
"category": "self",
"summary": "SUSE Bug 1070799",
"url": "https://bugzilla.suse.com/1070799"
},
{
"category": "self",
"summary": "SUSE Bug 1072163",
"url": "https://bugzilla.suse.com/1072163"
},
{
"category": "self",
"summary": "SUSE Bug 1072484",
"url": "https://bugzilla.suse.com/1072484"
},
{
"category": "self",
"summary": "SUSE Bug 1072589",
"url": "https://bugzilla.suse.com/1072589"
},
{
"category": "self",
"summary": "SUSE Bug 1073229",
"url": "https://bugzilla.suse.com/1073229"
},
{
"category": "self",
"summary": "SUSE Bug 1073230",
"url": "https://bugzilla.suse.com/1073230"
},
{
"category": "self",
"summary": "SUSE Bug 1073928",
"url": "https://bugzilla.suse.com/1073928"
},
{
"category": "self",
"summary": "SUSE Bug 1074134",
"url": "https://bugzilla.suse.com/1074134"
},
{
"category": "self",
"summary": "SUSE Bug 1074488",
"url": "https://bugzilla.suse.com/1074488"
},
{
"category": "self",
"summary": "SUSE Bug 1074621",
"url": "https://bugzilla.suse.com/1074621"
},
{
"category": "self",
"summary": "SUSE Bug 1074709",
"url": "https://bugzilla.suse.com/1074709"
},
{
"category": "self",
"summary": "SUSE Bug 1074839",
"url": "https://bugzilla.suse.com/1074839"
},
{
"category": "self",
"summary": "SUSE Bug 1074847",
"url": "https://bugzilla.suse.com/1074847"
},
{
"category": "self",
"summary": "SUSE Bug 1075066",
"url": "https://bugzilla.suse.com/1075066"
},
{
"category": "self",
"summary": "SUSE Bug 1075078",
"url": "https://bugzilla.suse.com/1075078"
},
{
"category": "self",
"summary": "SUSE Bug 1075087",
"url": "https://bugzilla.suse.com/1075087"
},
{
"category": "self",
"summary": "SUSE Bug 1075091",
"url": "https://bugzilla.suse.com/1075091"
},
{
"category": "self",
"summary": "SUSE Bug 1075428",
"url": "https://bugzilla.suse.com/1075428"
},
{
"category": "self",
"summary": "SUSE Bug 1075617",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "self",
"summary": "SUSE Bug 1075621",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "self",
"summary": "SUSE Bug 1075627",
"url": "https://bugzilla.suse.com/1075627"
},
{
"category": "self",
"summary": "SUSE Bug 1075994",
"url": "https://bugzilla.suse.com/1075994"
},
{
"category": "self",
"summary": "SUSE Bug 1076017",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "self",
"summary": "SUSE Bug 1076110",
"url": "https://bugzilla.suse.com/1076110"
},
{
"category": "self",
"summary": "SUSE Bug 1076806",
"url": "https://bugzilla.suse.com/1076806"
},
{
"category": "self",
"summary": "SUSE Bug 1076809",
"url": "https://bugzilla.suse.com/1076809"
},
{
"category": "self",
"summary": "SUSE Bug 1076872",
"url": "https://bugzilla.suse.com/1076872"
},
{
"category": "self",
"summary": "SUSE Bug 1076899",
"url": "https://bugzilla.suse.com/1076899"
},
{
"category": "self",
"summary": "SUSE Bug 1077068",
"url": "https://bugzilla.suse.com/1077068"
},
{
"category": "self",
"summary": "SUSE Bug 1077560",
"url": "https://bugzilla.suse.com/1077560"
},
{
"category": "self",
"summary": "SUSE Bug 1077592",
"url": "https://bugzilla.suse.com/1077592"
},
{
"category": "self",
"summary": "SUSE Bug 1077871",
"url": "https://bugzilla.suse.com/1077871"
},
{
"category": "self",
"summary": "SUSE Bug 1078526",
"url": "https://bugzilla.suse.com/1078526"
},
{
"category": "self",
"summary": "SUSE Bug 1078681",
"url": "https://bugzilla.suse.com/1078681"
},
{
"category": "self",
"summary": "SUSE Bug 963844",
"url": "https://bugzilla.suse.com/963844"
},
{
"category": "self",
"summary": "SUSE Bug 988524",
"url": "https://bugzilla.suse.com/988524"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15129 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17712 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17712/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17862 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17864 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18017 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5332 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5333 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5333/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-02-19T19:17:06Z",
"generator": {
"date": "2018-02-19T19:17:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0482-1",
"initial_release_date": "2018-02-19T19:17:06Z",
"revision_history": [
{
"date": "2018-02-19T19:17:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.4.114-27.1.noarch",
"product": {
"name": "kernel-devel-rt-4.4.114-27.1.noarch",
"product_id": "kernel-devel-rt-4.4.114-27.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.4.114-27.1.noarch",
"product": {
"name": "kernel-source-rt-4.4.114-27.1.noarch",
"product_id": "kernel-source-rt-4.4.114-27.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.4.114-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"product": {
"name": "cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"product_id": "cluster-network-kmp-rt-4.4.114-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.4.114-27.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.4.114-27.1.x86_64",
"product_id": "dlm-kmp-rt-4.4.114-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.4.114-27.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.4.114-27.1.x86_64",
"product_id": "gfs2-kmp-rt-4.4.114-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.4.114-27.1.x86_64",
"product": {
"name": "kernel-rt-4.4.114-27.1.x86_64",
"product_id": "kernel-rt-4.4.114-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.4.114-27.1.x86_64",
"product": {
"name": "kernel-rt-base-4.4.114-27.1.x86_64",
"product_id": "kernel-rt-base-4.4.114-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.4.114-27.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.4.114-27.1.x86_64",
"product_id": "kernel-rt-devel-4.4.114-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.4.114-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.4.114-27.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.4.114-27.1.x86_64",
"product_id": "kernel-syms-rt-4.4.114-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.4.114-27.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.4.114-27.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.4.114-27.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-rt-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64"
},
"product_reference": "cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.4.114-27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.4.114-27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.4.114-27.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch"
},
"product_reference": "kernel-devel-rt-4.4.114-27.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64"
},
"product_reference": "kernel-rt-4.4.114-27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64"
},
"product_reference": "kernel-rt-base-4.4.114-27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.4.114-27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.4.114-27.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch"
},
"product_reference": "kernel-source-rt-4.4.114-27.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.4.114-27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.4.114-27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15129"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15129",
"url": "https://www.suse.com/security/cve/CVE-2017-15129"
},
{
"category": "external",
"summary": "SUSE Bug 1074839 for CVE-2017-15129",
"url": "https://bugzilla.suse.com/1074839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T19:17:06Z",
"details": "moderate"
}
],
"title": "CVE-2017-15129"
},
{
"cve": "CVE-2017-17712",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17712"
}
],
"notes": [
{
"category": "general",
"text": "The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet-\u003ehdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17712",
"url": "https://www.suse.com/security/cve/CVE-2017-17712"
},
{
"category": "external",
"summary": "SUSE Bug 1073229 for CVE-2017-17712",
"url": "https://bugzilla.suse.com/1073229"
},
{
"category": "external",
"summary": "SUSE Bug 1073230 for CVE-2017-17712",
"url": "https://bugzilla.suse.com/1073230"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T19:17:06Z",
"details": "important"
}
],
"title": "CVE-2017-17712"
},
{
"cve": "CVE-2017-17862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17862"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17862",
"url": "https://www.suse.com/security/cve/CVE-2017-17862"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17862",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T19:17:06Z",
"details": "moderate"
}
],
"title": "CVE-2017-17862"
},
{
"cve": "CVE-2017-17864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17864"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17864",
"url": "https://www.suse.com/security/cve/CVE-2017-17864"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17864",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T19:17:06Z",
"details": "moderate"
}
],
"title": "CVE-2017-17864"
},
{
"cve": "CVE-2017-18017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18017"
}
],
"notes": [
{
"category": "general",
"text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18017",
"url": "https://www.suse.com/security/cve/CVE-2017-18017"
},
{
"category": "external",
"summary": "SUSE Bug 1074488 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1074488"
},
{
"category": "external",
"summary": "SUSE Bug 1080255 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1080255"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 971126 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/971126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T19:17:06Z",
"details": "important"
}
],
"title": "CVE-2017-18017"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T19:17:06Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T19:17:06Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-5332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5332"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5332",
"url": "https://www.suse.com/security/cve/CVE-2018-5332"
},
{
"category": "external",
"summary": "SUSE Bug 1075621 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T19:17:06Z",
"details": "low"
}
],
"title": "CVE-2018-5332"
},
{
"cve": "CVE-2018-5333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5333"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5333",
"url": "https://www.suse.com/security/cve/CVE-2018-5333"
},
{
"category": "external",
"summary": "SUSE Bug 1075617 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T19:17:06Z",
"details": "low"
}
],
"title": "CVE-2018-5333"
}
]
}
SUSE-SU-2018:1503-1
Vulnerability from csaf_suse - Published: 2018-06-05 09:18 - Updated: 2018-06-05 09:18Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for oracleasm kmp",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update provides rebuilt kernel modules for SUSE Linux Enterprise 12 SP3 products\nwith retpoline enablement to address Spectre Variant 2 (CVE-2017-5715 bsc#1068032).\n\nFollowing modules have been rebuilt:\n\n- drbd\n- oracleasm\n- crash\n- lttng-modules\n\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-HA-12-SP3-2018-1027,SUSE-SLE-SDK-12-SP3-2018-1027,SUSE-SLE-SERVER-12-SP3-2018-1027",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1503-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1503-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181503-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1503-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004113.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for oracleasm kmp",
"tracking": {
"current_release_date": "2018-06-05T09:18:01Z",
"generator": {
"date": "2018-06-05T09:18:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1503-1",
"initial_release_date": "2018-06-05T09:18:01Z",
"revision_history": [
{
"date": "2018-06-05T09:18:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "crash-devel-7.1.8-4.8.1.aarch64",
"product": {
"name": "crash-devel-7.1.8-4.8.1.aarch64",
"product_id": "crash-devel-7.1.8-4.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "crash-7.1.8-4.8.1.aarch64",
"product": {
"name": "crash-7.1.8-4.8.1.aarch64",
"product_id": "crash-7.1.8-4.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64",
"product": {
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64",
"product_id": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64",
"product": {
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64",
"product_id": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "drbd-9.0.8+git.c8bc3670-3.5.1.ppc64le",
"product": {
"name": "drbd-9.0.8+git.c8bc3670-3.5.1.ppc64le",
"product_id": "drbd-9.0.8+git.c8bc3670-3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.ppc64le",
"product": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.ppc64le",
"product_id": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "crash-devel-7.1.8-4.8.1.ppc64le",
"product": {
"name": "crash-devel-7.1.8-4.8.1.ppc64le",
"product_id": "crash-devel-7.1.8-4.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "crash-7.1.8-4.8.1.ppc64le",
"product": {
"name": "crash-7.1.8-4.8.1.ppc64le",
"product_id": "crash-7.1.8-4.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le",
"product": {
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le",
"product_id": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le",
"product": {
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le",
"product_id": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "drbd-9.0.8+git.c8bc3670-3.5.1.s390x",
"product": {
"name": "drbd-9.0.8+git.c8bc3670-3.5.1.s390x",
"product_id": "drbd-9.0.8+git.c8bc3670-3.5.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.s390x",
"product": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.s390x",
"product_id": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.s390x"
}
},
{
"category": "product_version",
"name": "crash-devel-7.1.8-4.8.1.s390x",
"product": {
"name": "crash-devel-7.1.8-4.8.1.s390x",
"product_id": "crash-devel-7.1.8-4.8.1.s390x"
}
},
{
"category": "product_version",
"name": "crash-7.1.8-4.8.1.s390x",
"product": {
"name": "crash-7.1.8-4.8.1.s390x",
"product_id": "crash-7.1.8-4.8.1.s390x"
}
},
{
"category": "product_version",
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x",
"product": {
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x",
"product_id": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x",
"product": {
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x",
"product_id": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "drbd-9.0.8+git.c8bc3670-3.5.1.x86_64",
"product": {
"name": "drbd-9.0.8+git.c8bc3670-3.5.1.x86_64",
"product_id": "drbd-9.0.8+git.c8bc3670-3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.x86_64",
"product": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.x86_64",
"product_id": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "crash-devel-7.1.8-4.8.1.x86_64",
"product": {
"name": "crash-devel-7.1.8-4.8.1.x86_64",
"product_id": "crash-devel-7.1.8-4.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "crash-7.1.8-4.8.1.x86_64",
"product": {
"name": "crash-7.1.8-4.8.1.x86_64",
"product_id": "crash-7.1.8-4.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64",
"product": {
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64",
"product_id": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "lttng-modules-2.7.1-8.2.1.x86_64",
"product": {
"name": "lttng-modules-2.7.1-8.2.1.x86_64",
"product_id": "lttng-modules-2.7.1-8.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64",
"product": {
"name": "lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64",
"product_id": "lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64",
"product": {
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64",
"product_id": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-9.0.8+git.c8bc3670-3.5.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.5.1.ppc64le"
},
"product_reference": "drbd-9.0.8+git.c8bc3670-3.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-9.0.8+git.c8bc3670-3.5.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.5.1.s390x"
},
"product_reference": "drbd-9.0.8+git.c8bc3670-3.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-9.0.8+git.c8bc3670-3.5.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.5.1.x86_64"
},
"product_reference": "drbd-9.0.8+git.c8bc3670-3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.ppc64le"
},
"product_reference": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.s390x"
},
"product_reference": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.x86_64"
},
"product_reference": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-devel-7.1.8-4.8.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.aarch64"
},
"product_reference": "crash-devel-7.1.8-4.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-devel-7.1.8-4.8.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.ppc64le"
},
"product_reference": "crash-devel-7.1.8-4.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-devel-7.1.8-4.8.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.s390x"
},
"product_reference": "crash-devel-7.1.8-4.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-devel-7.1.8-4.8.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.x86_64"
},
"product_reference": "crash-devel-7.1.8-4.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.8-4.8.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.aarch64"
},
"product_reference": "crash-7.1.8-4.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.8-4.8.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.ppc64le"
},
"product_reference": "crash-7.1.8-4.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.8-4.8.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.s390x"
},
"product_reference": "crash-7.1.8-4.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.8-4.8.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.x86_64"
},
"product_reference": "crash-7.1.8-4.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64"
},
"product_reference": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le"
},
"product_reference": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x"
},
"product_reference": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64"
},
"product_reference": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lttng-modules-2.7.1-8.2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.2.1.x86_64"
},
"product_reference": "lttng-modules-2.7.1-8.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64"
},
"product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64"
},
"product_reference": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le"
},
"product_reference": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x"
},
"product_reference": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64"
},
"product_reference": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.8-4.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.aarch64"
},
"product_reference": "crash-7.1.8-4.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.8-4.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.ppc64le"
},
"product_reference": "crash-7.1.8-4.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.8-4.8.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.s390x"
},
"product_reference": "crash-7.1.8-4.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.8-4.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.x86_64"
},
"product_reference": "crash-7.1.8-4.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64"
},
"product_reference": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le"
},
"product_reference": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x"
},
"product_reference": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64"
},
"product_reference": "crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lttng-modules-2.7.1-8.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.2.1.x86_64"
},
"product_reference": "lttng-modules-2.7.1-8.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64"
},
"product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64"
},
"product_reference": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le"
},
"product_reference": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x"
},
"product_reference": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64"
},
"product_reference": "oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.5.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.5.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.5.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-7.1.8-4.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:crash-devel-7.1.8-4.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-05T09:18:01Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:1570-1
Vulnerability from csaf_suse - Published: 2018-06-07 11:43 - Updated: 2018-06-07 11:43Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-firmware",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-firmware fixes the following issues:\n\n- CVE-2015-1142857: Add 7.13.1.0 bnx2x firmware files to fix ethernet flow control\n vulnerability in SRIOV devices (bsc#1077355)\n- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker\n with local user access caused by speculative execution and indirect branch\n prediction (bsc#1095735).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-SP1-2018-1088,SUSE-SLE-SERVER-12-SP1-2018-1088",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1570-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1570-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181570-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1570-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004161.html"
},
{
"category": "self",
"summary": "SUSE Bug 1077355",
"url": "https://bugzilla.suse.com/1077355"
},
{
"category": "self",
"summary": "SUSE Bug 1095735",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1142857 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1142857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for kernel-firmware",
"tracking": {
"current_release_date": "2018-06-07T11:43:30Z",
"generator": {
"date": "2018-06-07T11:43:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1570-1",
"initial_release_date": "2018-06-07T11:43:30Z",
"revision_history": [
{
"date": "2018-06-07T11:43:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-20160516git-10.13.1.noarch",
"product": {
"name": "kernel-firmware-20160516git-10.13.1.noarch",
"product_id": "kernel-firmware-20160516git-10.13.1.noarch"
}
},
{
"category": "product_version",
"name": "ucode-amd-20160516git-10.13.1.noarch",
"product": {
"name": "ucode-amd-20160516git-10.13.1.noarch",
"product_id": "ucode-amd-20160516git-10.13.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20160516git-10.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-firmware-20160516git-10.13.1.noarch"
},
"product_reference": "kernel-firmware-20160516git-10.13.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20160516git-10.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-amd-20160516git-10.13.1.noarch"
},
"product_reference": "ucode-amd-20160516git-10.13.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20160516git-10.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-firmware-20160516git-10.13.1.noarch"
},
"product_reference": "kernel-firmware-20160516git-10.13.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20160516git-10.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-amd-20160516git-10.13.1.noarch"
},
"product_reference": "ucode-amd-20160516git-10.13.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-1142857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1142857"
}
],
"notes": [
{
"category": "general",
"text": "On multiple SR-IOV cars it is possible for VF\u0027s assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-firmware-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-amd-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-firmware-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-amd-20160516git-10.13.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1142857",
"url": "https://www.suse.com/security/cve/CVE-2015-1142857"
},
{
"category": "external",
"summary": "SUSE Bug 1077355 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1077355"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1105108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-firmware-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-amd-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-firmware-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-amd-20160516git-10.13.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-firmware-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-amd-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-firmware-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-amd-20160516git-10.13.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-07T11:43:30Z",
"details": "moderate"
}
],
"title": "CVE-2015-1142857"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-firmware-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-amd-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-firmware-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-amd-20160516git-10.13.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-firmware-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-amd-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-firmware-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-amd-20160516git-10.13.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-firmware-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-amd-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-firmware-20160516git-10.13.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-amd-20160516git-10.13.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-07T11:43:30Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:0056-1
Vulnerability from csaf_suse - Published: 2018-01-09 14:46 - Updated: 2018-01-09 14:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThis update for qemu fixes the following issues:\n\nA mitigation for a security flaw has been applied:\n\n- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from \n the host VM to the CPU, to allow enabling/disabling branch prediction features in the\n Intel CPU. (bsc#1068032)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-6-2018-39,SUSE-SLE-SAP-12-SP1-2018-39,SUSE-SLE-SERVER-12-SP1-2018-39",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0056-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0056-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180056-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0056-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003583.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-01-09T14:46:36Z",
"generator": {
"date": "2018-01-09T14:46:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0056-1",
"initial_release_date": "2018-01-09T14:46:36Z",
"revision_history": [
{
"date": "2018-01-09T14:46:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-33.6.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-33.6.1.noarch",
"product_id": "qemu-ipxe-1.0.0-33.6.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.8.1-33.6.1.noarch",
"product": {
"name": "qemu-seabios-1.8.1-33.6.1.noarch",
"product_id": "qemu-seabios-1.8.1-33.6.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-33.6.1.noarch",
"product": {
"name": "qemu-sgabios-8-33.6.1.noarch",
"product_id": "qemu-sgabios-8-33.6.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.8.1-33.6.1.noarch",
"product": {
"name": "qemu-vgabios-1.8.1-33.6.1.noarch",
"product_id": "qemu-vgabios-1.8.1-33.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-33.6.1.ppc64le",
"product": {
"name": "qemu-2.3.1-33.6.1.ppc64le",
"product_id": "qemu-2.3.1-33.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-33.6.1.ppc64le",
"product": {
"name": "qemu-block-curl-2.3.1-33.6.1.ppc64le",
"product_id": "qemu-block-curl-2.3.1-33.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-33.6.1.ppc64le",
"product": {
"name": "qemu-guest-agent-2.3.1-33.6.1.ppc64le",
"product_id": "qemu-guest-agent-2.3.1-33.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-33.6.1.ppc64le",
"product": {
"name": "qemu-lang-2.3.1-33.6.1.ppc64le",
"product_id": "qemu-lang-2.3.1-33.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.3.1-33.6.1.ppc64le",
"product": {
"name": "qemu-ppc-2.3.1-33.6.1.ppc64le",
"product_id": "qemu-ppc-2.3.1-33.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-33.6.1.ppc64le",
"product": {
"name": "qemu-tools-2.3.1-33.6.1.ppc64le",
"product_id": "qemu-tools-2.3.1-33.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-33.6.1.s390x",
"product": {
"name": "qemu-2.3.1-33.6.1.s390x",
"product_id": "qemu-2.3.1-33.6.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-33.6.1.s390x",
"product": {
"name": "qemu-block-curl-2.3.1-33.6.1.s390x",
"product_id": "qemu-block-curl-2.3.1-33.6.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-33.6.1.s390x",
"product": {
"name": "qemu-guest-agent-2.3.1-33.6.1.s390x",
"product_id": "qemu-guest-agent-2.3.1-33.6.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.3.1-33.6.1.s390x",
"product": {
"name": "qemu-kvm-2.3.1-33.6.1.s390x",
"product_id": "qemu-kvm-2.3.1-33.6.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-33.6.1.s390x",
"product": {
"name": "qemu-lang-2.3.1-33.6.1.s390x",
"product_id": "qemu-lang-2.3.1-33.6.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.3.1-33.6.1.s390x",
"product": {
"name": "qemu-s390-2.3.1-33.6.1.s390x",
"product_id": "qemu-s390-2.3.1-33.6.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-33.6.1.s390x",
"product": {
"name": "qemu-tools-2.3.1-33.6.1.s390x",
"product_id": "qemu-tools-2.3.1-33.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-33.6.1.x86_64",
"product": {
"name": "qemu-2.3.1-33.6.1.x86_64",
"product_id": "qemu-2.3.1-33.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-33.6.1.x86_64",
"product": {
"name": "qemu-block-curl-2.3.1-33.6.1.x86_64",
"product_id": "qemu-block-curl-2.3.1-33.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.3.1-33.6.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.3.1-33.6.1.x86_64",
"product_id": "qemu-block-rbd-2.3.1-33.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-33.6.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.3.1-33.6.1.x86_64",
"product_id": "qemu-guest-agent-2.3.1-33.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.3.1-33.6.1.x86_64",
"product": {
"name": "qemu-kvm-2.3.1-33.6.1.x86_64",
"product_id": "qemu-kvm-2.3.1-33.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-33.6.1.x86_64",
"product": {
"name": "qemu-lang-2.3.1-33.6.1.x86_64",
"product_id": "qemu-lang-2.3.1-33.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-33.6.1.x86_64",
"product": {
"name": "qemu-tools-2.3.1-33.6.1.x86_64",
"product_id": "qemu-tools-2.3.1-33.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.3.1-33.6.1.x86_64",
"product": {
"name": "qemu-x86-2.3.1-33.6.1.x86_64",
"product_id": "qemu-x86-2.3.1-33.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 6",
"product": {
"name": "SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:qemu-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:qemu-block-curl-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-block-curl-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.3.1-33.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:qemu-block-rbd-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:qemu-guest-agent-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-33.6.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:qemu-ipxe-1.0.0-33.6.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-33.6.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-33.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:qemu-kvm-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-kvm-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:qemu-lang-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-lang-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.8.1-33.6.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:qemu-seabios-1.8.1-33.6.1.noarch"
},
"product_reference": "qemu-seabios-1.8.1-33.6.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-33.6.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:qemu-sgabios-8-33.6.1.noarch"
},
"product_reference": "qemu-sgabios-8-33.6.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:qemu-tools-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-tools-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.8.1-33.6.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:qemu-vgabios-1.8.1-33.6.1.noarch"
},
"product_reference": "qemu-vgabios-1.8.1-33.6.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.3.1-33.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:qemu-x86-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-x86-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.6.1.ppc64le"
},
"product_reference": "qemu-2.3.1-33.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.6.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.3.1-33.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-block-curl-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.6.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.3.1-33.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-33.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.6.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-33.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-kvm-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.6.1.ppc64le"
},
"product_reference": "qemu-lang-2.3.1-33.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-lang-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.3.1-33.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.6.1.ppc64le"
},
"product_reference": "qemu-ppc-2.3.1-33.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.8.1-33.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.6.1.noarch"
},
"product_reference": "qemu-seabios-1.8.1-33.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-33.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.6.1.noarch"
},
"product_reference": "qemu-sgabios-8-33.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.6.1.ppc64le"
},
"product_reference": "qemu-tools-2.3.1-33.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-tools-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.8.1-33.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.6.1.noarch"
},
"product_reference": "qemu-vgabios-1.8.1-33.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-x86-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.6.1.ppc64le"
},
"product_reference": "qemu-2.3.1-33.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.6.1.s390x"
},
"product_reference": "qemu-2.3.1-33.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.6.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.3.1-33.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.6.1.s390x"
},
"product_reference": "qemu-block-curl-2.3.1-33.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-block-curl-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.6.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.3.1-33.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.6.1.s390x"
},
"product_reference": "qemu-guest-agent-2.3.1-33.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-33.6.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.6.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-33.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-33.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.6.1.s390x"
},
"product_reference": "qemu-kvm-2.3.1-33.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-kvm-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.6.1.ppc64le"
},
"product_reference": "qemu-lang-2.3.1-33.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.6.1.s390x"
},
"product_reference": "qemu-lang-2.3.1-33.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-lang-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.3.1-33.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.6.1.ppc64le"
},
"product_reference": "qemu-ppc-2.3.1-33.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.3.1-33.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.6.1.s390x"
},
"product_reference": "qemu-s390-2.3.1-33.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.8.1-33.6.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.6.1.noarch"
},
"product_reference": "qemu-seabios-1.8.1-33.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-33.6.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.6.1.noarch"
},
"product_reference": "qemu-sgabios-8-33.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.6.1.ppc64le"
},
"product_reference": "qemu-tools-2.3.1-33.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.6.1.s390x"
},
"product_reference": "qemu-tools-2.3.1-33.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-tools-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.8.1-33.6.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.6.1.noarch"
},
"product_reference": "qemu-vgabios-1.8.1-33.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.3.1-33.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.6.1.x86_64"
},
"product_reference": "qemu-x86-2.3.1-33.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-block-curl-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-block-rbd-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-guest-agent-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-ipxe-1.0.0-33.6.1.noarch",
"SUSE OpenStack Cloud 6:qemu-kvm-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-lang-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-seabios-1.8.1-33.6.1.noarch",
"SUSE OpenStack Cloud 6:qemu-sgabios-8-33.6.1.noarch",
"SUSE OpenStack Cloud 6:qemu-tools-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-vgabios-1.8.1-33.6.1.noarch",
"SUSE OpenStack Cloud 6:qemu-x86-2.3.1-33.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-block-curl-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-block-rbd-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-guest-agent-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-ipxe-1.0.0-33.6.1.noarch",
"SUSE OpenStack Cloud 6:qemu-kvm-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-lang-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-seabios-1.8.1-33.6.1.noarch",
"SUSE OpenStack Cloud 6:qemu-sgabios-8-33.6.1.noarch",
"SUSE OpenStack Cloud 6:qemu-tools-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-vgabios-1.8.1-33.6.1.noarch",
"SUSE OpenStack Cloud 6:qemu-x86-2.3.1-33.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-block-curl-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-block-rbd-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-guest-agent-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-ipxe-1.0.0-33.6.1.noarch",
"SUSE OpenStack Cloud 6:qemu-kvm-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-lang-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-seabios-1.8.1-33.6.1.noarch",
"SUSE OpenStack Cloud 6:qemu-sgabios-8-33.6.1.noarch",
"SUSE OpenStack Cloud 6:qemu-tools-2.3.1-33.6.1.x86_64",
"SUSE OpenStack Cloud 6:qemu-vgabios-1.8.1-33.6.1.noarch",
"SUSE OpenStack Cloud 6:qemu-x86-2.3.1-33.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-09T14:46:36Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:2141-1
Vulnerability from csaf_suse - Published: 2018-07-30 16:11 - Updated: 2018-07-30 16:11Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-3639: Add support for \u0027ssbd\u0027 and \u0027virt-ssbd\u0027 CPUID feature bits to address V4 Speculative Store Bypass aka \u0027Memory Disambiguation\u0027 (bsc#1092885).\n- CVE-2018-1064: Fix denial of service problem during reading from guest agent (bsc#1083625).\n- CVE-2018-5748: Fix resource exhaustion via qemuMonitorIORead() method (bsc#1076500).\n- CVE-2016-5008: Fix that an empty VNC password disables authentication (bsc#987527).\n- CVE-2017-5715: Fix speculative side channel attacks aka \u0027SpectreAttack\u0027 (var2) (bsc#1079869).\n\nBug fixes:\n\n- bsc#980558: Fix NUMA node memory allocation.\n- bsc#968483: Restart daemons in %posttrans after connection drivers.\n- bsc#897352: Systemd fails to ignore LSB services.\n- bsc#956298: virsh domxml-to-native causes segfault of libvirtd.\n- bsc#964465: libvirtd.service causes systemd warning about xencommons service.\n- bsc#954872: Script block-dmmd not working as expected.\n- bsc#854343: libvirt installation run inappropriate systemd restart.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-2018-1455",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2141-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2141-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182141-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2141-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html"
},
{
"category": "self",
"summary": "SUSE Bug 1076500",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "self",
"summary": "SUSE Bug 1079869",
"url": "https://bugzilla.suse.com/1079869"
},
{
"category": "self",
"summary": "SUSE Bug 1083625",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE Bug 854343",
"url": "https://bugzilla.suse.com/854343"
},
{
"category": "self",
"summary": "SUSE Bug 897352",
"url": "https://bugzilla.suse.com/897352"
},
{
"category": "self",
"summary": "SUSE Bug 954872",
"url": "https://bugzilla.suse.com/954872"
},
{
"category": "self",
"summary": "SUSE Bug 956298",
"url": "https://bugzilla.suse.com/956298"
},
{
"category": "self",
"summary": "SUSE Bug 964465",
"url": "https://bugzilla.suse.com/964465"
},
{
"category": "self",
"summary": "SUSE Bug 968483",
"url": "https://bugzilla.suse.com/968483"
},
{
"category": "self",
"summary": "SUSE Bug 980558",
"url": "https://bugzilla.suse.com/980558"
},
{
"category": "self",
"summary": "SUSE Bug 987527",
"url": "https://bugzilla.suse.com/987527"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5008 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1064 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5748 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5748/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-07-30T16:11:30Z",
"generator": {
"date": "2018-07-30T16:11:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2141-1",
"initial_release_date": "2018-07-30T16:11:30Z",
"revision_history": [
{
"date": "2018-07-30T16:11:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-client-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-client-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-doc-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-doc-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-1.2.5-27.13.1.s390x",
"product_id": "libvirt-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-client-1.2.5-27.13.1.s390x",
"product_id": "libvirt-client-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-config-network-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-network-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-lxc-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-qemu-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-doc-1.2.5-27.13.1.s390x",
"product_id": "libvirt-doc-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"product_id": "libvirt-lock-sanlock-1.2.5-27.13.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-client-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-client-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-config-network-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-lxc-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-qemu-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-xen-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-doc-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-doc-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-client-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-client-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-client-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-doc-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-doc-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-doc-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5008"
}
],
"notes": [
{
"category": "general",
"text": "libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers to bypass authentication and establish a VNC session by connecting to the server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5008",
"url": "https://www.suse.com/security/cve/CVE-2016-5008"
},
{
"category": "external",
"summary": "SUSE Bug 987527 for CVE-2016-5008",
"url": "https://bugzilla.suse.com/987527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-30T16:11:30Z",
"details": "moderate"
}
],
"title": "CVE-2016-5008"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-30T16:11:30Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1064"
}
],
"notes": [
{
"category": "general",
"text": "libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1064",
"url": "https://www.suse.com/security/cve/CVE-2018-1064"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1088147"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-30T16:11:30Z",
"details": "moderate"
}
],
"title": "CVE-2018-1064"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-30T16:11:30Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-5748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5748"
}
],
"notes": [
{
"category": "general",
"text": "qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5748",
"url": "https://www.suse.com/security/cve/CVE-2018-5748"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1087887"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-30T16:11:30Z",
"details": "low"
}
],
"title": "CVE-2018-5748"
}
]
}
SUSE-SU-2018:1080-1
Vulnerability from csaf_suse - Published: 2018-04-25 13:27 - Updated: 2018-04-25 13:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).\n\n Enhancements and bugfixes over the previous fixes have been added to this kernel.\n\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).\n- CVE-2018-7566: There was a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bnc#1083483).\n- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver. (bnc#1072865).\n- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allowed local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).\n- CVE-2017-16911: The vhci_hcd driver allowed allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP (bnc#1078674).\n- CVE-2017-18208: The madvise_willneed function in mm/madvise.c local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).\n- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).\n- CVE-2018-6927: The futex_requeue function in kernel/futex.c in the Linux kernel might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value (bnc#1080757).\n- CVE-2017-16914: The \u0027stub_send_ret_submit()\u0027 function (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet (bnc#1078669).\n- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver (bnc#1010470).\n- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776).\n- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in block/bio.c did unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (bnc#1062568).\n- CVE-2017-16912: The \u0027get_pipe()\u0027 function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).\n- CVE-2017-16913: The \u0027stub_recv_cmd_submit()\u0027 function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).\n\nThe following non-security bugs were fixed:\n\n- af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085513, LTC#165135).\n- cifs: fix buffer overflow in cifs_build_path_to_root() (bsc#1085113).\n- drm/mgag200: fix a test in mga_vga_mode_valid() (bsc#1087092).\n- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1013018).\n- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1013018).\n- ide-cd: workaround VMware ESXi cdrom emulation bug (bsc#1080813).\n- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).\n- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).\n- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).\n- jffs2: Fix use-after-free bug in jffs2_iget()\u0027s error handling path (git-fixes).\n- kabi: x86/kaiser: properly align trampoline stack.\n- keys: do not let add_key() update an uninstantiated key (bnc#1063416).\n- keys: prevent creating a different user\u0027s keyrings (bnc#1065999).\n- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).\n- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).\n- nfsv4: fix getacl head length estimation (git-fixes).\n- pci: Use function 0 VPD for identical functions, regular VPD for others (bnc#943786 git-fixes).\n- pipe: actually allow root to exceed the pipe buffer limits (git-fixes).\n- posix-timers: Protect posix clock array access against speculation (bnc#1081358).\n- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075088).\n- qeth: repair SBAL elements calculation (bnc#1085513, LTC#165484).\n- Revert \u0027USB: cdc-acm: fix broken runtime suspend\u0027 (bsc#1067912)\n- s390/qeth: fix underestimated count of buffer elements (bnc#1082091, LTC#164529).\n- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).\n- usbnet: Fix a race between usbnet_stop() and the BH (bsc#1083275).\n- x86-64: Move the \u0027user\u0027 vsyscall segment out of the data segment (bsc#1082424).\n- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).\n- x86/kaiser: properly align trampoline stack (bsc#1087260).\n- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).\n- xen/x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).\n- xen/x86/cpu: Check speculation control CPUID bit (bsc#1068032).\n- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).\n- xen/x86/cpu: Fix bootup crashes by sanitizing the argument of the \u0027clearcpuid=\u0027 command-line option (bsc#1065600).\n- xen/x86/cpu: Sync CPU feature flags late (bsc#1075994 bsc#1075091).\n- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- xen/x86/idle: Toggle IBRS when going idle (bsc#1068032).\n- xen/x86/kaiser: Move feature detection up (bsc#1068032).\n- xfs: check for buffer errors before waiting (bsc#1052943).\n- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).\n- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-kernel-source-20180417-13574,slessp4-kernel-source-20180417-13574,slexsp3-kernel-source-20180417-13574",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1080-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1080-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181080-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1080-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html"
},
{
"category": "self",
"summary": "SUSE Bug 1010470",
"url": "https://bugzilla.suse.com/1010470"
},
{
"category": "self",
"summary": "SUSE Bug 1013018",
"url": "https://bugzilla.suse.com/1013018"
},
{
"category": "self",
"summary": "SUSE Bug 1039348",
"url": "https://bugzilla.suse.com/1039348"
},
{
"category": "self",
"summary": "SUSE Bug 1052943",
"url": "https://bugzilla.suse.com/1052943"
},
{
"category": "self",
"summary": "SUSE Bug 1062568",
"url": "https://bugzilla.suse.com/1062568"
},
{
"category": "self",
"summary": "SUSE Bug 1062840",
"url": "https://bugzilla.suse.com/1062840"
},
{
"category": "self",
"summary": "SUSE Bug 1063416",
"url": "https://bugzilla.suse.com/1063416"
},
{
"category": "self",
"summary": "SUSE Bug 1063516",
"url": "https://bugzilla.suse.com/1063516"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065999",
"url": "https://bugzilla.suse.com/1065999"
},
{
"category": "self",
"summary": "SUSE Bug 1067118",
"url": "https://bugzilla.suse.com/1067118"
},
{
"category": "self",
"summary": "SUSE Bug 1067912",
"url": "https://bugzilla.suse.com/1067912"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1072689",
"url": "https://bugzilla.suse.com/1072689"
},
{
"category": "self",
"summary": "SUSE Bug 1072865",
"url": "https://bugzilla.suse.com/1072865"
},
{
"category": "self",
"summary": "SUSE Bug 1075088",
"url": "https://bugzilla.suse.com/1075088"
},
{
"category": "self",
"summary": "SUSE Bug 1075091",
"url": "https://bugzilla.suse.com/1075091"
},
{
"category": "self",
"summary": "SUSE Bug 1075994",
"url": "https://bugzilla.suse.com/1075994"
},
{
"category": "self",
"summary": "SUSE Bug 1078669",
"url": "https://bugzilla.suse.com/1078669"
},
{
"category": "self",
"summary": "SUSE Bug 1078672",
"url": "https://bugzilla.suse.com/1078672"
},
{
"category": "self",
"summary": "SUSE Bug 1078673",
"url": "https://bugzilla.suse.com/1078673"
},
{
"category": "self",
"summary": "SUSE Bug 1078674",
"url": "https://bugzilla.suse.com/1078674"
},
{
"category": "self",
"summary": "SUSE Bug 1080464",
"url": "https://bugzilla.suse.com/1080464"
},
{
"category": "self",
"summary": "SUSE Bug 1080757",
"url": "https://bugzilla.suse.com/1080757"
},
{
"category": "self",
"summary": "SUSE Bug 1080813",
"url": "https://bugzilla.suse.com/1080813"
},
{
"category": "self",
"summary": "SUSE Bug 1081358",
"url": "https://bugzilla.suse.com/1081358"
},
{
"category": "self",
"summary": "SUSE Bug 1082091",
"url": "https://bugzilla.suse.com/1082091"
},
{
"category": "self",
"summary": "SUSE Bug 1082424",
"url": "https://bugzilla.suse.com/1082424"
},
{
"category": "self",
"summary": "SUSE Bug 1083242",
"url": "https://bugzilla.suse.com/1083242"
},
{
"category": "self",
"summary": "SUSE Bug 1083275",
"url": "https://bugzilla.suse.com/1083275"
},
{
"category": "self",
"summary": "SUSE Bug 1083483",
"url": "https://bugzilla.suse.com/1083483"
},
{
"category": "self",
"summary": "SUSE Bug 1083494",
"url": "https://bugzilla.suse.com/1083494"
},
{
"category": "self",
"summary": "SUSE Bug 1084536",
"url": "https://bugzilla.suse.com/1084536"
},
{
"category": "self",
"summary": "SUSE Bug 1085113",
"url": "https://bugzilla.suse.com/1085113"
},
{
"category": "self",
"summary": "SUSE Bug 1085279",
"url": "https://bugzilla.suse.com/1085279"
},
{
"category": "self",
"summary": "SUSE Bug 1085331",
"url": "https://bugzilla.suse.com/1085331"
},
{
"category": "self",
"summary": "SUSE Bug 1085513",
"url": "https://bugzilla.suse.com/1085513"
},
{
"category": "self",
"summary": "SUSE Bug 1086162",
"url": "https://bugzilla.suse.com/1086162"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1087260",
"url": "https://bugzilla.suse.com/1087260"
},
{
"category": "self",
"summary": "SUSE Bug 1087762",
"url": "https://bugzilla.suse.com/1087762"
},
{
"category": "self",
"summary": "SUSE Bug 1088147",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "self",
"summary": "SUSE Bug 1088260",
"url": "https://bugzilla.suse.com/1088260"
},
{
"category": "self",
"summary": "SUSE Bug 1089608",
"url": "https://bugzilla.suse.com/1089608"
},
{
"category": "self",
"summary": "SUSE Bug 909077",
"url": "https://bugzilla.suse.com/909077"
},
{
"category": "self",
"summary": "SUSE Bug 940776",
"url": "https://bugzilla.suse.com/940776"
},
{
"category": "self",
"summary": "SUSE Bug 943786",
"url": "https://bugzilla.suse.com/943786"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5156 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7915 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7915/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-0861 page",
"url": "https://www.suse.com/security/cve/CVE-2017-0861/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12190 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13166 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16644 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16644/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16911 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16911/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16912 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16913 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16913/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16914 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16914/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18203 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18208 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10087 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6927 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6927/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7566 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7757 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8822 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8822/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-04-25T13:27:56Z",
"generator": {
"date": "2018-04-25T13:27:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1080-1",
"initial_release_date": "2018-04-25T13:27:56Z",
"revision_history": [
{
"date": "2018-04-25T13:27:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-default-3.0.101-108.38.1.i586",
"product_id": "kernel-default-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-108.38.1.i586",
"product_id": "kernel-default-base-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-108.38.1.i586",
"product_id": "kernel-default-devel-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-108.38.1.i586",
"product_id": "kernel-ec2-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-108.38.1.i586",
"product_id": "kernel-ec2-base-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.38.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-pae-3.0.101-108.38.1.i586",
"product_id": "kernel-pae-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-108.38.1.i586",
"product_id": "kernel-pae-base-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-108.38.1.i586",
"product_id": "kernel-pae-devel-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-source-3.0.101-108.38.1.i586",
"product_id": "kernel-source-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-syms-3.0.101-108.38.1.i586",
"product_id": "kernel-syms-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-trace-3.0.101-108.38.1.i586",
"product_id": "kernel-trace-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-108.38.1.i586",
"product_id": "kernel-trace-base-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-108.38.1.i586",
"product_id": "kernel-trace-devel-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-xen-3.0.101-108.38.1.i586",
"product_id": "kernel-xen-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-108.38.1.i586",
"product_id": "kernel-xen-base-3.0.101-108.38.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.38.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-108.38.1.i586",
"product_id": "kernel-xen-devel-3.0.101-108.38.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.38.1.ia64",
"product": {
"name": "kernel-default-3.0.101-108.38.1.ia64",
"product_id": "kernel-default-3.0.101-108.38.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.38.1.ia64",
"product": {
"name": "kernel-default-base-3.0.101-108.38.1.ia64",
"product_id": "kernel-default-base-3.0.101-108.38.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.38.1.ia64",
"product": {
"name": "kernel-default-devel-3.0.101-108.38.1.ia64",
"product_id": "kernel-default-devel-3.0.101-108.38.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.38.1.ia64",
"product": {
"name": "kernel-source-3.0.101-108.38.1.ia64",
"product_id": "kernel-source-3.0.101-108.38.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.38.1.ia64",
"product": {
"name": "kernel-syms-3.0.101-108.38.1.ia64",
"product_id": "kernel-syms-3.0.101-108.38.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.38.1.ia64",
"product": {
"name": "kernel-trace-3.0.101-108.38.1.ia64",
"product_id": "kernel-trace-3.0.101-108.38.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.38.1.ia64",
"product": {
"name": "kernel-trace-base-3.0.101-108.38.1.ia64",
"product_id": "kernel-trace-base-3.0.101-108.38.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.38.1.ia64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.38.1.ia64",
"product_id": "kernel-trace-devel-3.0.101-108.38.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-docs-3.0.101-108.38.1.noarch",
"product": {
"name": "kernel-docs-3.0.101-108.38.1.noarch",
"product_id": "kernel-docs-3.0.101-108.38.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-bigmem-3.0.101-108.38.1.ppc64",
"product": {
"name": "kernel-bigmem-3.0.101-108.38.1.ppc64",
"product_id": "kernel-bigmem-3.0.101-108.38.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"product": {
"name": "kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"product_id": "kernel-bigmem-base-3.0.101-108.38.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"product": {
"name": "kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"product_id": "kernel-bigmem-devel-3.0.101-108.38.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.38.1.ppc64",
"product": {
"name": "kernel-default-3.0.101-108.38.1.ppc64",
"product_id": "kernel-default-3.0.101-108.38.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.38.1.ppc64",
"product": {
"name": "kernel-default-base-3.0.101-108.38.1.ppc64",
"product_id": "kernel-default-base-3.0.101-108.38.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.38.1.ppc64",
"product": {
"name": "kernel-default-devel-3.0.101-108.38.1.ppc64",
"product_id": "kernel-default-devel-3.0.101-108.38.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-3.0.101-108.38.1.ppc64",
"product": {
"name": "kernel-ppc64-3.0.101-108.38.1.ppc64",
"product_id": "kernel-ppc64-3.0.101-108.38.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"product": {
"name": "kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"product_id": "kernel-ppc64-base-3.0.101-108.38.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"product": {
"name": "kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"product_id": "kernel-ppc64-devel-3.0.101-108.38.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.38.1.ppc64",
"product": {
"name": "kernel-source-3.0.101-108.38.1.ppc64",
"product_id": "kernel-source-3.0.101-108.38.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.38.1.ppc64",
"product": {
"name": "kernel-syms-3.0.101-108.38.1.ppc64",
"product_id": "kernel-syms-3.0.101-108.38.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.38.1.ppc64",
"product": {
"name": "kernel-trace-3.0.101-108.38.1.ppc64",
"product_id": "kernel-trace-3.0.101-108.38.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.38.1.ppc64",
"product": {
"name": "kernel-trace-base-3.0.101-108.38.1.ppc64",
"product_id": "kernel-trace-base-3.0.101-108.38.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.38.1.ppc64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.38.1.ppc64",
"product_id": "kernel-trace-devel-3.0.101-108.38.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.38.1.s390x",
"product": {
"name": "kernel-default-3.0.101-108.38.1.s390x",
"product_id": "kernel-default-3.0.101-108.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.38.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-108.38.1.s390x",
"product_id": "kernel-default-base-3.0.101-108.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.38.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-108.38.1.s390x",
"product_id": "kernel-default-devel-3.0.101-108.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-108.38.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-108.38.1.s390x",
"product_id": "kernel-default-man-3.0.101-108.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.38.1.s390x",
"product": {
"name": "kernel-source-3.0.101-108.38.1.s390x",
"product_id": "kernel-source-3.0.101-108.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.38.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-108.38.1.s390x",
"product_id": "kernel-syms-3.0.101-108.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.38.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-108.38.1.s390x",
"product_id": "kernel-trace-3.0.101-108.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.38.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-108.38.1.s390x",
"product_id": "kernel-trace-base-3.0.101-108.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.38.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-108.38.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-108.38.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.38.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-108.38.1.x86_64",
"product_id": "kernel-default-3.0.101-108.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.38.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-108.38.1.x86_64",
"product_id": "kernel-default-base-3.0.101-108.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.38.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-108.38.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-108.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.38.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-108.38.1.x86_64",
"product_id": "kernel-ec2-3.0.101-108.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.38.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-108.38.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-108.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-108.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.38.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-108.38.1.x86_64",
"product_id": "kernel-source-3.0.101-108.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.38.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-108.38.1.x86_64",
"product_id": "kernel-syms-3.0.101-108.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.38.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-108.38.1.x86_64",
"product_id": "kernel-trace-3.0.101-108.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.38.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-108.38.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-108.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.38.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.38.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-108.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.38.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-108.38.1.x86_64",
"product_id": "kernel-xen-3.0.101-108.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.38.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-108.38.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-108.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.38.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-108.38.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-108.38.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-3.0.101-108.38.1.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
},
"product_reference": "kernel-docs-3.0.101-108.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-bigmem-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-default-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-default-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-default-base-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-default-devel-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-pae-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-source-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-source-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-syms-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-syms-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-trace-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-trace-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-trace-base-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-xen-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-bigmem-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-default-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-default-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-default-base-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-default-devel-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-pae-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-source-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-source-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-syms-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-syms-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-trace-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-trace-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-trace-base-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.38.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.38.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-xen-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-108.38.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-5156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5156"
}
],
"notes": [
{
"category": "general",
"text": "The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5156",
"url": "https://www.suse.com/security/cve/CVE-2015-5156"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2015-5156",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1123903 for CVE-2015-5156",
"url": "https://bugzilla.suse.com/1123903"
},
{
"category": "external",
"summary": "SUSE Bug 940776 for CVE-2015-5156",
"url": "https://bugzilla.suse.com/940776"
},
{
"category": "external",
"summary": "SUSE Bug 945048 for CVE-2015-5156",
"url": "https://bugzilla.suse.com/945048"
},
{
"category": "external",
"summary": "SUSE Bug 951638 for CVE-2015-5156",
"url": "https://bugzilla.suse.com/951638"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "moderate"
}
],
"title": "CVE-2015-5156"
},
{
"cve": "CVE-2016-7915",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7915"
}
],
"notes": [
{
"category": "general",
"text": "The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7915",
"url": "https://www.suse.com/security/cve/CVE-2016-7915"
},
{
"category": "external",
"summary": "SUSE Bug 1010470 for CVE-2016-7915",
"url": "https://bugzilla.suse.com/1010470"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2016-7915",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "moderate"
}
],
"title": "CVE-2016-7915"
},
{
"cve": "CVE-2017-0861",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-0861"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-0861",
"url": "https://www.suse.com/security/cve/CVE-2017-0861"
},
{
"category": "external",
"summary": "SUSE Bug 1088260 for CVE-2017-0861",
"url": "https://bugzilla.suse.com/1088260"
},
{
"category": "external",
"summary": "SUSE Bug 1088268 for CVE-2017-0861",
"url": "https://bugzilla.suse.com/1088268"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-0861",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-0861",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "moderate"
}
],
"title": "CVE-2017-0861"
},
{
"cve": "CVE-2017-12190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12190"
}
],
"notes": [
{
"category": "general",
"text": "The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12190",
"url": "https://www.suse.com/security/cve/CVE-2017-12190"
},
{
"category": "external",
"summary": "SUSE Bug 1062568 for CVE-2017-12190",
"url": "https://bugzilla.suse.com/1062568"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-12190",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "moderate"
}
],
"title": "CVE-2017-12190"
},
{
"cve": "CVE-2017-13166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13166"
}
],
"notes": [
{
"category": "general",
"text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13166",
"url": "https://www.suse.com/security/cve/CVE-2017-13166"
},
{
"category": "external",
"summary": "SUSE Bug 1072865 for CVE-2017-13166",
"url": "https://bugzilla.suse.com/1072865"
},
{
"category": "external",
"summary": "SUSE Bug 1085447 for CVE-2017-13166",
"url": "https://bugzilla.suse.com/1085447"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-13166",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-13166",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "important"
}
],
"title": "CVE-2017-13166"
},
{
"cve": "CVE-2017-16644",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16644"
}
],
"notes": [
{
"category": "general",
"text": "The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16644",
"url": "https://www.suse.com/security/cve/CVE-2017-16644"
},
{
"category": "external",
"summary": "SUSE Bug 1067118 for CVE-2017-16644",
"url": "https://bugzilla.suse.com/1067118"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16644",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-16644",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16644",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "moderate"
}
],
"title": "CVE-2017-16644"
},
{
"cve": "CVE-2017-16911",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16911"
}
],
"notes": [
{
"category": "general",
"text": "The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16911",
"url": "https://www.suse.com/security/cve/CVE-2017-16911"
},
{
"category": "external",
"summary": "SUSE Bug 1078674 for CVE-2017-16911",
"url": "https://bugzilla.suse.com/1078674"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16911",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-16911",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "low"
}
],
"title": "CVE-2017-16911"
},
{
"cve": "CVE-2017-16912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16912"
}
],
"notes": [
{
"category": "general",
"text": "The \"get_pipe()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16912",
"url": "https://www.suse.com/security/cve/CVE-2017-16912"
},
{
"category": "external",
"summary": "SUSE Bug 1078673 for CVE-2017-16912",
"url": "https://bugzilla.suse.com/1078673"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16912",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-16912",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "moderate"
}
],
"title": "CVE-2017-16912"
},
{
"cve": "CVE-2017-16913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16913"
}
],
"notes": [
{
"category": "general",
"text": "The \"stub_recv_cmd_submit()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16913",
"url": "https://www.suse.com/security/cve/CVE-2017-16913"
},
{
"category": "external",
"summary": "SUSE Bug 1078672 for CVE-2017-16913",
"url": "https://bugzilla.suse.com/1078672"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16913",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-16913",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "moderate"
}
],
"title": "CVE-2017-16913"
},
{
"cve": "CVE-2017-16914",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16914"
}
],
"notes": [
{
"category": "general",
"text": "The \"stub_send_ret_submit()\" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16914",
"url": "https://www.suse.com/security/cve/CVE-2017-16914"
},
{
"category": "external",
"summary": "SUSE Bug 1078669 for CVE-2017-16914",
"url": "https://bugzilla.suse.com/1078669"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16914",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-16914",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "low"
}
],
"title": "CVE-2017-16914"
},
{
"cve": "CVE-2017-18203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18203"
}
],
"notes": [
{
"category": "general",
"text": "The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18203",
"url": "https://www.suse.com/security/cve/CVE-2017-18203"
},
{
"category": "external",
"summary": "SUSE Bug 1083242 for CVE-2017-18203",
"url": "https://bugzilla.suse.com/1083242"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18203",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "moderate"
}
],
"title": "CVE-2017-18203"
},
{
"cve": "CVE-2017-18208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18208"
}
],
"notes": [
{
"category": "general",
"text": "The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18208",
"url": "https://www.suse.com/security/cve/CVE-2017-18208"
},
{
"category": "external",
"summary": "SUSE Bug 1083494 for CVE-2017-18208",
"url": "https://bugzilla.suse.com/1083494"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-18208",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18208",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "moderate"
}
],
"title": "CVE-2017-18208"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-10087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10087"
}
],
"notes": [
{
"category": "general",
"text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10087",
"url": "https://www.suse.com/security/cve/CVE-2018-10087"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10087",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1089608 for CVE-2018-10087",
"url": "https://bugzilla.suse.com/1089608"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-10087",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "low"
}
],
"title": "CVE-2018-10087"
},
{
"cve": "CVE-2018-6927",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6927"
}
],
"notes": [
{
"category": "general",
"text": "The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6927",
"url": "https://www.suse.com/security/cve/CVE-2018-6927"
},
{
"category": "external",
"summary": "SUSE Bug 1080757 for CVE-2018-6927",
"url": "https://bugzilla.suse.com/1080757"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-6927",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "moderate"
}
],
"title": "CVE-2018-6927"
},
{
"cve": "CVE-2018-7566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7566"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7566",
"url": "https://www.suse.com/security/cve/CVE-2018-7566"
},
{
"category": "external",
"summary": "SUSE Bug 1083483 for CVE-2018-7566",
"url": "https://bugzilla.suse.com/1083483"
},
{
"category": "external",
"summary": "SUSE Bug 1083488 for CVE-2018-7566",
"url": "https://bugzilla.suse.com/1083488"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-7566",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-7566",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "important"
}
],
"title": "CVE-2018-7566"
},
{
"cve": "CVE-2018-7757",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7757"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7757",
"url": "https://www.suse.com/security/cve/CVE-2018-7757"
},
{
"category": "external",
"summary": "SUSE Bug 1084536 for CVE-2018-7757",
"url": "https://bugzilla.suse.com/1084536"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-7757",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1087209 for CVE-2018-7757",
"url": "https://bugzilla.suse.com/1087209"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-7757",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "moderate"
}
],
"title": "CVE-2018-7757"
},
{
"cve": "CVE-2018-8822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8822"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8822",
"url": "https://www.suse.com/security/cve/CVE-2018-8822"
},
{
"category": "external",
"summary": "SUSE Bug 1086162 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1086162"
},
{
"category": "external",
"summary": "SUSE Bug 1090404 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1090404"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-25T13:27:56Z",
"details": "moderate"
}
],
"title": "CVE-2018-8822"
}
]
}
SUSE-SU-2018:0068-1
Vulnerability from csaf_suse - Published: 2018-01-11 13:18 - Updated: 2018-01-11 13:18Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for microcode_ctl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nUpdate to Intel microcode version 20180108 (bsc#1075262 CVE-2017-5715)\n\n- The pre-released microcode fixing some important security issues\n is now officially published (and included in the added tarball).\n\nAmong other updates it contains:\n\n- IVT C0 (06-3e-04:ed) 428-\u003e42a\n- SKL-U/Y D0 (06-4e-03:c0) ba-\u003ec2\n- BDW-U/Y E/F (06-3d-04:c0) 25-\u003e28\n- HSW-ULT Cx/Dx (06-45-01:72) 20-\u003e21\n- Crystalwell Cx (06-46-01:32) 17-\u003e18\n- BDW-H E/G (06-47-01:22) 17-\u003e1b\n- HSX-EX E0 (06-3f-04:80) 0f-\u003e10\n- SKL-H/S R0 (06-5e-03:36) ba-\u003ec2\n- HSW Cx/Dx (06-3c-03:32) 22-\u003e23\n- HSX C0 (06-3f-02:6f) 3a-\u003e3b\n- BDX-DE V0/V1 (06-56-02:10) 0f-\u003e14\n- BDX-DE V2 (06-56-03:10) 700000d-\u003e7000011\n- KBL-U/Y H0 (06-8e-09:c0) 62-\u003e80\n- KBL Y0 / CFL D0 (06-8e-0a:c0) 70-\u003e80\n- KBL-H/S B0 (06-9e-09:2a) 5e-\u003e80\n- CFL U0 (06-9e-0a:22) 70-\u003e80\n- CFL B0 (06-9e-0b:02) 72-\u003e80\n- SKX H0 (06-55-04:b7) 2000035-\u003e200003c\n- GLK B0 (06-7a-01:01) 1e-\u003e22\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-microcode_ctl-13406,slessp3-microcode_ctl-13406,slessp4-microcode_ctl-13406",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0068-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0068-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180068-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0068-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003587.html"
},
{
"category": "self",
"summary": "SUSE Bug 1075262",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for microcode_ctl",
"tracking": {
"current_release_date": "2018-01-11T13:18:30Z",
"generator": {
"date": "2018-01-11T13:18:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0068-1",
"initial_release_date": "2018-01-11T13:18:30Z",
"revision_history": [
{
"date": "2018-01-11T13:18:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "microcode_ctl-1.17-102.83.9.1.i586",
"product": {
"name": "microcode_ctl-1.17-102.83.9.1.i586",
"product_id": "microcode_ctl-1.17-102.83.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "microcode_ctl-1.17-102.83.9.1.x86_64",
"product": {
"name": "microcode_ctl-1.17-102.83.9.1.x86_64",
"product_id": "microcode_ctl-1.17-102.83.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.9.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.9.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.9.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.9.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.9.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.9.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.9.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.9.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.9.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-11T13:18:30Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:0438-1
Vulnerability from csaf_suse - Published: 2018-02-14 09:58 - Updated: 2018-02-14 09:58Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via\n side effects of speculative execution, aka \u0027Spectre\u0027 and \u0027Meltdown\u0027 attacks\n (bsc#1074562, bsc#1068032)\n- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded\n recursion, stack consumption, and hypervisor crash) or possibly gain privileges\n via crafted page-table stacking (bsc#1061081)\n- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host\n OS crash) or gain host OS privileges in shadow mode by mapping a certain\n auxiliary page (bsc#1070158).\n- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS\n crash) or gain host OS privileges by leveraging an incorrect mask for\n reference-count overflow checking in shadow mode (bsc#1070159).\n- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS\n crash) or gain host OS privileges by leveraging incorrect error handling for\n reference counting in shadow mode (bsc#1070160).\n- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host\n OS crash) if shadow mode and log-dirty mode are in place, because of an\n incorrect assertion related to M2P (bsc#1070163).\n- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged\n users to cause a denial of service (out-of-bounds read and QEMU process crash)\n by leveraging improper memory address validation (bsc#1076116).\n- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest\n privileged users to cause a denial of service (out-of-bounds array access and\n QEMU process crash) via vectors related to negative pitch (bsc#1076180).\n\nThese non-security issues were fixed:\n\n- bsc#1067317: pass cache=writeback|unsafe|directsync to qemu depending on the\n libxl disk settings\n- bsc#1051729: Prevent invalid symlinks after install of SLES 12 SP2\n- bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100\n seconds. If many domUs shutdown in parallel the backends couldn\u0027t keep up \n- bsc#1027519: Added several upstream patches\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-CAASP-ALL-2018-302,SUSE-SLE-DESKTOP-12-SP3-2018-302,SUSE-SLE-SDK-12-SP3-2018-302,SUSE-SLE-SERVER-12-SP3-2018-302",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0438-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0438-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180438-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0438-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-February/003729.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1035442",
"url": "https://bugzilla.suse.com/1035442"
},
{
"category": "self",
"summary": "SUSE Bug 1051729",
"url": "https://bugzilla.suse.com/1051729"
},
{
"category": "self",
"summary": "SUSE Bug 1061081",
"url": "https://bugzilla.suse.com/1061081"
},
{
"category": "self",
"summary": "SUSE Bug 1067317",
"url": "https://bugzilla.suse.com/1067317"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1070158",
"url": "https://bugzilla.suse.com/1070158"
},
{
"category": "self",
"summary": "SUSE Bug 1070159",
"url": "https://bugzilla.suse.com/1070159"
},
{
"category": "self",
"summary": "SUSE Bug 1070160",
"url": "https://bugzilla.suse.com/1070160"
},
{
"category": "self",
"summary": "SUSE Bug 1070163",
"url": "https://bugzilla.suse.com/1070163"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1076116",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "self",
"summary": "SUSE Bug 1076180",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15595 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17563 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17563/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17564 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17565 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17566 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18030 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5683 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5683/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-02-14T09:58:26Z",
"generator": {
"date": "2018-02-14T09:58:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0438-1",
"initial_release_date": "2018-02-14T09:58:26Z",
"revision_history": [
{
"date": "2018-02-14T09:58:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.9.1_08-3.26.1.aarch64",
"product": {
"name": "xen-devel-4.9.1_08-3.26.1.aarch64",
"product_id": "xen-devel-4.9.1_08-3.26.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.9.1_08-3.26.1.x86_64",
"product": {
"name": "xen-4.9.1_08-3.26.1.x86_64",
"product_id": "xen-4.9.1_08-3.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.9.1_08-3.26.1.x86_64",
"product": {
"name": "xen-libs-4.9.1_08-3.26.1.x86_64",
"product_id": "xen-libs-4.9.1_08-3.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"product_id": "xen-libs-32bit-4.9.1_08-3.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.9.1_08-3.26.1.x86_64",
"product": {
"name": "xen-devel-4.9.1_08-3.26.1.x86_64",
"product_id": "xen-devel-4.9.1_08-3.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.9.1_08-3.26.1.x86_64",
"product": {
"name": "xen-doc-html-4.9.1_08-3.26.1.x86_64",
"product_id": "xen-doc-html-4.9.1_08-3.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.9.1_08-3.26.1.x86_64",
"product": {
"name": "xen-tools-4.9.1_08-3.26.1.x86_64",
"product_id": "xen-tools-4.9.1_08-3.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"product": {
"name": "xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"product_id": "xen-tools-domU-4.9.1_08-3.26.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-libs-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.9.1_08-3.26.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64"
},
"product_reference": "xen-devel-4.9.1_08-3.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-devel-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-doc-html-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-libs-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-tools-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-doc-html-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-libs-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-tools-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.9.1_08-3.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64"
},
"product_reference": "xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15595"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15595",
"url": "https://www.suse.com/security/cve/CVE-2017-15595"
},
{
"category": "external",
"summary": "SUSE Bug 1061081 for CVE-2017-15595",
"url": "https://bugzilla.suse.com/1061081"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-15595",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-14T09:58:26Z",
"details": "important"
}
],
"title": "CVE-2017-15595"
},
{
"cve": "CVE-2017-17563",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17563"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17563",
"url": "https://www.suse.com/security/cve/CVE-2017-17563"
},
{
"category": "external",
"summary": "SUSE Bug 1070159 for CVE-2017-17563",
"url": "https://bugzilla.suse.com/1070159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-14T09:58:26Z",
"details": "moderate"
}
],
"title": "CVE-2017-17563"
},
{
"cve": "CVE-2017-17564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17564"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17564",
"url": "https://www.suse.com/security/cve/CVE-2017-17564"
},
{
"category": "external",
"summary": "SUSE Bug 1070160 for CVE-2017-17564",
"url": "https://bugzilla.suse.com/1070160"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17564",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-14T09:58:26Z",
"details": "moderate"
}
],
"title": "CVE-2017-17564"
},
{
"cve": "CVE-2017-17565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17565"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) if shadow mode and log-dirty mode are in place, because of an incorrect assertion related to M2P.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17565",
"url": "https://www.suse.com/security/cve/CVE-2017-17565"
},
{
"category": "external",
"summary": "SUSE Bug 1070163 for CVE-2017-17565",
"url": "https://bugzilla.suse.com/1070163"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17565",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-14T09:58:26Z",
"details": "moderate"
}
],
"title": "CVE-2017-17565"
},
{
"cve": "CVE-2017-17566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17566"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) or gain host OS privileges in shadow mode by mapping a certain auxiliary page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17566",
"url": "https://www.suse.com/security/cve/CVE-2017-17566"
},
{
"category": "external",
"summary": "SUSE Bug 1070158 for CVE-2017-17566",
"url": "https://bugzilla.suse.com/1070158"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17566",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-14T09:58:26Z",
"details": "moderate"
}
],
"title": "CVE-2017-17566"
},
{
"cve": "CVE-2017-18030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18030"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18030",
"url": "https://www.suse.com/security/cve/CVE-2017-18030"
},
{
"category": "external",
"summary": "SUSE Bug 1076179 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076179"
},
{
"category": "external",
"summary": "SUSE Bug 1076180 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-14T09:58:26Z",
"details": "low"
}
],
"title": "CVE-2017-18030"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-14T09:58:26Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-14T09:58:26Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-14T09:58:26Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-5683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5683"
}
],
"notes": [
{
"category": "general",
"text": "The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5683",
"url": "https://www.suse.com/security/cve/CVE-2018-5683"
},
{
"category": "external",
"summary": "SUSE Bug 1076114 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076114"
},
{
"category": "external",
"summary": "SUSE Bug 1076116 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.1_08-3.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.1_08-3.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-14T09:58:26Z",
"details": "moderate"
}
],
"title": "CVE-2018-5683"
}
]
}
SUSE-SU-2018:0705-1
Vulnerability from csaf_suse - Published: 2018-03-16 12:43 - Updated: 2018-03-16 12:43Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for microcode_ctl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n \nThis update for ucode-intel fixes the following issues:\n\nThe Intel CPU microcode version was updated to version 20180312.\n\nThis update enables the IBPB+IBRS based mitigations of the Spectre v2 flaws (boo#1085207 CVE-2017-5715)\n\n- New Platforms\n\n - BDX-DE EGW A0 6-56-5:10 e000009\n - SKX B1 6-55-3:97 1000140\n\n- Updates\n\n - SNB D2 6-2a-7:12 29-\u003e2d\n - JKT C1 6-2d-6:6d 619-\u003e61c\n - JKT C2 6-2d-7:6d 710-\u003e713\n - IVB E2 6-3a-9:12 1c-\u003e1f\n - IVT C0 6-3e-4:ed 428-\u003e42c\n - IVT D1 6-3e-7:ed 70d-\u003e713\n - HSW Cx/Dx 6-3c-3:32 22-\u003e24\n - HSW-ULT Cx/Dx 6-45-1:72 20-\u003e23\n - CRW Cx 6-46-1:32 17-\u003e19\n - HSX C0 6-3f-2:6f 3a-\u003e3c\n - HSX-EX E0 6-3f-4:80 0f-\u003e11\n - BDW-U/Y E/F 6-3d-4:c0 25-\u003e2a\n - BDW-H E/G 6-47-1:22 17-\u003e1d\n - BDX-DE V0/V1 6-56-2:10 0f-\u003e15\n - BDW-DE V2 6-56-3:10 700000d-\u003e7000012\n - BDW-DE Y0 6-56-4:10 f00000a-\u003ef000011\n - SKL-U/Y D0 6-4e-3:c0 ba-\u003ec2\n - SKL R0 6-5e-3:36 ba-\u003ec2\n - KBL-U/Y H0 6-8e-9:c0 62-\u003e84\n - KBL B0 6-9e-9:2a 5e-\u003e84\n - CFL D0 6-8e-a:c0 70-\u003e84\n - CFL U0 6-9e-a:22 70-\u003e84\n - CFL B0 6-9e-b:02 72-\u003e84\n - SKX H0 6-55-4:b7 2000035-\u003e2000043\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-microcode_ctl-13514,slessp3-microcode_ctl-13514,slessp4-microcode_ctl-13514",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0705-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0705-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180705-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0705-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003818.html"
},
{
"category": "self",
"summary": "SUSE Bug 1085207",
"url": "https://bugzilla.suse.com/1085207"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for microcode_ctl",
"tracking": {
"current_release_date": "2018-03-16T12:43:32Z",
"generator": {
"date": "2018-03-16T12:43:32Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0705-1",
"initial_release_date": "2018-03-16T12:43:32Z",
"revision_history": [
{
"date": "2018-03-16T12:43:32Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "microcode_ctl-1.17-102.83.15.1.i586",
"product": {
"name": "microcode_ctl-1.17-102.83.15.1.i586",
"product_id": "microcode_ctl-1.17-102.83.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "microcode_ctl-1.17-102.83.15.1.x86_64",
"product": {
"name": "microcode_ctl-1.17-102.83.15.1.x86_64",
"product_id": "microcode_ctl-1.17-102.83.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.15.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.15.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.15.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.15.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.15.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.15.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.15.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.15.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.15.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.15.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.15.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.15.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.15.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.15.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.15.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.15.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.15.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-16T12:43:32Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:0909-1
Vulnerability from csaf_suse - Published: 2018-04-10 12:54 - Updated: 2018-04-10 12:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n \nThis update for xen fixes the following issues:\n\nUpdate to Xen 4.7.5 bug fix only release (bsc#1027519)\n\nSecurity issues fixed:\n\n- CVE-2018-7540: Fixed DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) (bsc#1080635)\n- CVE-2018-7541: A grant table v2 -\u003e v1 transition may crash Xen (XSA-255) (bsc#1080662)\n- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 Fixed information leaks via\n side effects of speculative execution (XSA-254). Includes Spectre v2\n mitigation. (bsc#1074562)\n\n\n- Preserve xen-syms from xen-dbg.gz to allow processing vmcores\n with crash(1) (bsc#1087251)\n- Xen HVM: Fixed unchecked MSR access error (bsc#1072834)\n- Add script, udev rule and systemd service to watch for vcpu\n online/offline events in a HVM domU They are triggered via xl vcpu-set\n domU N (fate#324965)\n- Make sure tools and tools-domU require libs from the very same build\n\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP2-2018-612,SUSE-SLE-SDK-12-SP2-2018-612,SUSE-SLE-SERVER-12-SP2-2018-612",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0909-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0909-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180909-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0909-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003883.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1072834",
"url": "https://bugzilla.suse.com/1072834"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1080635",
"url": "https://bugzilla.suse.com/1080635"
},
{
"category": "self",
"summary": "SUSE Bug 1080662",
"url": "https://bugzilla.suse.com/1080662"
},
{
"category": "self",
"summary": "SUSE Bug 1087251",
"url": "https://bugzilla.suse.com/1087251"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7540 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7540/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7541 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7541/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-04-10T12:54:19Z",
"generator": {
"date": "2018-04-10T12:54:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0909-1",
"initial_release_date": "2018-04-10T12:54:19Z",
"revision_history": [
{
"date": "2018-04-10T12:54:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.7.5_02-43.27.1.aarch64",
"product": {
"name": "xen-devel-4.7.5_02-43.27.1.aarch64",
"product_id": "xen-devel-4.7.5_02-43.27.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.7.5_02-43.27.1.x86_64",
"product": {
"name": "xen-4.7.5_02-43.27.1.x86_64",
"product_id": "xen-4.7.5_02-43.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.7.5_02-43.27.1.x86_64",
"product": {
"name": "xen-libs-4.7.5_02-43.27.1.x86_64",
"product_id": "xen-libs-4.7.5_02-43.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"product_id": "xen-libs-32bit-4.7.5_02-43.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.7.5_02-43.27.1.x86_64",
"product": {
"name": "xen-devel-4.7.5_02-43.27.1.x86_64",
"product_id": "xen-devel-4.7.5_02-43.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.7.5_02-43.27.1.x86_64",
"product": {
"name": "xen-doc-html-4.7.5_02-43.27.1.x86_64",
"product_id": "xen-doc-html-4.7.5_02-43.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.7.5_02-43.27.1.x86_64",
"product": {
"name": "xen-tools-4.7.5_02-43.27.1.x86_64",
"product_id": "xen-tools-4.7.5_02-43.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"product": {
"name": "xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"product_id": "xen-tools-domU-4.7.5_02-43.27.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-libs-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.7.5_02-43.27.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64"
},
"product_reference": "xen-devel-4.7.5_02-43.27.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-devel-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-libs-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-tools-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-libs-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-tools-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.5_02-43.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-10T12:54:19Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-10T12:54:19Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-10T12:54:19Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-7540",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7540"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7540",
"url": "https://www.suse.com/security/cve/CVE-2018-7540"
},
{
"category": "external",
"summary": "SUSE Bug 1080635 for CVE-2018-7540",
"url": "https://bugzilla.suse.com/1080635"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-7540",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-10T12:54:19Z",
"details": "moderate"
}
],
"title": "CVE-2018-7540"
},
{
"cve": "CVE-2018-7541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7541"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing guest OS users to cause a denial of service (hypervisor crash) or gain privileges by triggering a grant-table transition from v2 to v1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7541",
"url": "https://www.suse.com/security/cve/CVE-2018-7541"
},
{
"category": "external",
"summary": "SUSE Bug 1080662 for CVE-2018-7541",
"url": "https://bugzilla.suse.com/1080662"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-7541",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.27.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.5_02-43.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-10T12:54:19Z",
"details": "important"
}
],
"title": "CVE-2018-7541"
}
]
}
SUSE-SU-2018:1308-1
Vulnerability from csaf_suse - Published: 2018-05-16 13:59 - Updated: 2018-05-16 13:59Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kvm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n \nThis update for kvm fixes the following issues:\n\nThis update has the next round of Spectre v2 related patches,\nwhich now integrates with corresponding changes in libvirt. A\nJanuary 2018 release of qemu initially addressed the Spectre v2\nvulnerability for KVM guests by exposing the spec-ctrl feature\nfor all x86 vcpu types, which was the quick and dirty approach,\nbut not the proper solution. We remove that initial patch and now\nrely on patches from upstream. This update defines spec_ctrl and\nibpb cpu feature flags as well as new cpu models which are clones\nof existing models with either -IBRS or -IBPB added to the end of\nthe model name. These new vcpu models explicitly include the new\nfeature(s), whereas the feature flags can be added to the cpu\nparameter as with other features. In short, for continued Spectre\nv2 protection, ensure that either the appropriate cpu feature\nflag is added to the QEMU command-line, or one of the new cpu\nmodels is used. Although migration from older versions is\nsupported, the new cpu features won\u0027t be properly exposed to the\nguest until it is restarted with the cpu features explicitly\nadded. A reboot is insufficient.\n\nA warning patch is added which attempts to detect a migration\nfrom a qemu version which had the quick and dirty fix (it only\ndetects certain cases, but hopefully is helpful.)\n\nFor additional information on Spectre v2 as it relates to QEMU,\nsee:\n\thttps://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/\n\n(CVE-2017-5715 bsc#1068032)\n\nA patch is added to continue to detect Spectre v2 mitigation\nfeatures (as shown by cpuid), and if found provide that feature\nto guests, even if running on older KVM (kernel) versions which\ndo not yet expose that feature to QEMU. (bsc#1082276)\n\nAdditional security fixes:\n\n- CVE-2018-5683: An out-of-bounds read in vga_draw_text routine was fixed which could lead to crashes or information leakage. (bsc#1076114)\n- CVE-2018-7550: multiboot OOB access while loading kernel image was fixed that could lead to crashes (bsc#1083291)\n- CVE-2017-18030: An out-of-bounds access in cirrus_invalidate_region routine could lead to crashes or information leakage (bsc#1076179)\n\n- Eliminate bogus use of CPUID_7_0_EDX_PRED_CMD which we\u0027ve\n carried since the initial Spectre v2 patch was added. EDX bit\n 27 of CPUID Leaf 07H, Sub-leaf 0 provides status on STIBP, and\n not the PRED_CMD MSR. Exposing the STIBP CPUID feature bit to the\n guest is wrong in general, since the VM doesn\u0027t directly control\n the scheduling of physical hyperthreads. This is left strictly to\n the L0 hypervisor.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-kvm-13603,slessp3-kvm-13603",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1308-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1308-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181308-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1308-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1076114",
"url": "https://bugzilla.suse.com/1076114"
},
{
"category": "self",
"summary": "SUSE Bug 1076179",
"url": "https://bugzilla.suse.com/1076179"
},
{
"category": "self",
"summary": "SUSE Bug 1082276",
"url": "https://bugzilla.suse.com/1082276"
},
{
"category": "self",
"summary": "SUSE Bug 1083291",
"url": "https://bugzilla.suse.com/1083291"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18030 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5683 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5683/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7550 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7550/"
}
],
"title": "Security update for kvm",
"tracking": {
"current_release_date": "2018-05-16T13:59:32Z",
"generator": {
"date": "2018-05-16T13:59:32Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1308-1",
"initial_release_date": "2018-05-16T13:59:32Z",
"revision_history": [
{
"date": "2018-05-16T13:59:32Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-53.17.1.i586",
"product": {
"name": "kvm-1.4.2-53.17.1.i586",
"product_id": "kvm-1.4.2-53.17.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-53.17.1.s390x",
"product": {
"name": "kvm-1.4.2-53.17.1.s390x",
"product_id": "kvm-1.4.2-53.17.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-53.17.1.x86_64",
"product": {
"name": "kvm-1.4.2-53.17.1.x86_64",
"product_id": "kvm-1.4.2-53.17.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.17.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.17.1.i586"
},
"product_reference": "kvm-1.4.2-53.17.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.17.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.i586"
},
"product_reference": "kvm-1.4.2-53.17.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.17.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.s390x"
},
"product_reference": "kvm-1.4.2-53.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.17.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.x86_64"
},
"product_reference": "kvm-1.4.2-53.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.17.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.i586"
},
"product_reference": "kvm-1.4.2-53.17.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.17.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.s390x"
},
"product_reference": "kvm-1.4.2-53.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.17.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.x86_64"
},
"product_reference": "kvm-1.4.2-53.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-18030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18030"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18030",
"url": "https://www.suse.com/security/cve/CVE-2017-18030"
},
{
"category": "external",
"summary": "SUSE Bug 1076179 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076179"
},
{
"category": "external",
"summary": "SUSE Bug 1076180 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-16T13:59:32Z",
"details": "low"
}
],
"title": "CVE-2017-18030"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-16T13:59:32Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-5683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5683"
}
],
"notes": [
{
"category": "general",
"text": "The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5683",
"url": "https://www.suse.com/security/cve/CVE-2018-5683"
},
{
"category": "external",
"summary": "SUSE Bug 1076114 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076114"
},
{
"category": "external",
"summary": "SUSE Bug 1076116 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-16T13:59:32Z",
"details": "moderate"
}
],
"title": "CVE-2018-5683"
},
{
"cve": "CVE-2018-7550",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7550"
}
],
"notes": [
{
"category": "general",
"text": "The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7550",
"url": "https://www.suse.com/security/cve/CVE-2018-7550"
},
{
"category": "external",
"summary": "SUSE Bug 1083291 for CVE-2018-7550",
"url": "https://bugzilla.suse.com/1083291"
},
{
"category": "external",
"summary": "SUSE Bug 1083292 for CVE-2018-7550",
"url": "https://bugzilla.suse.com/1083292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.17.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-16T13:59:32Z",
"details": "important"
}
],
"title": "CVE-2018-7550"
}
]
}
SUSE-SU-2018:2631-1
Vulnerability from csaf_suse - Published: 2018-09-06 05:42 - Updated: 2018-09-06 05:42Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\nThis new feature was added:\n\n- bsc#1094325, bsc#1094725: libxl: Enable virsh blockresize for XEN guests\n\nThis security issue was fixed:\n\n- CVE-2017-5715: Additional fixes for the Spectre patches (bsc#1079869)\n\nThese non-security issues were fixed:\n\n- bsc#1100112: schema: allow any strings in smbios entry qemu: escape smbios entry strings \n- bsc#1091427: libxl: fix segfault in libxlReconnectDomain \n- bsc#959329: libxl: don\u0027t set hasManagedSave when performing save \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-7-2018-1843,SUSE-SLE-SAP-12-SP2-2018-1843,SUSE-SLE-SERVER-12-SP2-2018-1843,SUSE-Storage-4-2018-1843",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2631-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2631-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182631-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2631-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004535.html"
},
{
"category": "self",
"summary": "SUSE Bug 1079869",
"url": "https://bugzilla.suse.com/1079869"
},
{
"category": "self",
"summary": "SUSE Bug 1091427",
"url": "https://bugzilla.suse.com/1091427"
},
{
"category": "self",
"summary": "SUSE Bug 1094325",
"url": "https://bugzilla.suse.com/1094325"
},
{
"category": "self",
"summary": "SUSE Bug 1094725",
"url": "https://bugzilla.suse.com/1094725"
},
{
"category": "self",
"summary": "SUSE Bug 1100112",
"url": "https://bugzilla.suse.com/1100112"
},
{
"category": "self",
"summary": "SUSE Bug 959329",
"url": "https://bugzilla.suse.com/959329"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-09-06T05:42:53Z",
"generator": {
"date": "2018-09-06T05:42:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2631-1",
"initial_release_date": "2018-09-06T05:42:53Z",
"revision_history": [
{
"date": "2018-09-06T05:42:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-client-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-client-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-client-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-daemon-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-daemon-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-doc-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-doc-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-doc-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-nss-2.0.0-27.45.1.ppc64le",
"product": {
"name": "libvirt-nss-2.0.0-27.45.1.ppc64le",
"product_id": "libvirt-nss-2.0.0-27.45.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-2.0.0-27.45.1.s390x",
"product_id": "libvirt-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-client-2.0.0-27.45.1.s390x",
"product_id": "libvirt-client-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-daemon-2.0.0-27.45.1.s390x",
"product_id": "libvirt-daemon-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.s390x",
"product_id": "libvirt-daemon-config-network-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x",
"product_id": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x",
"product_id": "libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x",
"product_id": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.s390x",
"product_id": "libvirt-daemon-driver-network-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x",
"product_id": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x",
"product_id": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x",
"product_id": "libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x",
"product_id": "libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.s390x",
"product_id": "libvirt-daemon-hooks-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.s390x",
"product_id": "libvirt-daemon-lxc-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.s390x",
"product_id": "libvirt-daemon-qemu-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-doc-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-doc-2.0.0-27.45.1.s390x",
"product_id": "libvirt-doc-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.s390x",
"product_id": "libvirt-lock-sanlock-2.0.0-27.45.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-nss-2.0.0-27.45.1.s390x",
"product": {
"name": "libvirt-nss-2.0.0-27.45.1.s390x",
"product_id": "libvirt-nss-2.0.0-27.45.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-client-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-client-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-doc-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-doc-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-nss-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-nss-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-nss-2.0.0-27.45.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-client-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-client-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-xen-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-doc-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-doc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.45.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-nss-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.45.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-nss-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-client-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-client-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-doc-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-doc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-nss-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-nss-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-client-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-client-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-client-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-xen-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-doc-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-doc-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-doc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.45.1.ppc64le"
},
"product_reference": "libvirt-nss-2.0.0-27.45.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.45.1.s390x"
},
"product_reference": "libvirt-nss-2.0.0-27.45.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-nss-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-client-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-client-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-xen-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-doc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-doc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.45.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-nss-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-nss-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:libvirt-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-nss-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:libvirt-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-nss-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:libvirt-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-nss-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.45.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.45.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.45.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-09-06T05:42:53Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:0113-1
Vulnerability from csaf_suse - Published: 2018-01-16 14:43 - Updated: 2018-01-16 14:43Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThis update is only provided as a fix update for IBM Z platform.\n\n- CVE-2017-5753 / \u0027Spectre Attack\u0027: IBM Z fixes were included but not enabled in the previous update. This update enables those fixes.\n- CVE-2017-5715 / \u0027Spectre Attack\u0027: IBM Z fixes were already included in the previous update. A bugfix for the patches has been applied on top.\n- CVE-2017-5754: The IBM Z architecture is not affected by the \u0027Meltdown\u0027 attack.\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-HA-12-SP3-2018-80,SUSE-SLE-SDK-12-SP3-2018-80,SUSE-SLE-SERVER-12-SP3-2018-80",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0113-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0113-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180113-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0113-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003600.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-01-16T14:43:55Z",
"generator": {
"date": "2018-01-16T14:43:55Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0113-1",
"initial_release_date": "2018-01-16T14:43:55Z",
"revision_history": [
{
"date": "2018-01-16T14:43:55Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-docs-4.4.103-94.6.2.noarch",
"product": {
"name": "kernel-docs-4.4.103-94.6.2.noarch",
"product_id": "kernel-docs-4.4.103-94.6.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-devel-4.4.103-94.6.1.noarch",
"product": {
"name": "kernel-devel-4.4.103-94.6.1.noarch",
"product_id": "kernel-devel-4.4.103-94.6.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.103-94.6.1.noarch",
"product": {
"name": "kernel-macros-4.4.103-94.6.1.noarch",
"product_id": "kernel-macros-4.4.103-94.6.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.103-94.6.1.noarch",
"product": {
"name": "kernel-source-4.4.103-94.6.1.noarch",
"product_id": "kernel-source-4.4.103-94.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.103-94.6.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.103-94.6.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.103-94.6.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.103-94.6.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.103-94.6.1.s390x",
"product_id": "dlm-kmp-default-4.4.103-94.6.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.103-94.6.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.103-94.6.1.s390x",
"product_id": "gfs2-kmp-default-4.4.103-94.6.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.103-94.6.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.103-94.6.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.103-94.6.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.103-94.6.3.s390x",
"product": {
"name": "kernel-obs-build-4.4.103-94.6.3.s390x",
"product_id": "kernel-obs-build-4.4.103-94.6.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.103-94.6.1.s390x",
"product": {
"name": "kernel-default-4.4.103-94.6.1.s390x",
"product_id": "kernel-default-4.4.103-94.6.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.103-94.6.1.s390x",
"product": {
"name": "kernel-default-base-4.4.103-94.6.1.s390x",
"product_id": "kernel-default-base-4.4.103-94.6.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.103-94.6.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.103-94.6.1.s390x",
"product_id": "kernel-default-devel-4.4.103-94.6.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.103-94.6.1.s390x",
"product": {
"name": "kernel-default-man-4.4.103-94.6.1.s390x",
"product_id": "kernel-default-man-4.4.103-94.6.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.103-94.6.2.s390x",
"product": {
"name": "kernel-syms-4.4.103-94.6.2.s390x",
"product_id": "kernel-syms-4.4.103-94.6.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.103-94.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-94.6.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.103-94.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.103-94.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-94.6.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.103-94.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.103-94.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-94.6.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.103-94.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.103-94.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-94.6.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.103-94.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.4.103-94.6.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-94.6.2.noarch"
},
"product_reference": "kernel-docs-4.4.103-94.6.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.103-94.6.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-94.6.3.s390x"
},
"product_reference": "kernel-obs-build-4.4.103-94.6.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-94.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-94.6.1.s390x"
},
"product_reference": "kernel-default-4.4.103-94.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-94.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-94.6.1.s390x"
},
"product_reference": "kernel-default-base-4.4.103-94.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-94.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-94.6.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.103-94.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.103-94.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-94.6.1.s390x"
},
"product_reference": "kernel-default-man-4.4.103-94.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.103-94.6.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-94.6.1.noarch"
},
"product_reference": "kernel-devel-4.4.103-94.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.103-94.6.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-94.6.1.noarch"
},
"product_reference": "kernel-macros-4.4.103-94.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.103-94.6.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-94.6.1.noarch"
},
"product_reference": "kernel-source-4.4.103-94.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-94.6.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-94.6.2.s390x"
},
"product_reference": "kernel-syms-4.4.103-94.6.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-94.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-94.6.1.s390x"
},
"product_reference": "kernel-default-4.4.103-94.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-94.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-94.6.1.s390x"
},
"product_reference": "kernel-default-base-4.4.103-94.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-94.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-94.6.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.103-94.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.103-94.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-94.6.1.s390x"
},
"product_reference": "kernel-default-man-4.4.103-94.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.103-94.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-94.6.1.noarch"
},
"product_reference": "kernel-devel-4.4.103-94.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.103-94.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-94.6.1.noarch"
},
"product_reference": "kernel-macros-4.4.103-94.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.103-94.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-94.6.1.noarch"
},
"product_reference": "kernel-source-4.4.103-94.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-94.6.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-94.6.2.s390x"
},
"product_reference": "kernel-syms-4.4.103-94.6.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-94.6.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-94.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-94.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-94.6.3.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-94.6.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-94.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-94.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-94.6.3.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-94.6.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-94.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-94.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-94.6.3.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T14:43:55Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-94.6.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-94.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-94.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-94.6.3.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-94.6.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-94.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-94.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-94.6.3.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-94.6.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-94.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-94.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-94.6.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-94.6.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-94.6.3.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T14:43:55Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
}
]
}
SUSE-SU-2018:0115-1
Vulnerability from csaf_suse - Published: 2018-01-16 16:22 - Updated: 2018-01-16 16:22Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.\n\nThis update adds mitigations for various side channel attacks against\nmodern CPUs that could disclose content of otherwise unreadable memory\n(bnc#1068032).\n\n- CVE-2017-5753 / \u0027SpectreAttack\u0027: Local attackers on systems with modern\n CPUs featuring deep instruction pipelining could use attacker\n controllable speculative execution over code patterns in the Linux\n Kernel to leak content from otherwise not readable memory in the same\n address space, allowing retrieval of passwords, cryptographic keys\n and other secrets.\n\n This problem is mitigated by adding speculative fencing on affected\n code paths throughout the Linux kernel.\n\n This issue is addressed for the x86_64, the IBM Power and IBM zSeries\n architecture.\n\n- CVE-2017-5715 / \u0027SpectreAttack\u0027: Local attackers on systems with modern\n CPUs featuring branch prediction could use mispredicted branches to\n speculatively execute code patterns that in turn could be made to\n leak other non-readable content in the same address space, an attack\n similar to CVE-2017-5753.\n\n This problem is mitigated by disabling predictive branches, depending\n on CPU architecture either by firmware updates and/or fixes in the\n user-kernel privilege boundaries.\n\n This is done with help of Linux Kernel fixes on the Intel/AMD x86_64\n and IBM zSeries architectures. On x86_64, this requires also updates\n of the CPU microcode packages, delivered in seperate updates.\n\n For IBM Power and zSeries the required firmware updates are supplied\n over regular channels by IBM.\n\n As this feature can have a performance impact, it can be disabled\n using the \u0027nospec\u0027 kernel commandline option.\n\n- CVE-2017-5754 / \u0027MeltdownAttack\u0027: Local attackers on systems with\n modern CPUs featuring deep instruction pipelining could use code\n patterns in userspace to speculative executive code that would read\n otherwise read protected memory, an attack similar to CVE-2017-5753.\n\n This problem is mitigated by unmapping the Linux Kernel from the user\n address space during user code execution, following a approach called\n \u0027KAISER\u0027. The terms used here are \u0027KAISER\u0027 / \u0027Kernel Address Isolation\u0027\n and \u0027PTI\u0027 / \u0027Page Table Isolation\u0027.\n\n This update does this on the x86_64 architecture, it is not required\n on the IBM zSeries architecture.\n\n This feature can be enabled / disabled by the \u0027pti=[on|off|auto]\u0027 or\n \u0027nopti\u0027 commandline options.\n\nThe following security bugs were fixed:\n\n- CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel did not ensure that an l2cap socket is available, which allowed local users to gain privileges via a crafted application (bnc#1071470).\n- CVE-2017-13167: An elevation of privilege vulnerability in the kernel sound timer. (bnc#1072876).\n- CVE-2017-16538: drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel allowed local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner) (bnc#1066569).\n- CVE-2017-17558: The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel did not consider the maximum number of configurations and interfaces before attempting to release resources, which allowed local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device (bnc#1072561).\n- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695).\n- CVE-2017-17449: The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, did not restrict observations of Netlink messages to a single net namespace, which allowed local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system (bnc#1071694).\n- CVE-2017-17448: net/netfilter/nfnetlink_cthelper.c in the Linux kernel did not require the CAP_NET_ADMIN capability for new, get, and del operations, which allowed local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces (bnc#1071693).\n- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).\n- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).\n- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).\n- CVE-2017-16534: The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066693).\n\nThe following non-security bugs were fixed:\n\n- kvm: svm: Do not intercept new speculative control MSRs (bsc#1068032).\n- audit: Fix use after free in audit_remove_watch_rule() (bsc#1045205).\n- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).\n- carl9170: prevent speculative execution (bnc#1068032).\n- fs: prevent speculative execution (bnc#1068032).\n- kaiser: make kernel_stack user-mapped\n- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).\n- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).\n- p54: prevent speculative execution (bnc#1068032).\n- powerpc/barrier: add gmb.\n- powerpc: Convert cmp to cmpd in idle enter sequence (bsc#1070781).\n- powerpc/vdso64: Use double word compare on pointers (bsc#1070781). Conflicts: \tseries.conf\n- ptrace: Add a new thread access check (bsc#1068032).\n- s390: introduce CPU alternatives (bsc#1068032).\n- s390/spinlock: add gmb memory barrier.\n- s390/spinlock: add ppa to system call path.\n- uas: Only complain about missing sg if all other checks succeed (bsc#1071074).\n- udf: prevent speculative execution (bnc#1068032).\n- usb: uas: fix bug in handling of alternate settings (bsc#1071074).\n- uvcvideo: prevent speculative execution (bnc#1068032).\n- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).\n- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).\n- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).\n- x86/CPU: Check speculation control CPUID bit (bsc#1068032).\n- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).\n- x86/entry: Add a function to overwrite the RSB (bsc#1068032).\n- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).\n- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).\n- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).\n- x86/idle: Toggle IBRS when going idle (bsc#1068032).\n- x86/kaiser: Move feature detection up (bsc#1068032).\n- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).\n- x86/kvm: Flush IBP when switching VMs (bsc#1068032).\n- x86/kvm: Pad RSB on VM transition (bsc#1068032).\n- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).\n- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).\n- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).\n- x86/mm: Set IBPB upon context switch (bsc#1068032).\n- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).\n- x86/spec: Add IBRS control functions (bsc#1068032).\n- x86/spec: Add \u0027nospec\u0027 chicken bit (bsc#1068032).\n- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).\n- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).\n- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).\n- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).\n- x86/svm: Add code to clear registers on VM exit (bsc#1068032).\n- x86/svm: Clobber the RSB on VM exit (bsc#1068032).\n- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).\n- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Public-Cloud-12-2018-83,SUSE-SLE-SERVER-12-2018-83",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0115-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0115-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180115-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0115-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html"
},
{
"category": "self",
"summary": "SUSE Bug 1045205",
"url": "https://bugzilla.suse.com/1045205"
},
{
"category": "self",
"summary": "SUSE Bug 1050231",
"url": "https://bugzilla.suse.com/1050231"
},
{
"category": "self",
"summary": "SUSE Bug 1066569",
"url": "https://bugzilla.suse.com/1066569"
},
{
"category": "self",
"summary": "SUSE Bug 1066693",
"url": "https://bugzilla.suse.com/1066693"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068671",
"url": "https://bugzilla.suse.com/1068671"
},
{
"category": "self",
"summary": "SUSE Bug 1070771",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "self",
"summary": "SUSE Bug 1070781",
"url": "https://bugzilla.suse.com/1070781"
},
{
"category": "self",
"summary": "SUSE Bug 1071074",
"url": "https://bugzilla.suse.com/1071074"
},
{
"category": "self",
"summary": "SUSE Bug 1071470",
"url": "https://bugzilla.suse.com/1071470"
},
{
"category": "self",
"summary": "SUSE Bug 1071693",
"url": "https://bugzilla.suse.com/1071693"
},
{
"category": "self",
"summary": "SUSE Bug 1071694",
"url": "https://bugzilla.suse.com/1071694"
},
{
"category": "self",
"summary": "SUSE Bug 1071695",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "self",
"summary": "SUSE Bug 1072561",
"url": "https://bugzilla.suse.com/1072561"
},
{
"category": "self",
"summary": "SUSE Bug 1072876",
"url": "https://bugzilla.suse.com/1072876"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11600 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13167 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15115 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15868 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16534 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16534/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16538 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16538/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17448 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17449 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17558 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8824 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8824/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-01-16T16:22:02Z",
"generator": {
"date": "2018-01-16T16:22:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0115-1",
"initial_release_date": "2018-01-16T16:22:02Z",
"revision_history": [
{
"date": "2018-01-16T16:22:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.61-52.111.1.noarch",
"product": {
"name": "kernel-devel-3.12.61-52.111.1.noarch",
"product_id": "kernel-devel-3.12.61-52.111.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.61-52.111.1.noarch",
"product": {
"name": "kernel-macros-3.12.61-52.111.1.noarch",
"product_id": "kernel-macros-3.12.61-52.111.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.61-52.111.1.noarch",
"product": {
"name": "kernel-source-3.12.61-52.111.1.noarch",
"product_id": "kernel-source-3.12.61-52.111.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.111.1.ppc64le",
"product": {
"name": "kernel-default-3.12.61-52.111.1.ppc64le",
"product_id": "kernel-default-3.12.61-52.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.111.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.61-52.111.1.ppc64le",
"product_id": "kernel-default-base-3.12.61-52.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.111.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.61-52.111.1.ppc64le",
"product_id": "kernel-default-devel-3.12.61-52.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.111.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.61-52.111.1.ppc64le",
"product_id": "kernel-syms-3.12.61-52.111.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.111.1.s390x",
"product": {
"name": "kernel-default-3.12.61-52.111.1.s390x",
"product_id": "kernel-default-3.12.61-52.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.111.1.s390x",
"product": {
"name": "kernel-default-base-3.12.61-52.111.1.s390x",
"product_id": "kernel-default-base-3.12.61-52.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.111.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.61-52.111.1.s390x",
"product_id": "kernel-default-devel-3.12.61-52.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.61-52.111.1.s390x",
"product": {
"name": "kernel-default-man-3.12.61-52.111.1.s390x",
"product_id": "kernel-default-man-3.12.61-52.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.111.1.s390x",
"product": {
"name": "kernel-syms-3.12.61-52.111.1.s390x",
"product_id": "kernel-syms-3.12.61-52.111.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-ec2-3.12.61-52.111.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.61-52.111.1.x86_64",
"product_id": "kernel-ec2-3.12.61-52.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.61-52.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.61-52.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.111.1.x86_64",
"product": {
"name": "kernel-default-3.12.61-52.111.1.x86_64",
"product_id": "kernel-default-3.12.61-52.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.111.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.61-52.111.1.x86_64",
"product_id": "kernel-default-base-3.12.61-52.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.111.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.61-52.111.1.x86_64",
"product_id": "kernel-default-devel-3.12.61-52.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.111.1.x86_64",
"product": {
"name": "kernel-syms-3.12.61-52.111.1.x86_64",
"product_id": "kernel-syms-3.12.61-52.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.61-52.111.1.x86_64",
"product": {
"name": "kernel-xen-3.12.61-52.111.1.x86_64",
"product_id": "kernel-xen-3.12.61-52.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.61-52.111.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.61-52.111.1.x86_64",
"product_id": "kernel-xen-base-3.12.61-52.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.61-52.111.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.61-52.111.1.x86_64",
"product_id": "kernel-xen-devel-3.12.61-52.111.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.61-52.111.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.61-52.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.61-52.111.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.61-52.111.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.111.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le"
},
"product_reference": "kernel-default-3.12.61-52.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.111.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x"
},
"product_reference": "kernel-default-3.12.61-52.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.111.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64"
},
"product_reference": "kernel-default-3.12.61-52.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.111.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.61-52.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.111.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x"
},
"product_reference": "kernel-default-base-3.12.61-52.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.111.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.61-52.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.111.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.61-52.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.111.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.61-52.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.111.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.61-52.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.61-52.111.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x"
},
"product_reference": "kernel-default-man-3.12.61-52.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.61-52.111.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch"
},
"product_reference": "kernel-devel-3.12.61-52.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.61-52.111.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch"
},
"product_reference": "kernel-macros-3.12.61-52.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.61-52.111.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch"
},
"product_reference": "kernel-source-3.12.61-52.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.111.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.61-52.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.111.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x"
},
"product_reference": "kernel-syms-3.12.61-52.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.111.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64"
},
"product_reference": "kernel-syms-3.12.61-52.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.61-52.111.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64"
},
"product_reference": "kernel-xen-3.12.61-52.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.61-52.111.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.61-52.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.61-52.111.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.61-52.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-11600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11600"
}
],
"notes": [
{
"category": "general",
"text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11600",
"url": "https://www.suse.com/security/cve/CVE-2017-11600"
},
{
"category": "external",
"summary": "SUSE Bug 1050231 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1050231"
},
{
"category": "external",
"summary": "SUSE Bug 1096564 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1096564"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T16:22:02Z",
"details": "important"
}
],
"title": "CVE-2017-11600"
},
{
"cve": "CVE-2017-13167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13167"
}
],
"notes": [
{
"category": "general",
"text": "An elevation of privilege vulnerability in the kernel sound timer. Product: Android. Versions: Android kernel. Android ID A-37240993.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13167",
"url": "https://www.suse.com/security/cve/CVE-2017-13167"
},
{
"category": "external",
"summary": "SUSE Bug 1072876 for CVE-2017-13167",
"url": "https://bugzilla.suse.com/1072876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T16:22:02Z",
"details": "low"
}
],
"title": "CVE-2017-13167"
},
{
"cve": "CVE-2017-15115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15115"
}
],
"notes": [
{
"category": "general",
"text": "The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15115",
"url": "https://www.suse.com/security/cve/CVE-2017-15115"
},
{
"category": "external",
"summary": "SUSE Bug 1068671 for CVE-2017-15115",
"url": "https://bugzilla.suse.com/1068671"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15115",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T16:22:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-15115"
},
{
"cve": "CVE-2017-15868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15868"
}
],
"notes": [
{
"category": "general",
"text": "The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel before 3.19 does not ensure that an l2cap socket is available, which allows local users to gain privileges via a crafted application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15868",
"url": "https://www.suse.com/security/cve/CVE-2017-15868"
},
{
"category": "external",
"summary": "SUSE Bug 1071470 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1071470"
},
{
"category": "external",
"summary": "SUSE Bug 1071471 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1071471"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T16:22:02Z",
"details": "important"
}
],
"title": "CVE-2017-15868"
},
{
"cve": "CVE-2017-16534",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16534"
}
],
"notes": [
{
"category": "general",
"text": "The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16534",
"url": "https://www.suse.com/security/cve/CVE-2017-16534"
},
{
"category": "external",
"summary": "SUSE Bug 1066693 for CVE-2017-16534",
"url": "https://bugzilla.suse.com/1066693"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16534",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T16:22:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-16534"
},
{
"cve": "CVE-2017-16538",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16538"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16538",
"url": "https://www.suse.com/security/cve/CVE-2017-16538"
},
{
"category": "external",
"summary": "SUSE Bug 1066569 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1066569"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T16:22:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-16538"
},
{
"cve": "CVE-2017-17448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17448"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17448",
"url": "https://www.suse.com/security/cve/CVE-2017-17448"
},
{
"category": "external",
"summary": "SUSE Bug 1071693 for CVE-2017-17448",
"url": "https://bugzilla.suse.com/1071693"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T16:22:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-17448"
},
{
"cve": "CVE-2017-17449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17449"
}
],
"notes": [
{
"category": "general",
"text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17449",
"url": "https://www.suse.com/security/cve/CVE-2017-17449"
},
{
"category": "external",
"summary": "SUSE Bug 1071694 for CVE-2017-17449",
"url": "https://bugzilla.suse.com/1071694"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T16:22:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-17449"
},
{
"cve": "CVE-2017-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17450"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17450",
"url": "https://www.suse.com/security/cve/CVE-2017-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1071695 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "external",
"summary": "SUSE Bug 1074033 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1074033"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T16:22:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-17450"
},
{
"cve": "CVE-2017-17558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17558"
}
],
"notes": [
{
"category": "general",
"text": "The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17558",
"url": "https://www.suse.com/security/cve/CVE-2017-17558"
},
{
"category": "external",
"summary": "SUSE Bug 1072561 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1072561"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T16:22:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-17558"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T16:22:02Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T16:22:02Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T16:22:02Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-8824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8824"
}
],
"notes": [
{
"category": "general",
"text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8824",
"url": "https://www.suse.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "SUSE Bug 1070771 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "external",
"summary": "SUSE Bug 1076734 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1076734"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.111.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.111.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T16:22:02Z",
"details": "important"
}
],
"title": "CVE-2017-8824"
}
]
}
SUSE-SU-2018:0757-1
Vulnerability from csaf_suse - Published: 2018-03-21 09:26 - Updated: 2018-03-21 09:26Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for crash",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for crash fixes the following issues:\n\n- Exclude openSUSE from RT KMP build (bsc#1013843)\n\nThis update also rebuilds the crash kernel module packages with retpoline support to mitigate\nSpectre Variant 2. (bsc#1068032 CVE-2017-5715)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-RPI-12-SP2-2018-508,SUSE-SLE-RT-12-SP2-2018-508,SUSE-SLE-SDK-12-SP2-2018-508,SUSE-SLE-SERVER-12-SP2-2018-508",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0757-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0757-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180757-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0757-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003830.html"
},
{
"category": "self",
"summary": "SUSE Bug 1013843",
"url": "https://bugzilla.suse.com/1013843"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for crash",
"tracking": {
"current_release_date": "2018-03-21T09:26:38Z",
"generator": {
"date": "2018-03-21T09:26:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0757-1",
"initial_release_date": "2018-03-21T09:26:38Z",
"revision_history": [
{
"date": "2018-03-21T09:26:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "crash-7.1.5-15.3.45.aarch64",
"product": {
"name": "crash-7.1.5-15.3.45.aarch64",
"product_id": "crash-7.1.5-15.3.45.aarch64"
}
},
{
"category": "product_version",
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64",
"product": {
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64",
"product_id": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64"
}
},
{
"category": "product_version",
"name": "crash-devel-7.1.5-15.3.45.aarch64",
"product": {
"name": "crash-devel-7.1.5-15.3.45.aarch64",
"product_id": "crash-devel-7.1.5-15.3.45.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "crash-devel-7.1.5-15.3.45.ppc64le",
"product": {
"name": "crash-devel-7.1.5-15.3.45.ppc64le",
"product_id": "crash-devel-7.1.5-15.3.45.ppc64le"
}
},
{
"category": "product_version",
"name": "crash-7.1.5-15.3.45.ppc64le",
"product": {
"name": "crash-7.1.5-15.3.45.ppc64le",
"product_id": "crash-7.1.5-15.3.45.ppc64le"
}
},
{
"category": "product_version",
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le",
"product": {
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le",
"product_id": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "crash-devel-7.1.5-15.3.45.s390x",
"product": {
"name": "crash-devel-7.1.5-15.3.45.s390x",
"product_id": "crash-devel-7.1.5-15.3.45.s390x"
}
},
{
"category": "product_version",
"name": "crash-7.1.5-15.3.45.s390x",
"product": {
"name": "crash-7.1.5-15.3.45.s390x",
"product_id": "crash-7.1.5-15.3.45.s390x"
}
},
{
"category": "product_version",
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x",
"product": {
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x",
"product_id": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "crash-kmp-rt-7.1.5_k4.4.21_6-15.3.45.x86_64",
"product": {
"name": "crash-kmp-rt-7.1.5_k4.4.21_6-15.3.45.x86_64",
"product_id": "crash-kmp-rt-7.1.5_k4.4.21_6-15.3.45.x86_64"
}
},
{
"category": "product_version",
"name": "crash-devel-7.1.5-15.3.45.x86_64",
"product": {
"name": "crash-devel-7.1.5-15.3.45.x86_64",
"product_id": "crash-devel-7.1.5-15.3.45.x86_64"
}
},
{
"category": "product_version",
"name": "crash-7.1.5-15.3.45.x86_64",
"product": {
"name": "crash-7.1.5-15.3.45.x86_64",
"product_id": "crash-7.1.5-15.3.45.x86_64"
}
},
{
"category": "product_version",
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64",
"product": {
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64",
"product_id": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.5-15.3.45.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:crash-7.1.5-15.3.45.aarch64"
},
"product_reference": "crash-7.1.5-15.3.45.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64"
},
"product_reference": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-rt-7.1.5_k4.4.21_6-15.3.45.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
"product_id": "SUSE Linux Enterprise Real Time 12 SP2:crash-kmp-rt-7.1.5_k4.4.21_6-15.3.45.x86_64"
},
"product_reference": "crash-kmp-rt-7.1.5_k4.4.21_6-15.3.45.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-devel-7.1.5-15.3.45.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.aarch64"
},
"product_reference": "crash-devel-7.1.5-15.3.45.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-devel-7.1.5-15.3.45.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.ppc64le"
},
"product_reference": "crash-devel-7.1.5-15.3.45.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-devel-7.1.5-15.3.45.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.s390x"
},
"product_reference": "crash-devel-7.1.5-15.3.45.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-devel-7.1.5-15.3.45.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.x86_64"
},
"product_reference": "crash-devel-7.1.5-15.3.45.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.5-15.3.45.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.aarch64"
},
"product_reference": "crash-7.1.5-15.3.45.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.5-15.3.45.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.ppc64le"
},
"product_reference": "crash-7.1.5-15.3.45.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.5-15.3.45.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.s390x"
},
"product_reference": "crash-7.1.5-15.3.45.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.5-15.3.45.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.x86_64"
},
"product_reference": "crash-7.1.5-15.3.45.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64"
},
"product_reference": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le"
},
"product_reference": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x"
},
"product_reference": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64"
},
"product_reference": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.5-15.3.45.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.aarch64"
},
"product_reference": "crash-7.1.5-15.3.45.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.5-15.3.45.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.ppc64le"
},
"product_reference": "crash-7.1.5-15.3.45.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.5-15.3.45.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.s390x"
},
"product_reference": "crash-7.1.5-15.3.45.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-7.1.5-15.3.45.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.x86_64"
},
"product_reference": "crash-7.1.5-15.3.45.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64"
},
"product_reference": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le"
},
"product_reference": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x"
},
"product_reference": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64"
},
"product_reference": "crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP2:crash-kmp-rt-7.1.5_k4.4.21_6-15.3.45.x86_64",
"SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.aarch64",
"SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.s390x",
"SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.x86_64",
"SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64",
"SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x",
"SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:crash-7.1.5-15.3.45.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP2:crash-kmp-rt-7.1.5_k4.4.21_6-15.3.45.x86_64",
"SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.aarch64",
"SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.s390x",
"SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.x86_64",
"SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64",
"SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x",
"SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:crash-7.1.5-15.3.45.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP2:crash-kmp-rt-7.1.5_k4.4.21_6-15.3.45.x86_64",
"SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.aarch64",
"SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.s390x",
"SUSE Linux Enterprise Server 12 SP2:crash-7.1.5-15.3.45.x86_64",
"SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64",
"SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x",
"SUSE Linux Enterprise Server 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:crash-7.1.5-15.3.45.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-7.1.5-15.3.45.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:crash-devel-7.1.5-15.3.45.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-21T09:26:38Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:1465-1
Vulnerability from csaf_suse - Published: 2018-05-29 15:14 - Updated: 2018-05-29 15:14Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for HA kernel modules",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update provides rebuilds of HA kernel modules with retpoline\nsupport to mitigate Spectre Variant 2 (CVE-2017-5715 bsc#1068032)\n\nAlso fixed a problem in ocfs2:\n\n- backport patch to fix dlmglue false deadlock (bsc#962257)\n\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-HA-12-SP1-2018-1001",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1465-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1465-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181465-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1465-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004099.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 962257",
"url": "https://bugzilla.suse.com/962257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for HA kernel modules",
"tracking": {
"current_release_date": "2018-05-29T15:14:03Z",
"generator": {
"date": "2018-05-29T15:14:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1465-1",
"initial_release_date": "2018-05-29T15:14:03Z",
"revision_history": [
{
"date": "2018-05-29T15:14:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.ppc64le",
"product": {
"name": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.ppc64le",
"product_id": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.ppc64le",
"product_id": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "drbd-8.4.6-7.2.1.ppc64le",
"product": {
"name": "drbd-8.4.6-7.2.1.ppc64le",
"product_id": "drbd-8.4.6-7.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.ppc64le",
"product": {
"name": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.ppc64le",
"product_id": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.ppc64le",
"product_id": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.ppc64le",
"product_id": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.s390x",
"product": {
"name": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.s390x",
"product_id": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.s390x",
"product": {
"name": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.s390x",
"product_id": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-8.4.6-7.2.1.s390x",
"product": {
"name": "drbd-8.4.6-7.2.1.s390x",
"product_id": "drbd-8.4.6-7.2.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.s390x",
"product": {
"name": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.s390x",
"product_id": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.s390x",
"product": {
"name": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.s390x",
"product_id": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.s390x",
"product": {
"name": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.s390x",
"product_id": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.x86_64",
"product_id": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-xen-1.4_k3.12.74_60.64.93-27.2.1.x86_64",
"product": {
"name": "cluster-network-kmp-xen-1.4_k3.12.74_60.64.93-27.2.1.x86_64",
"product_id": "cluster-network-kmp-xen-1.4_k3.12.74_60.64.93-27.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64",
"product_id": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-xen-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64",
"product": {
"name": "dlm-kmp-xen-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64",
"product_id": "dlm-kmp-xen-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-8.4.6-7.2.1.x86_64",
"product": {
"name": "drbd-8.4.6-7.2.1.x86_64",
"product_id": "drbd-8.4.6-7.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64",
"product": {
"name": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64",
"product_id": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-xen-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64",
"product": {
"name": "drbd-kmp-xen-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64",
"product_id": "drbd-kmp-xen-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64",
"product": {
"name": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64",
"product_id": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-xen-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64",
"product": {
"name": "gfs2-kmp-xen-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64",
"product_id": "gfs2-kmp-xen-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64",
"product_id": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-xen-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64",
"product": {
"name": "ocfs2-kmp-xen-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64",
"product_id": "ocfs2-kmp-xen-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.ppc64le"
},
"product_reference": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.s390x"
},
"product_reference": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.x86_64"
},
"product_reference": "cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-xen-1.4_k3.12.74_60.64.93-27.2.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-xen-1.4_k3.12.74_60.64.93-27.2.1.x86_64"
},
"product_reference": "cluster-network-kmp-xen-1.4_k3.12.74_60.64.93-27.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.s390x"
},
"product_reference": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-xen-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-xen-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64"
},
"product_reference": "dlm-kmp-xen-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.6-7.2.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-8.4.6-7.2.1.ppc64le"
},
"product_reference": "drbd-8.4.6-7.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.6-7.2.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-8.4.6-7.2.1.s390x"
},
"product_reference": "drbd-8.4.6-7.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.6-7.2.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-8.4.6-7.2.1.x86_64"
},
"product_reference": "drbd-8.4.6-7.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.ppc64le"
},
"product_reference": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.s390x"
},
"product_reference": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64"
},
"product_reference": "drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-xen-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-xen-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64"
},
"product_reference": "drbd-kmp-xen-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.s390x"
},
"product_reference": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64"
},
"product_reference": "gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-xen-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-xen-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64"
},
"product_reference": "gfs2-kmp-xen-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.s390x"
},
"product_reference": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-xen-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-xen-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64"
},
"product_reference": "ocfs2-kmp-xen-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-xen-1.4_k3.12.74_60.64.93-27.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-xen-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-8.4.6-7.2.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-8.4.6-7.2.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-8.4.6-7.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-xen-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-xen-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-xen-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-xen-1.4_k3.12.74_60.64.93-27.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-xen-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-8.4.6-7.2.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-8.4.6-7.2.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-8.4.6-7.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-xen-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-xen-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-xen-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-default-1.4_k3.12.74_60.64.93-27.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:cluster-network-kmp-xen-1.4_k3.12.74_60.64.93-27.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-default-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:dlm-kmp-xen-4.0.2_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-8.4.6-7.2.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-8.4.6-7.2.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-8.4.6-7.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-default-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:drbd-kmp-xen-8.4.6_k3.12.74_60.64.93-7.2.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-default-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:gfs2-kmp-xen-3.1.6_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-default-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP1:ocfs2-kmp-xen-1.8.2_k3.12.74_60.64.93-35.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-29T15:14:03Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:1571-2
Vulnerability from csaf_suse - Published: 2018-10-18 12:46 - Updated: 2018-10-18 12:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-firmware",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-firmware fixes the following issues:\n\nThis security issue was fixed:\n\n- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker\n with local user access caused by speculative execution and indirect branch\n prediction (bsc#1095735)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-1090",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1571-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1571-2",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181571-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1571-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004688.html"
},
{
"category": "self",
"summary": "SUSE Bug 1095735",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for kernel-firmware",
"tracking": {
"current_release_date": "2018-10-18T12:46:25Z",
"generator": {
"date": "2018-10-18T12:46:25Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1571-2",
"initial_release_date": "2018-10-18T12:46:25Z",
"revision_history": [
{
"date": "2018-10-18T12:46:25Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-20170530-21.22.1.noarch",
"product": {
"name": "kernel-firmware-20170530-21.22.1.noarch",
"product_id": "kernel-firmware-20170530-21.22.1.noarch"
}
},
{
"category": "product_version",
"name": "ucode-amd-20170530-21.22.1.noarch",
"product": {
"name": "ucode-amd-20170530-21.22.1.noarch",
"product_id": "ucode-amd-20170530-21.22.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.22.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-firmware-20170530-21.22.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20170530-21.22.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-amd-20170530-21.22.1.noarch"
},
"product_reference": "ucode-amd-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-amd-20170530-21.22.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-amd-20170530-21.22.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-amd-20170530-21.22.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:46:25Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:1571-1
Vulnerability from csaf_suse - Published: 2018-06-07 11:44 - Updated: 2018-06-07 11:44Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-firmware",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-firmware fixes the following issues:\n\nThis security issue was fixed:\n\n- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker\n with local user access caused by speculative execution and indirect branch\n prediction (bsc#1095735)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-7-2018-1090,SUSE-SLE-DESKTOP-12-SP3-2018-1090,SUSE-SLE-SAP-12-SP2-2018-1090,SUSE-SLE-SERVER-12-SP2-2018-1090,SUSE-SLE-SERVER-12-SP3-2018-1090,SUSE-Storage-4-2018-1090",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1571-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1571-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181571-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1571-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004162.html"
},
{
"category": "self",
"summary": "SUSE Bug 1095735",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for kernel-firmware",
"tracking": {
"current_release_date": "2018-06-07T11:44:21Z",
"generator": {
"date": "2018-06-07T11:44:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1571-1",
"initial_release_date": "2018-06-07T11:44:21Z",
"revision_history": [
{
"date": "2018-06-07T11:44:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-20170530-21.22.1.noarch",
"product": {
"name": "kernel-firmware-20170530-21.22.1.noarch",
"product_id": "kernel-firmware-20170530-21.22.1.noarch"
}
},
{
"category": "product_version",
"name": "ucode-amd-20170530-21.22.1.noarch",
"product": {
"name": "ucode-amd-20170530-21.22.1.noarch",
"product_id": "ucode-amd-20170530-21.22.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.22.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-firmware-20170530-21.22.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20170530-21.22.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:ucode-amd-20170530-21.22.1.noarch"
},
"product_reference": "ucode-amd-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.22.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-firmware-20170530-21.22.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20170530-21.22.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:ucode-amd-20170530-21.22.1.noarch"
},
"product_reference": "ucode-amd-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-firmware-20170530-21.22.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20170530-21.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-amd-20170530-21.22.1.noarch"
},
"product_reference": "ucode-amd-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.22.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-firmware-20170530-21.22.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20170530-21.22.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-amd-20170530-21.22.1.noarch"
},
"product_reference": "ucode-amd-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.22.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-firmware-20170530-21.22.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20170530-21.22.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:ucode-amd-20170530-21.22.1.noarch"
},
"product_reference": "ucode-amd-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-firmware-20170530-21.22.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20170530-21.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-amd-20170530-21.22.1.noarch"
},
"product_reference": "ucode-amd-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20170530-21.22.1.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-firmware-20170530-21.22.1.noarch"
},
"product_reference": "kernel-firmware-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20170530-21.22.1.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:ucode-amd-20170530-21.22.1.noarch"
},
"product_reference": "ucode-amd-20170530-21.22.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Enterprise Storage 4:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-amd-20170530-21.22.1.noarch",
"SUSE OpenStack Cloud 7:kernel-firmware-20170530-21.22.1.noarch",
"SUSE OpenStack Cloud 7:ucode-amd-20170530-21.22.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Enterprise Storage 4:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-amd-20170530-21.22.1.noarch",
"SUSE OpenStack Cloud 7:kernel-firmware-20170530-21.22.1.noarch",
"SUSE OpenStack Cloud 7:ucode-amd-20170530-21.22.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Enterprise Storage 4:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-amd-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-firmware-20170530-21.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-amd-20170530-21.22.1.noarch",
"SUSE OpenStack Cloud 7:kernel-firmware-20170530-21.22.1.noarch",
"SUSE OpenStack Cloud 7:ucode-amd-20170530-21.22.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-07T11:44:21Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:1363-1
Vulnerability from csaf_suse - Published: 2018-05-22 08:44 - Updated: 2018-05-22 08:44Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes several issues.\n\nThis security issue was fixed:\n\n- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).\n\n Systems with microprocessors utilizing speculative execution and speculative\n execution of memory reads before the addresses of all prior memory writes are\n known may allow unauthorized disclosure of information to an attacker with\n local user access via a side-channel analysis.\n\n This patch permits the new x86 cpu feature flag named \u0027ssbd\u0027 to be\n presented to the guest, given that the host has this feature, and\n KVM exposes it to the guest as well.\n\n For this feature to be enabled please use the qemu commandline\n -cpu $MODEL,+spec-ctrl,+ssbd\n so the guest OS can take advantage of the feature.\n\n spec-ctrl and ssbd support is also required in the host.\n- CVE-2017-5715: This update has the next round of Spectre v2 related patches,\n which now integrates with corresponding changes in libvirt. A January 2018\n release of qemu initially addressed the Spectre v2 vulnerability for KVM guests\n by exposing the spec-ctrl feature for all x86 vcpu types. We remove that\n initial patch and now rely on patches from upstream (bsc#1068032).\n\n This update defines spec_ctrl and ibpb cpu feature flags as well as new cpu\n models which are clones of existing models with either -IBRS or -IBPB added to\n the end of the model name. These new vcpu models explicitly include the new\n feature(s), whereas the feature flags can be added to the cpu parameter as with\n other features. In short, for continued Spectre v2 protection, ensure that\n either the appropriate cpu feature flag is added to the QEMU command-line, or\n one of the new cpu models is used. Although migration from older versions is\n supported, the new cpu features won\u0027t be properly exposed to the guest until it\n is restarted with the cpu features explicitly added. A reboot is insufficient.\n- A patch is added to continue to detect Spectre v2 mitigation features (as\n shown by cpuid), and if found provide that feature to guests, even if running\n on older KVM (kernel) versions which do not yet expose that feature to QEMU.\n (bsc#1082276)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-SP1-2018-950,SUSE-SLE-SERVER-12-SP1-2018-950",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1363-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1363-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181363-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1363-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004067.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1082276",
"url": "https://bugzilla.suse.com/1082276"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-05-22T08:44:39Z",
"generator": {
"date": "2018-05-22T08:44:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1363-1",
"initial_release_date": "2018-05-22T08:44:39Z",
"revision_history": [
{
"date": "2018-05-22T08:44:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-33.9.4.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-33.9.4.noarch",
"product_id": "qemu-ipxe-1.0.0-33.9.4.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.8.1-33.9.4.noarch",
"product": {
"name": "qemu-seabios-1.8.1-33.9.4.noarch",
"product_id": "qemu-seabios-1.8.1-33.9.4.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-33.9.4.noarch",
"product": {
"name": "qemu-sgabios-8-33.9.4.noarch",
"product_id": "qemu-sgabios-8-33.9.4.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.8.1-33.9.4.noarch",
"product": {
"name": "qemu-vgabios-1.8.1-33.9.4.noarch",
"product_id": "qemu-vgabios-1.8.1-33.9.4.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-33.9.4.ppc64le",
"product": {
"name": "qemu-2.3.1-33.9.4.ppc64le",
"product_id": "qemu-2.3.1-33.9.4.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-33.9.4.ppc64le",
"product": {
"name": "qemu-block-curl-2.3.1-33.9.4.ppc64le",
"product_id": "qemu-block-curl-2.3.1-33.9.4.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"product": {
"name": "qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"product_id": "qemu-guest-agent-2.3.1-33.9.4.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-33.9.4.ppc64le",
"product": {
"name": "qemu-lang-2.3.1-33.9.4.ppc64le",
"product_id": "qemu-lang-2.3.1-33.9.4.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.3.1-33.9.4.ppc64le",
"product": {
"name": "qemu-ppc-2.3.1-33.9.4.ppc64le",
"product_id": "qemu-ppc-2.3.1-33.9.4.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-33.9.4.ppc64le",
"product": {
"name": "qemu-tools-2.3.1-33.9.4.ppc64le",
"product_id": "qemu-tools-2.3.1-33.9.4.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-33.9.4.s390x",
"product": {
"name": "qemu-2.3.1-33.9.4.s390x",
"product_id": "qemu-2.3.1-33.9.4.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-33.9.4.s390x",
"product": {
"name": "qemu-block-curl-2.3.1-33.9.4.s390x",
"product_id": "qemu-block-curl-2.3.1-33.9.4.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-33.9.4.s390x",
"product": {
"name": "qemu-guest-agent-2.3.1-33.9.4.s390x",
"product_id": "qemu-guest-agent-2.3.1-33.9.4.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.3.1-33.9.4.s390x",
"product": {
"name": "qemu-kvm-2.3.1-33.9.4.s390x",
"product_id": "qemu-kvm-2.3.1-33.9.4.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-33.9.4.s390x",
"product": {
"name": "qemu-lang-2.3.1-33.9.4.s390x",
"product_id": "qemu-lang-2.3.1-33.9.4.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.3.1-33.9.4.s390x",
"product": {
"name": "qemu-s390-2.3.1-33.9.4.s390x",
"product_id": "qemu-s390-2.3.1-33.9.4.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-33.9.4.s390x",
"product": {
"name": "qemu-tools-2.3.1-33.9.4.s390x",
"product_id": "qemu-tools-2.3.1-33.9.4.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-2.3.1-33.9.4.x86_64",
"product_id": "qemu-2.3.1-33.9.4.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-block-curl-2.3.1-33.9.4.x86_64",
"product_id": "qemu-block-curl-2.3.1-33.9.4.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-block-rbd-2.3.1-33.9.4.x86_64",
"product_id": "qemu-block-rbd-2.3.1-33.9.4.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-guest-agent-2.3.1-33.9.4.x86_64",
"product_id": "qemu-guest-agent-2.3.1-33.9.4.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-kvm-2.3.1-33.9.4.x86_64",
"product_id": "qemu-kvm-2.3.1-33.9.4.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-lang-2.3.1-33.9.4.x86_64",
"product_id": "qemu-lang-2.3.1-33.9.4.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-tools-2.3.1-33.9.4.x86_64",
"product_id": "qemu-tools-2.3.1-33.9.4.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-x86-2.3.1-33.9.4.x86_64",
"product_id": "qemu-x86-2.3.1-33.9.4.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-block-curl-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-block-curl-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-block-rbd-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-guest-agent-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-33.9.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.9.4.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-kvm-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-lang-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-lang-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-ppc-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.8.1-33.9.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.9.4.noarch"
},
"product_reference": "qemu-seabios-1.8.1-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-33.9.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.9.4.noarch"
},
"product_reference": "qemu-sgabios-8-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-tools-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-tools-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.8.1-33.9.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.9.4.noarch"
},
"product_reference": "qemu-vgabios-1.8.1-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-x86-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.9.4.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.s390x"
},
"product_reference": "qemu-2.3.1-33.9.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-block-curl-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.9.4.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.s390x"
},
"product_reference": "qemu-block-curl-2.3.1-33.9.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-block-curl-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-block-rbd-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.9.4.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.s390x"
},
"product_reference": "qemu-guest-agent-2.3.1-33.9.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-guest-agent-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-33.9.4.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.9.4.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-33.9.4.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.s390x"
},
"product_reference": "qemu-kvm-2.3.1-33.9.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-kvm-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-lang-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.9.4.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.s390x"
},
"product_reference": "qemu-lang-2.3.1-33.9.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-lang-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-ppc-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.3.1-33.9.4.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.9.4.s390x"
},
"product_reference": "qemu-s390-2.3.1-33.9.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.8.1-33.9.4.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.9.4.noarch"
},
"product_reference": "qemu-seabios-1.8.1-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-33.9.4.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.9.4.noarch"
},
"product_reference": "qemu-sgabios-8-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-tools-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.9.4.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.s390x"
},
"product_reference": "qemu-tools-2.3.1-33.9.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-tools-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.8.1-33.9.4.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.9.4.noarch"
},
"product_reference": "qemu-vgabios-1.8.1-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-x86-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.9.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.9.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.9.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T08:44:39Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.9.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.9.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.9.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T08:44:39Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:0920-1
Vulnerability from csaf_suse - Published: 2018-04-11 06:37 - Updated: 2018-04-11 06:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt and virt-manager fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2017-5715: Fixes for speculative side channel attacks aka \u0027SpectreAttack\u0027 (var2) (bsc#1079869).\n- CVE-2018-6764: Fixed guest executable code injection via libnss_dns.so loaded by libvirt_lxc before init (bsc#1080042).\n- CVE-2018-1064: Fixed denial of service when reading from guest agent (bsc#1083625).\n\n\nNon-security issues fixed in libvirt:\n\n- bsc#1070615: Fixed TPM device passthrough failure on kernels \u003e= 4.0.\n- bsc#1082041: SUSE Linux Enterprise 11 SP4 hvm converted to pvhvm. Unless vm memory is on gig boundary, vm won\u0027t boot.\n- bsc#1082161: Unable to change RTC basis or adjustment for Xen HVM guests using libvirt.\n\nNon-security issues fixed in virt-manager:\n\n- bsc#1086038: VM guests cannot be properly installed with virt-install\n- bsc#1067018: KVM Guest creation failed - Property .cmt not found\n- bsc#1054986: Fix openSUSE 15.0 detection. It has no content file or .treeinfo file\n- bsc#1085757: Fallback to latest version of openSUSE when opensuse-unknown is detected for the ISO\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP3-2018-618,SUSE-SLE-SDK-12-SP3-2018-618,SUSE-SLE-SERVER-12-SP3-2018-618",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0920-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0920-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180920-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0920-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003885.html"
},
{
"category": "self",
"summary": "SUSE Bug 1054986",
"url": "https://bugzilla.suse.com/1054986"
},
{
"category": "self",
"summary": "SUSE Bug 1067018",
"url": "https://bugzilla.suse.com/1067018"
},
{
"category": "self",
"summary": "SUSE Bug 1070615",
"url": "https://bugzilla.suse.com/1070615"
},
{
"category": "self",
"summary": "SUSE Bug 1079869",
"url": "https://bugzilla.suse.com/1079869"
},
{
"category": "self",
"summary": "SUSE Bug 1080042",
"url": "https://bugzilla.suse.com/1080042"
},
{
"category": "self",
"summary": "SUSE Bug 1082041",
"url": "https://bugzilla.suse.com/1082041"
},
{
"category": "self",
"summary": "SUSE Bug 1082161",
"url": "https://bugzilla.suse.com/1082161"
},
{
"category": "self",
"summary": "SUSE Bug 1083625",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "self",
"summary": "SUSE Bug 1085757",
"url": "https://bugzilla.suse.com/1085757"
},
{
"category": "self",
"summary": "SUSE Bug 1086038",
"url": "https://bugzilla.suse.com/1086038"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1064 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6764 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6764/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-04-11T06:37:46Z",
"generator": {
"date": "2018-04-11T06:37:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0920-1",
"initial_release_date": "2018-04-11T06:37:46Z",
"revision_history": [
{
"date": "2018-04-11T06:37:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-devel-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-devel-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-admin-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-admin-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-admin-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-client-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-client-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-client-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-config-network-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-lxc-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-daemon-qemu-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-doc-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-doc-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-libs-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-libs-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-libs-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-lock-sanlock-3.3.0-5.19.2.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-nss-3.3.0-5.19.2.aarch64",
"product": {
"name": "libvirt-nss-3.3.0-5.19.2.aarch64",
"product_id": "libvirt-nss-3.3.0-5.19.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "virt-install-1.4.1-5.8.1.noarch",
"product": {
"name": "virt-install-1.4.1-5.8.1.noarch",
"product_id": "virt-install-1.4.1-5.8.1.noarch"
}
},
{
"category": "product_version",
"name": "virt-manager-1.4.1-5.8.1.noarch",
"product": {
"name": "virt-manager-1.4.1-5.8.1.noarch",
"product_id": "virt-manager-1.4.1-5.8.1.noarch"
}
},
{
"category": "product_version",
"name": "virt-manager-common-1.4.1-5.8.1.noarch",
"product": {
"name": "virt-manager-common-1.4.1-5.8.1.noarch",
"product_id": "virt-manager-common-1.4.1-5.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-devel-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-devel-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-admin-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-admin-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-admin-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-client-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-client-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-client-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-doc-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-doc-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-doc-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-libs-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-libs-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-libs-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-nss-3.3.0-5.19.2.ppc64le",
"product": {
"name": "libvirt-nss-3.3.0-5.19.2.ppc64le",
"product_id": "libvirt-nss-3.3.0-5.19.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-devel-3.3.0-5.19.2.s390x",
"product_id": "libvirt-devel-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-3.3.0-5.19.2.s390x",
"product_id": "libvirt-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-admin-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-admin-3.3.0-5.19.2.s390x",
"product_id": "libvirt-admin-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-client-3.3.0-5.19.2.s390x",
"product_id": "libvirt-client-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-config-network-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-driver-network-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-lxc-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"product_id": "libvirt-daemon-qemu-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-doc-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-doc-3.3.0-5.19.2.s390x",
"product_id": "libvirt-doc-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-libs-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-libs-3.3.0-5.19.2.s390x",
"product_id": "libvirt-libs-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"product_id": "libvirt-lock-sanlock-3.3.0-5.19.2.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-nss-3.3.0-5.19.2.s390x",
"product": {
"name": "libvirt-nss-3.3.0-5.19.2.s390x",
"product_id": "libvirt-nss-3.3.0-5.19.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-admin-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-admin-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-admin-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-client-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-client-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-config-network-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-lxc-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-qemu-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-xen-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-doc-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-doc-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-libs-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-libs-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-libs-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-devel-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-devel-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-devel-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-daemon-hooks-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-lock-sanlock-3.3.0-5.19.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-nss-3.3.0-5.19.2.x86_64",
"product": {
"name": "libvirt-nss-3.3.0-5.19.2.x86_64",
"product_id": "libvirt-nss-3.3.0-5.19.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-admin-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-client-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-doc-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-libs-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virt-install-1.4.1-5.8.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:virt-install-1.4.1-5.8.1.noarch"
},
"product_reference": "virt-install-1.4.1-5.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virt-manager-1.4.1-5.8.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:virt-manager-1.4.1-5.8.1.noarch"
},
"product_reference": "virt-manager-1.4.1-5.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virt-manager-common-1.4.1-5.8.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch"
},
"product_reference": "virt-manager-common-1.4.1-5.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-devel-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-devel-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-devel-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-devel-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-admin-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-admin-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-admin-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-admin-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-client-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-client-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-client-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-client-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-doc-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-doc-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-doc-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-doc-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-libs-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-libs-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-libs-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-libs-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-nss-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-nss-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-nss-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-nss-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virt-install-1.4.1-5.8.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:virt-install-1.4.1-5.8.1.noarch"
},
"product_reference": "virt-install-1.4.1-5.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virt-manager-1.4.1-5.8.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:virt-manager-1.4.1-5.8.1.noarch"
},
"product_reference": "virt-manager-1.4.1-5.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virt-manager-common-1.4.1-5.8.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch"
},
"product_reference": "virt-manager-common-1.4.1-5.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-admin-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-admin-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-admin-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-admin-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-client-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-client-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-client-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-client-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-doc-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-doc-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-doc-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-doc-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-libs-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-libs-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-libs-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-libs-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.19.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64"
},
"product_reference": "libvirt-nss-3.3.0-5.19.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le"
},
"product_reference": "libvirt-nss-3.3.0-5.19.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.19.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x"
},
"product_reference": "libvirt-nss-3.3.0-5.19.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64"
},
"product_reference": "libvirt-nss-3.3.0-5.19.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virt-install-1.4.1-5.8.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-install-1.4.1-5.8.1.noarch"
},
"product_reference": "virt-install-1.4.1-5.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virt-manager-1.4.1-5.8.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-1.4.1-5.8.1.noarch"
},
"product_reference": "virt-manager-1.4.1-5.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virt-manager-common-1.4.1-5.8.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch"
},
"product_reference": "virt-manager-common-1.4.1-5.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-11T06:37:46Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1064"
}
],
"notes": [
{
"category": "general",
"text": "libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1064",
"url": "https://www.suse.com/security/cve/CVE-2018-1064"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1088147"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-11T06:37:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-1064"
},
{
"cve": "CVE-2018-6764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6764"
}
],
"notes": [
{
"category": "general",
"text": "util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which allows local guest OS users to bypass an intended container protection mechanism and execute arbitrary commands via a crafted NSS module.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6764",
"url": "https://www.suse.com/security/cve/CVE-2018-6764"
},
{
"category": "external",
"summary": "SUSE Bug 1080042 for CVE-2018-6764",
"url": "https://bugzilla.suse.com/1080042"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2018-6764",
"url": "https://bugzilla.suse.com/1088147"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-xen-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.19.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-install-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:virt-manager-common-1.4.1-5.8.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.19.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-11T06:37:46Z",
"details": "low"
}
],
"title": "CVE-2018-6764"
}
]
}
SUSE-SU-2018:0036-1
Vulnerability from csaf_suse - Published: 2018-01-08 11:05 - Updated: 2018-01-08 11:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes the following issues:\n\nThis update for qemu fixes the following issues:\n\nA mitigation for a security flaw has been applied:\n\n- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from \n the host VM to the CPU, to allow enabling/disabling branch prediction features in the\n Intel CPU. (bsc#1068032)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP2-2018-27,SUSE-SLE-RPI-12-SP2-2018-27,SUSE-SLE-SERVER-12-SP2-2018-27",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0036-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0036-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180036-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0036-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003574.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-01-08T11:05:36Z",
"generator": {
"date": "2018-01-08T11:05:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0036-1",
"initial_release_date": "2018-01-08T11:05:36Z",
"revision_history": [
{
"date": "2018-01-08T11:05:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.31.1.aarch64",
"product": {
"name": "qemu-2.6.2-41.31.1.aarch64",
"product_id": "qemu-2.6.2-41.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.6.2-41.31.1.aarch64",
"product": {
"name": "qemu-arm-2.6.2-41.31.1.aarch64",
"product_id": "qemu-arm-2.6.2-41.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.31.1.aarch64",
"product": {
"name": "qemu-block-curl-2.6.2-41.31.1.aarch64",
"product_id": "qemu-block-curl-2.6.2-41.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.6.2-41.31.1.aarch64",
"product": {
"name": "qemu-block-rbd-2.6.2-41.31.1.aarch64",
"product_id": "qemu-block-rbd-2.6.2-41.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.31.1.aarch64",
"product": {
"name": "qemu-block-ssh-2.6.2-41.31.1.aarch64",
"product_id": "qemu-block-ssh-2.6.2-41.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.31.1.aarch64",
"product": {
"name": "qemu-guest-agent-2.6.2-41.31.1.aarch64",
"product_id": "qemu-guest-agent-2.6.2-41.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.31.1.aarch64",
"product": {
"name": "qemu-lang-2.6.2-41.31.1.aarch64",
"product_id": "qemu-lang-2.6.2-41.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.31.1.aarch64",
"product": {
"name": "qemu-tools-2.6.2-41.31.1.aarch64",
"product_id": "qemu-tools-2.6.2-41.31.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-41.31.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-41.31.1.noarch",
"product_id": "qemu-ipxe-1.0.0-41.31.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.9.1-41.31.1.noarch",
"product": {
"name": "qemu-seabios-1.9.1-41.31.1.noarch",
"product_id": "qemu-seabios-1.9.1-41.31.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-41.31.1.noarch",
"product": {
"name": "qemu-sgabios-8-41.31.1.noarch",
"product_id": "qemu-sgabios-8-41.31.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.9.1-41.31.1.noarch",
"product": {
"name": "qemu-vgabios-1.9.1-41.31.1.noarch",
"product_id": "qemu-vgabios-1.9.1-41.31.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.31.1.ppc64le",
"product": {
"name": "qemu-2.6.2-41.31.1.ppc64le",
"product_id": "qemu-2.6.2-41.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.31.1.ppc64le",
"product": {
"name": "qemu-block-curl-2.6.2-41.31.1.ppc64le",
"product_id": "qemu-block-curl-2.6.2-41.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.31.1.ppc64le",
"product": {
"name": "qemu-block-ssh-2.6.2-41.31.1.ppc64le",
"product_id": "qemu-block-ssh-2.6.2-41.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.31.1.ppc64le",
"product": {
"name": "qemu-guest-agent-2.6.2-41.31.1.ppc64le",
"product_id": "qemu-guest-agent-2.6.2-41.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.31.1.ppc64le",
"product": {
"name": "qemu-lang-2.6.2-41.31.1.ppc64le",
"product_id": "qemu-lang-2.6.2-41.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.6.2-41.31.1.ppc64le",
"product": {
"name": "qemu-ppc-2.6.2-41.31.1.ppc64le",
"product_id": "qemu-ppc-2.6.2-41.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.31.1.ppc64le",
"product": {
"name": "qemu-tools-2.6.2-41.31.1.ppc64le",
"product_id": "qemu-tools-2.6.2-41.31.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.31.1.s390x",
"product": {
"name": "qemu-2.6.2-41.31.1.s390x",
"product_id": "qemu-2.6.2-41.31.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.31.1.s390x",
"product": {
"name": "qemu-block-curl-2.6.2-41.31.1.s390x",
"product_id": "qemu-block-curl-2.6.2-41.31.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.31.1.s390x",
"product": {
"name": "qemu-block-ssh-2.6.2-41.31.1.s390x",
"product_id": "qemu-block-ssh-2.6.2-41.31.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.31.1.s390x",
"product": {
"name": "qemu-guest-agent-2.6.2-41.31.1.s390x",
"product_id": "qemu-guest-agent-2.6.2-41.31.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.6.2-41.31.1.s390x",
"product": {
"name": "qemu-kvm-2.6.2-41.31.1.s390x",
"product_id": "qemu-kvm-2.6.2-41.31.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.31.1.s390x",
"product": {
"name": "qemu-lang-2.6.2-41.31.1.s390x",
"product_id": "qemu-lang-2.6.2-41.31.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.6.2-41.31.1.s390x",
"product": {
"name": "qemu-s390-2.6.2-41.31.1.s390x",
"product_id": "qemu-s390-2.6.2-41.31.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.31.1.s390x",
"product": {
"name": "qemu-tools-2.6.2-41.31.1.s390x",
"product_id": "qemu-tools-2.6.2-41.31.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.31.1.x86_64",
"product": {
"name": "qemu-2.6.2-41.31.1.x86_64",
"product_id": "qemu-2.6.2-41.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.31.1.x86_64",
"product": {
"name": "qemu-block-curl-2.6.2-41.31.1.x86_64",
"product_id": "qemu-block-curl-2.6.2-41.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.6.2-41.31.1.x86_64",
"product": {
"name": "qemu-kvm-2.6.2-41.31.1.x86_64",
"product_id": "qemu-kvm-2.6.2-41.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.31.1.x86_64",
"product": {
"name": "qemu-tools-2.6.2-41.31.1.x86_64",
"product_id": "qemu-tools-2.6.2-41.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.6.2-41.31.1.x86_64",
"product": {
"name": "qemu-x86-2.6.2-41.31.1.x86_64",
"product_id": "qemu-x86-2.6.2-41.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.6.2-41.31.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.6.2-41.31.1.x86_64",
"product_id": "qemu-block-rbd-2.6.2-41.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.31.1.x86_64",
"product": {
"name": "qemu-block-ssh-2.6.2-41.31.1.x86_64",
"product_id": "qemu-block-ssh-2.6.2-41.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.31.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.6.2-41.31.1.x86_64",
"product_id": "qemu-guest-agent-2.6.2-41.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.31.1.x86_64",
"product": {
"name": "qemu-lang-2.6.2-41.31.1.x86_64",
"product_id": "qemu-lang-2.6.2-41.31.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.31.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.31.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.31.1.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.31.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.31.1.noarch"
},
"product_reference": "qemu-sgabios-8-41.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.31.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.31.1.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-arm-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-block-curl-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.31.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-lang-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-tools-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.31.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.ppc64le"
},
"product_reference": "qemu-2.6.2-41.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-arm-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-block-curl-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.31.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.6.2-41.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-block-curl-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.31.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.ppc64le"
},
"product_reference": "qemu-block-ssh-2.6.2-41.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-block-ssh-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.31.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.6.2-41.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-guest-agent-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.31.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-kvm-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-lang-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.31.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.ppc64le"
},
"product_reference": "qemu-lang-2.6.2-41.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-lang-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-lang-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.6.2-41.31.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.31.1.ppc64le"
},
"product_reference": "qemu-ppc-2.6.2-41.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-s390-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.31.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.31.1.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.31.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.31.1.noarch"
},
"product_reference": "qemu-sgabios-8-41.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-tools-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.31.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.ppc64le"
},
"product_reference": "qemu-tools-2.6.2-41.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-tools-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.31.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.31.1.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.31.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.ppc64le"
},
"product_reference": "qemu-2.6.2-41.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-arm-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-block-curl-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.31.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.6.2-41.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-block-curl-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.31.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.ppc64le"
},
"product_reference": "qemu-block-ssh-2.6.2-41.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-block-ssh-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.31.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.6.2-41.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-guest-agent-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-kvm-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-lang-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.31.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.ppc64le"
},
"product_reference": "qemu-lang-2.6.2-41.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-lang-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-lang-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.6.2-41.31.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.31.1.ppc64le"
},
"product_reference": "qemu-ppc-2.6.2-41.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-s390-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.31.1.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.31.1.noarch"
},
"product_reference": "qemu-sgabios-8-41.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.31.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.aarch64"
},
"product_reference": "qemu-tools-2.6.2-41.31.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.31.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.ppc64le"
},
"product_reference": "qemu-tools-2.6.2-41.31.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.s390x"
},
"product_reference": "qemu-tools-2.6.2-41.31.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.31.1.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.31.1.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.31.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.31.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:qemu-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-block-curl-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-kvm-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-seabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-sgabios-8-41.31.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-tools-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-vgabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:qemu-x86-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-arm-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-curl-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-rbd-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-block-ssh-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-guest-agent-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-kvm-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-lang-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-ppc-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-s390-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-seabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-sgabios-8-41.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:qemu-tools-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:qemu-vgabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:qemu-x86-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-arm-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-curl-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-rbd-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-block-ssh-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-guest-agent-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-lang-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:qemu-tools-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-arm-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-s390-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T11:05:36Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:0010-1
Vulnerability from csaf_suse - Published: 2018-01-04 07:38 - Updated: 2018-01-04 07:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThis update adds mitigations for various side channel attacks against modern CPUs that could disclose\ncontent of otherwise unreadable memory (bnc#1068032).\n\n- CVE-2017-5753 / \u0027SpectreAttack\u0027: Local attackers on systems with modern CPUs featuring\n deep instruction pipelining could use attacker controllable speculative\n execution over code patterns in the Linux Kernel to leak content from\n otherwise not readable memory in the same address space, allowing\n retrieval of passwords, cryptographic keys and other secrets.\n\n This problem is mitigated by adding speculative fencing on affected\n code paths throughout the Linux kernel.\n\n\n- CVE-2017-5715 / \u0027SpectreAttack\u0027: Local attackers on systems with modern CPUs featuring\n branch prediction could use mispredicted branches to speculatively execute\n code patterns that in turn could be made to leak other non-readable\n content in the same address space, an attack similar to CVE-2017-5753.\n\n This problem is mitigated by disabling predictive branches, depending\n on CPU architecture either by firmware updates and/or fixes in the\n user-kernel privilege boundaries.\n\n Please also check with your CPU / Hardware vendor for available\n firmware or BIOS updates.\n\n As this feature can have a performance impact, it can be disabled\n using the \u0027nospec\u0027 kernel commandline option.\n\n\n- CVE-2017-5754 / \u0027MeltdownAttack\u0027: Local attackers on systems with\n modern CPUs featuring deep instruction pipelining could use code\n patterns in userspace to speculative executive code that would read\n otherwise read protected memory.\n\n This problem is mitigated by unmapping the Linux Kernel from the user\n address space during user code execution, following a approach called\n \u0027KAISER\u0027. The terms used here are \u0027KAISER\u0027 / \u0027Kernel Address Isolation\u0027\n and \u0027PTI\u0027 / \u0027Page Table Isolation\u0027.\n\n This is only enabled by default on affected architectures.\n\n This feature can be enabled / disabled by the \u0027pti=[on|off|auto]\u0027 or \u0027nopti\u0027 commandline options.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux\n kernel did not validate that the underlying cryptographic hash algorithm\n is unkeyed, allowing a local attacker able to use the AF_ALG-based hash\n interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm\n (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing\n a crafted sequence of system calls that encounter a missing SHA-3\n initialization (bnc#1073874).\n- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did\n not correctly handle zero-length inputs, allowing a local attacker able to\n use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER)\n to cause a denial of service (uninitialized-memory free and kernel\n crash) or have unspecified other impact by executing a crafted sequence\n of system calls that use the blkcipher_walk API. Both the generic\n implementation (crypto/salsa20_generic.c) and x86 implementation\n (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).\n\n\nThe following non-security bugs were fixed:\n\n- Add undefine _unique_build_ids (bsc#964063)\n- apei / ERST: Fix missing error handling in erst_reader() (bsc#1072556).\n- arm: Hide finish_arch_post_lock_switch() from modules (bsc#1068032).\n- autofs: fix careless error in recent commit (bnc#1012382 bsc#1065180).\n- bnxt_en: Do not print \u0027Link speed -1 no longer supported\u0027 messages (bsc#1070116).\n- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).\n- carl9170: prevent speculative execution (bnc#1068032).\n- ceph: drop negative child dentries before try pruning inode\u0027s alias (bsc#1073525).\n- Check cmdline_find_option() retval properly and use boot_cpu_has().\n- cifs: Fix NULL pointer deref on SMB2_tcon() failure (bsc#1071009).\n- cw1200: prevent speculative execution (bnc#1068032).\n- e1000e: Fix e1000_check_for_copper_link_ich8lan return value (bsc#1073809).\n- Fix unsed variable warning in has_unmovable_pages (bsc#1073868).\n- fs: prevent speculative execution (bnc#1068032).\n- genwqe: Take R/W permissions into account when dealing with memory pages (bsc#1073090).\n- ibmvnic: Include header descriptor support for ARP packets (bsc#1073912).\n- ibmvnic: Increase maximum number of RX/TX queues (bsc#1073912).\n- ibmvnic: Rename IBMVNIC_MAX_TX_QUEUES to IBMVNIC_MAX_QUEUES (bsc#1073912).\n- ipv6: prevent speculative execution (bnc#1068032).\n- iw_cxgb4: fix misuse of integer variable (bsc#963897,FATE#320114).\n- iw_cxgb4: only insert drain cqes if wq is flushed (bsc#321658 FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).\n- kaiser: add \u0027nokaiser\u0027 boot option, using ALTERNATIVE.\n- kaiser: align addition to x86/mm/Makefile.\n- kaiser: asm/tlbflush.h handle noPGE at lower level.\n- kaiser: cleanups while trying for gold link.\n- kaiser: disabled on Xen PV.\n- kaiser: do not set _PAGE_NX on pgd_none.\n- kaiser: drop is_atomic arg to kaiser_pagetable_walk().\n- kaiser: enhanced by kernel and user PCIDs.\n- kaiser: ENOMEM if kaiser_pagetable_walk() NULL.\n- kaiser: fix build and FIXME in alloc_ldt_struct().\n- kaiser: fix perf crashes.\n- kaiser: fix regs to do_nmi() ifndef CONFIG_KAISER.\n- kaiser: fix unlikely error in alloc_ldt_struct().\n- kaiser: KAISER depends on SMP.\n- kaiser: kaiser_flush_tlb_on_return_to_user() check PCID.\n- kaiser: kaiser_remove_mapping() move along the pgd.\n- kaiser: Kernel Address Isolation.\n- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush.\n- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush user.\n- kaiser: name that 0x1000 KAISER_SHADOW_PGD_OFFSET.\n- kaiser: paranoid_entry pass cr3 need to paranoid_exit.\n- kaiser: PCID 0 for kernel and 128 for user.\n- kaiser: _pgd_alloc() without __GFP_REPEAT to avoid stalls.\n- kaiser: stack map PAGE_SIZE at THREAD_SIZE-PAGE_SIZE.\n- kaiser: tidied up asm/kaiser.h somewhat.\n- kaiser: tidied up kaiser_add/remove_mapping slightly.\n- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.\n- kaiser: vmstat show NR_KAISERTABLE as nr_overhead.\n- kaiser: x86_cr3_pcid_noflush and x86_cr3_pcid_user.\n- kvm: svm: Do not intercept new speculative control MSRs (bsc#1068032).\n- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).\n- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).\n- mm/mmu_context, sched/core: Fix mmu_context.h assumption (bsc#1068032).\n- net/mlx5e: DCBNL, Implement tc with ets type and zero bandwidth (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net: mpls: prevent speculative execution (bnc#1068032).\n- nfs: revalidate \u0027.\u0027 etc correctly on \u0027open\u0027 (bsc#1068951).\n- nfs: revalidate \u0027.\u0027 etc correctly on \u0027open\u0027 (git-fixes). Fix References: tag.\n- nfsv4: always set NFS_LOCK_LOST when a lock is lost (bsc#1068951).\n- nvme-fabrics: introduce init command check for a queue that is not alive (bsc#1072890).\n- nvme-fc: check if queue is ready in queue_rq (bsc#1072890).\n- nvme-fc: do not use bit masks for set/test_bit() numbers (bsc#1072890).\n- nvme-loop: check if queue is ready in queue_rq (bsc#1072890).\n- nvmet-fc: cleanup nvmet add_port/remove_port (bsc#1072890).\n- nvmet_fc: correct broken add_port (bsc#1072890).\n- p54: prevent speculative execution (bnc#1068032).\n- powerpc/barrier: add gmb.\n- powerpc: Secure memory rfi flush (bsc#1068032).\n- ptrace: Add a new thread access check (bsc#1068032).\n- qla2xxx: prevent speculative execution (bnc#1068032).\n- s390: add ppa to system call and program check path (bsc#1068032).\n- s390: introduce CPU alternatives (bsc#1068032).\n- s390/qeth: add missing hash table initializations (bnc#1072216, LTC#162173).\n- s390/qeth: fix early exit from error path (bnc#1072216, LTC#162173).\n- s390/qeth: fix thinko in IPv4 multicast address tracking (bnc#1072216, LTC#162173).\n- s390/spinlock: add gmb memory barrier (bsc#1068032).\n- sched/core: Add switch_mm_irqs_off() and use it in the scheduler (bsc#1068032).\n- sched/core: Idle_task_exit() shouldn\u0027t use switch_mm_irqs_off() (bsc#1068032).\n- scsi_dh_alua: skip RTPG for devices only supporting active/optimized (bsc#1064311).\n- scsi: lpfc: correct sg_seg_cnt attribute min vs default (bsc#1072166).\n- scsi: qedi: Limit number for CQ queues (bsc#1072866).\n- scsi_scan: Exit loop if TUR to LUN0 fails with 0x05/0x25 (bsc#1063043). This is specific to FUJITSU ETERNUS_DX* targets. They can return \u0027Illegal Request - Logical unit not supported\u0027 and processing should leave the timeout loop in this case.\n- scsi: ses: check return code from ses_recv_diag() (bsc#1039616).\n- scsi: ses: Fixup error message \u0027failed to get diagnostic page 0xffffffea\u0027 (bsc#1039616).\n- scsi: ses: Fix wrong page error (bsc#1039616).\n- scsi: ses: make page2 support optional (bsc#1039616).\n- sfc: pass valid pointers from efx_enqueue_unwind (bsc#1017967 FATE#321663).\n- thermal/int340x: prevent speculative execution (bnc#1068032).\n- udf: prevent speculative execution (bnc#1068032).\n- Update config files: enable KAISER.\n- usb: host: fix incorrect updating of offset (bsc#1047487).\n- userns: prevent speculative execution (bnc#1068032).\n- uvcvideo: prevent speculative execution (bnc#1068032).\n- vxlan: correctly handle ipv6.disable module parameter (bsc#1072962).\n- x86/boot: Add early cmdline parsing for options with arguments.\n- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).\n- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).\n- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).\n- x86/CPU: Check speculation control CPUID bit (bsc#1068032).\n- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).\n- x86/entry: Add a function to overwrite the RSB (bsc#1068032).\n- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).\n- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).\n- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).\n- x86/idle: Toggle IBRS when going idle (bsc#1068032).\n- x86/kaiser: Check boottime cmdline params.\n- x86/kaiser: Move feature detection up (bsc#1068032).\n- x86/kaiser: Reenable PARAVIRT.\n- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.\n- x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).\n- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).\n- x86/kvm: Flush IBP when switching VMs (bsc#1068032).\n- x86/kvm: Pad RSB on VM transition (bsc#1068032).\n- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).\n- x86/mm/64: Fix reboot interaction with CR4.PCIDE (bsc#1068032).\n- x86/mm: Add a \u0027noinvpcid\u0027 boot option to turn off INVPCID (bsc#1068032).\n- x86/mm: Add INVPCID helpers (bsc#1068032).\n- x86/mm: Add the \u0027nopcid\u0027 boot option to turn off PCID (bsc#1068032).\n- x86/mm: Build arch/x86/mm/tlb.c even on !SMP (bsc#1068032).\n- x86/mm: Enable CR4.PCIDE on supported systems (bsc#1068032).\n- x86/mm: Fix INVPCID asm constraint (bsc#1068032).\n- x86/mm: If INVPCID is available, use it to flush global mappings (bsc#1068032).\n- x86/mm: Make flush_tlb_mm_range() more predictable (bsc#1068032).\n- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).\n- x86/mm: Reimplement flush_tlb_page() using flush_tlb_mm_range() (bsc#1068032).\n- x86/mm: Remove flush_tlb() and flush_tlb_current_task() (bsc#1068032).\n- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code (bsc#1068032).\n- x86/mm, sched/core: Turn off IRQs in switch_mm() (bsc#1068032).\n- x86/mm, sched/core: Uninline switch_mm() (bsc#1068032).\n- x86/mm: Set IBPB upon context switch (bsc#1068032).\n- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).\n- x86/paravirt: Dont patch flush_tlb_single (bsc#1068032).\n- x86/spec: Add IBRS control functions (bsc#1068032).\n- x86/spec: Add \u0027nospec\u0027 chicken bit (bsc#1068032).\n- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).\n- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).\n- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).\n- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).\n- x86/svm: Add code to clear registers on VM exit (bsc#1068032).\n- x86/svm: Clobber the RSB on VM exit (bsc#1068032).\n- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).\n- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-CAASP-ALL-2018-12,SUSE-SLE-DESKTOP-12-SP3-2018-12,SUSE-SLE-HA-12-SP3-2018-12,SUSE-SLE-Live-Patching-12-SP3-2018-12,SUSE-SLE-SDK-12-SP3-2018-12,SUSE-SLE-SERVER-12-SP3-2018-12,SUSE-SLE-WE-12-SP3-2018-12",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0010-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0010-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180010-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0010-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003564.html"
},
{
"category": "self",
"summary": "SUSE Bug 1005778",
"url": "https://bugzilla.suse.com/1005778"
},
{
"category": "self",
"summary": "SUSE Bug 1005780",
"url": "https://bugzilla.suse.com/1005780"
},
{
"category": "self",
"summary": "SUSE Bug 1005781",
"url": "https://bugzilla.suse.com/1005781"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1017967",
"url": "https://bugzilla.suse.com/1017967"
},
{
"category": "self",
"summary": "SUSE Bug 1039616",
"url": "https://bugzilla.suse.com/1039616"
},
{
"category": "self",
"summary": "SUSE Bug 1047487",
"url": "https://bugzilla.suse.com/1047487"
},
{
"category": "self",
"summary": "SUSE Bug 1063043",
"url": "https://bugzilla.suse.com/1063043"
},
{
"category": "self",
"summary": "SUSE Bug 1064311",
"url": "https://bugzilla.suse.com/1064311"
},
{
"category": "self",
"summary": "SUSE Bug 1065180",
"url": "https://bugzilla.suse.com/1065180"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068951",
"url": "https://bugzilla.suse.com/1068951"
},
{
"category": "self",
"summary": "SUSE Bug 1070116",
"url": "https://bugzilla.suse.com/1070116"
},
{
"category": "self",
"summary": "SUSE Bug 1071009",
"url": "https://bugzilla.suse.com/1071009"
},
{
"category": "self",
"summary": "SUSE Bug 1072166",
"url": "https://bugzilla.suse.com/1072166"
},
{
"category": "self",
"summary": "SUSE Bug 1072216",
"url": "https://bugzilla.suse.com/1072216"
},
{
"category": "self",
"summary": "SUSE Bug 1072556",
"url": "https://bugzilla.suse.com/1072556"
},
{
"category": "self",
"summary": "SUSE Bug 1072866",
"url": "https://bugzilla.suse.com/1072866"
},
{
"category": "self",
"summary": "SUSE Bug 1072890",
"url": "https://bugzilla.suse.com/1072890"
},
{
"category": "self",
"summary": "SUSE Bug 1072962",
"url": "https://bugzilla.suse.com/1072962"
},
{
"category": "self",
"summary": "SUSE Bug 1073090",
"url": "https://bugzilla.suse.com/1073090"
},
{
"category": "self",
"summary": "SUSE Bug 1073525",
"url": "https://bugzilla.suse.com/1073525"
},
{
"category": "self",
"summary": "SUSE Bug 1073792",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "self",
"summary": "SUSE Bug 1073809",
"url": "https://bugzilla.suse.com/1073809"
},
{
"category": "self",
"summary": "SUSE Bug 1073868",
"url": "https://bugzilla.suse.com/1073868"
},
{
"category": "self",
"summary": "SUSE Bug 1073874",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "self",
"summary": "SUSE Bug 1073912",
"url": "https://bugzilla.suse.com/1073912"
},
{
"category": "self",
"summary": "SUSE Bug 963897",
"url": "https://bugzilla.suse.com/963897"
},
{
"category": "self",
"summary": "SUSE Bug 964063",
"url": "https://bugzilla.suse.com/964063"
},
{
"category": "self",
"summary": "SUSE Bug 966170",
"url": "https://bugzilla.suse.com/966170"
},
{
"category": "self",
"summary": "SUSE Bug 966172",
"url": "https://bugzilla.suse.com/966172"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17805 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17806 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-01-04T07:38:09Z",
"generator": {
"date": "2018-01-04T07:38:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0010-1",
"initial_release_date": "2018-01-04T07:38:09Z",
"revision_history": [
{
"date": "2018-01-04T07:38:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-4.4.103-6.38.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.103-6.38.1.aarch64",
"product_id": "kernel-obs-build-4.4.103-6.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.103-6.38.1.aarch64",
"product": {
"name": "kernel-default-4.4.103-6.38.1.aarch64",
"product_id": "kernel-default-4.4.103-6.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.103-6.38.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.103-6.38.1.aarch64",
"product_id": "kernel-default-base-4.4.103-6.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.103-6.38.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.103-6.38.1.aarch64",
"product_id": "kernel-default-devel-4.4.103-6.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.103-6.38.1.aarch64",
"product": {
"name": "kernel-syms-4.4.103-6.38.1.aarch64",
"product_id": "kernel-syms-4.4.103-6.38.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.103-6.38.1.noarch",
"product": {
"name": "kernel-devel-4.4.103-6.38.1.noarch",
"product_id": "kernel-devel-4.4.103-6.38.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.103-6.38.1.noarch",
"product": {
"name": "kernel-macros-4.4.103-6.38.1.noarch",
"product_id": "kernel-macros-4.4.103-6.38.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.103-6.38.1.noarch",
"product": {
"name": "kernel-source-4.4.103-6.38.1.noarch",
"product_id": "kernel-source-4.4.103-6.38.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.103-6.38.1.noarch",
"product": {
"name": "kernel-docs-4.4.103-6.38.1.noarch",
"product_id": "kernel-docs-4.4.103-6.38.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.103-6.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.103-6.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.103-6.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.103-6.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"product_id": "kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.103-6.38.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.103-6.38.1.ppc64le",
"product_id": "kernel-obs-build-4.4.103-6.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.103-6.38.1.ppc64le",
"product": {
"name": "kernel-default-4.4.103-6.38.1.ppc64le",
"product_id": "kernel-default-4.4.103-6.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.103-6.38.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.103-6.38.1.ppc64le",
"product_id": "kernel-default-base-4.4.103-6.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.103-6.38.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.103-6.38.1.ppc64le",
"product_id": "kernel-default-devel-4.4.103-6.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.103-6.38.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.103-6.38.1.ppc64le",
"product_id": "kernel-syms-4.4.103-6.38.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.103-6.38.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.103-6.38.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.103-6.38.1.s390x",
"product_id": "dlm-kmp-default-4.4.103-6.38.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.103-6.38.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.103-6.38.1.s390x",
"product_id": "gfs2-kmp-default-4.4.103-6.38.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.103-6.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.103-6.38.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.103-6.38.1.s390x",
"product_id": "kernel-obs-build-4.4.103-6.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.103-6.38.1.s390x",
"product": {
"name": "kernel-default-4.4.103-6.38.1.s390x",
"product_id": "kernel-default-4.4.103-6.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.103-6.38.1.s390x",
"product": {
"name": "kernel-default-base-4.4.103-6.38.1.s390x",
"product_id": "kernel-default-base-4.4.103-6.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.103-6.38.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.103-6.38.1.s390x",
"product_id": "kernel-default-devel-4.4.103-6.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.103-6.38.1.s390x",
"product": {
"name": "kernel-default-man-4.4.103-6.38.1.s390x",
"product_id": "kernel-default-man-4.4.103-6.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.103-6.38.1.s390x",
"product": {
"name": "kernel-syms-4.4.103-6.38.1.s390x",
"product_id": "kernel-syms-4.4.103-6.38.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.103-6.38.1.x86_64",
"product": {
"name": "kernel-default-4.4.103-6.38.1.x86_64",
"product_id": "kernel-default-4.4.103-6.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.103-6.38.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.103-6.38.1.x86_64",
"product_id": "kernel-default-devel-4.4.103-6.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.103-6.38.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.103-6.38.1.x86_64",
"product_id": "kernel-default-extra-4.4.103-6.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.103-6.38.1.x86_64",
"product": {
"name": "kernel-syms-4.4.103-6.38.1.x86_64",
"product_id": "kernel-syms-4.4.103-6.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.103-6.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.103-6.38.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.103-6.38.1.x86_64",
"product_id": "dlm-kmp-default-4.4.103-6.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.103-6.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.103-6.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"product_id": "kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.103-6.38.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.103-6.38.1.x86_64",
"product_id": "kernel-obs-build-4.4.103-6.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.103-6.38.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.103-6.38.1.x86_64",
"product_id": "kernel-default-base-4.4.103-6.38.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64"
},
"product_reference": "kernel-default-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
},
"product_reference": "kernel-default-extra-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.103-6.38.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch"
},
"product_reference": "kernel-devel-4.4.103-6.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.103-6.38.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch"
},
"product_reference": "kernel-macros-4.4.103-6.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.103-6.38.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch"
},
"product_reference": "kernel-source-4.4.103-6.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64"
},
"product_reference": "kernel-syms-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.103-6.38.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.103-6.38.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.103-6.38.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.103-6.38.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.4.103-6.38.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch"
},
"product_reference": "kernel-docs-4.4.103-6.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.103-6.38.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64"
},
"product_reference": "kernel-obs-build-4.4.103-6.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.103-6.38.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.4.103-6.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x"
},
"product_reference": "kernel-obs-build-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64"
},
"product_reference": "kernel-obs-build-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-6.38.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64"
},
"product_reference": "kernel-default-4.4.103-6.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-6.38.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le"
},
"product_reference": "kernel-default-4.4.103-6.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x"
},
"product_reference": "kernel-default-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64"
},
"product_reference": "kernel-default-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-6.38.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.103-6.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-6.38.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.103-6.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x"
},
"product_reference": "kernel-default-base-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-6.38.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.103-6.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-6.38.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.103-6.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x"
},
"product_reference": "kernel-default-man-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.103-6.38.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch"
},
"product_reference": "kernel-devel-4.4.103-6.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.103-6.38.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch"
},
"product_reference": "kernel-macros-4.4.103-6.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.103-6.38.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch"
},
"product_reference": "kernel-source-4.4.103-6.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-6.38.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64"
},
"product_reference": "kernel-syms-4.4.103-6.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-6.38.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.103-6.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x"
},
"product_reference": "kernel-syms-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64"
},
"product_reference": "kernel-syms-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-6.38.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64"
},
"product_reference": "kernel-default-4.4.103-6.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-6.38.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le"
},
"product_reference": "kernel-default-4.4.103-6.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x"
},
"product_reference": "kernel-default-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64"
},
"product_reference": "kernel-default-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-6.38.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.103-6.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-6.38.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.103-6.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x"
},
"product_reference": "kernel-default-base-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-6.38.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.103-6.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-6.38.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.103-6.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x"
},
"product_reference": "kernel-default-man-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.103-6.38.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch"
},
"product_reference": "kernel-devel-4.4.103-6.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.103-6.38.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch"
},
"product_reference": "kernel-macros-4.4.103-6.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.103-6.38.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch"
},
"product_reference": "kernel-source-4.4.103-6.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-6.38.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64"
},
"product_reference": "kernel-syms-4.4.103-6.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-6.38.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.103-6.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-6.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x"
},
"product_reference": "kernel-syms-4.4.103-6.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64"
},
"product_reference": "kernel-syms-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.103-6.38.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
},
"product_reference": "kernel-default-extra-4.4.103-6.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-17805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17805"
}
],
"notes": [
{
"category": "general",
"text": "The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17805",
"url": "https://www.suse.com/security/cve/CVE-2017-17805"
},
{
"category": "external",
"summary": "SUSE Bug 1073792 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:38:09Z",
"details": "important"
}
],
"title": "CVE-2017-17805"
},
{
"cve": "CVE-2017-17806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17806"
}
],
"notes": [
{
"category": "general",
"text": "The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17806",
"url": "https://www.suse.com/security/cve/CVE-2017-17806"
},
{
"category": "external",
"summary": "SUSE Bug 1073874 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:38:09Z",
"details": "low"
}
],
"title": "CVE-2017-17806"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:38:09Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:38:09Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.103-6.38.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.103-6.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.103-6.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:38:09Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
}
]
}
SUSE-RU-2018:0821-1
Vulnerability from csaf_suse - Published: 2018-03-26 15:28 - Updated: 2018-03-26 15:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Recommended update for drbd, drbd-utils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for drbd and drbd-utils provides the following fixes:\n\nChanges in drbd-utils:\n\n- Make sure the full bitmap gets properly propagated in drbdmeta. Also make sure the ID\n is kept when downgrading from v9 to v8. (bsc#1037109)\n- Support passing \u0027--force\u0027 to drbdadm dump-md. (bsc#1077176)\n- Fix a possible kernel trace while starting the initial syncing of a stacked drbd.\n (bsc#1058770)\n- Backport some fixes of peer_device objects.\n- Do not hardcode loglevel local5 and make it possible to change that using --logfacility.\n (bsc#1064402)\n- Update documentation and examples regarding fencing: it is now moved from the disk to\n the net section. (bsc#1061145)\n- Skip running drbdadm sh-b-pri in drbd9. (bsc#1061147)\n- The included kernel modules in the KMP packages were rebuilt using \u0027retpoline\u0027 support to \n mitigate Spectre v2 (bsc#1068032 CVE-2017-5715)\n\nChanges in drbd:\n\n- Make sure the full bitmap gets properly propagated in drbdmeta. (bsc#1037109)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-HA-12-SP3-2018-551",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-ru-2018_0821-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-RU-2018:0821-1",
"url": "https://www.suse.com/support/update/announcement//suse-ru-20180821-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-RU-2018:0821-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2018-March/008142.html"
},
{
"category": "self",
"summary": "SUSE Bug 1037109",
"url": "https://bugzilla.suse.com/1037109"
},
{
"category": "self",
"summary": "SUSE Bug 1058770",
"url": "https://bugzilla.suse.com/1058770"
},
{
"category": "self",
"summary": "SUSE Bug 1061145",
"url": "https://bugzilla.suse.com/1061145"
},
{
"category": "self",
"summary": "SUSE Bug 1061147",
"url": "https://bugzilla.suse.com/1061147"
},
{
"category": "self",
"summary": "SUSE Bug 1064402",
"url": "https://bugzilla.suse.com/1064402"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1077176",
"url": "https://bugzilla.suse.com/1077176"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Recommended update for drbd, drbd-utils",
"tracking": {
"current_release_date": "2018-03-26T15:28:30Z",
"generator": {
"date": "2018-03-26T15:28:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-RU-2018:0821-1",
"initial_release_date": "2018-03-26T15:28:30Z",
"revision_history": [
{
"date": "2018-03-26T15:28:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "drbd-9.0.8+git.c8bc3670-3.3.2.ppc64le",
"product": {
"name": "drbd-9.0.8+git.c8bc3670-3.3.2.ppc64le",
"product_id": "drbd-9.0.8+git.c8bc3670-3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.ppc64le",
"product": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.ppc64le",
"product_id": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "drbd-utils-9.0.0-2.8.1.ppc64le",
"product": {
"name": "drbd-utils-9.0.0-2.8.1.ppc64le",
"product_id": "drbd-utils-9.0.0-2.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "drbd-9.0.8+git.c8bc3670-3.3.2.s390x",
"product": {
"name": "drbd-9.0.8+git.c8bc3670-3.3.2.s390x",
"product_id": "drbd-9.0.8+git.c8bc3670-3.3.2.s390x"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.s390x",
"product": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.s390x",
"product_id": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.s390x"
}
},
{
"category": "product_version",
"name": "drbd-utils-9.0.0-2.8.1.s390x",
"product": {
"name": "drbd-utils-9.0.0-2.8.1.s390x",
"product_id": "drbd-utils-9.0.0-2.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "drbd-9.0.8+git.c8bc3670-3.3.2.x86_64",
"product": {
"name": "drbd-9.0.8+git.c8bc3670-3.3.2.x86_64",
"product_id": "drbd-9.0.8+git.c8bc3670-3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.x86_64",
"product": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.x86_64",
"product_id": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-utils-9.0.0-2.8.1.x86_64",
"product": {
"name": "drbd-utils-9.0.0-2.8.1.x86_64",
"product_id": "drbd-utils-9.0.0-2.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-9.0.8+git.c8bc3670-3.3.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.3.2.ppc64le"
},
"product_reference": "drbd-9.0.8+git.c8bc3670-3.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-9.0.8+git.c8bc3670-3.3.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.3.2.s390x"
},
"product_reference": "drbd-9.0.8+git.c8bc3670-3.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-9.0.8+git.c8bc3670-3.3.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.3.2.x86_64"
},
"product_reference": "drbd-9.0.8+git.c8bc3670-3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.ppc64le"
},
"product_reference": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.s390x"
},
"product_reference": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.x86_64"
},
"product_reference": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-9.0.0-2.8.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-utils-9.0.0-2.8.1.ppc64le"
},
"product_reference": "drbd-utils-9.0.0-2.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-9.0.0-2.8.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-utils-9.0.0-2.8.1.s390x"
},
"product_reference": "drbd-utils-9.0.0-2.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-9.0.0-2.8.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-utils-9.0.0-2.8.1.x86_64"
},
"product_reference": "drbd-utils-9.0.0-2.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.3.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.3.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.3.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-utils-9.0.0-2.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-utils-9.0.0-2.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-utils-9.0.0-2.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.3.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.3.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.3.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-utils-9.0.0-2.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-utils-9.0.0-2.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-utils-9.0.0-2.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.3.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.3.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.3.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-utils-9.0.0-2.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-utils-9.0.0-2.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-utils-9.0.0-2.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-26T15:28:30Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:0762-1
Vulnerability from csaf_suse - Published: 2018-03-21 16:41 - Updated: 2018-03-21 16:41Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes the following issues:\n\nThis update has the next round of Spectre v2 related patches, which\nnow integrate with corresponding changes in libvirt. (CVE-2017-5715\nbsc#1068032)\n\nThe January 2018 release of qemu initially addressed the Spectre v2\nvulnerability for KVM guests by exposing the spec-ctrl feature\nfor all x86 vcpu types, which was the quick and dirty approach,\nbut not the proper solution.\n\nWe replaced our initial patch by the patches from upstream.\n\nThis update defines spec_ctrl and ibpb cpu feature flags as well as new\ncpu models which are clones of existing models with either -IBRS or -IBPB\nadded to the end of the model name. These new vcpu models explicitly\ninclude the new feature(s), whereas the feature flags can be added\nto the cpu parameter as with other features. In short, for continued\nSpectre v2 protection, ensure that either the appropriate cpu feature\nflag is added to the QEMU command-line, or one of the new cpu models is\nused.\n\nAlthough migration from older versions is supported, the new cpu\nfeatures won\u0027t be properly exposed to the guest until it is restarted\nwith the cpu features explicitly added. A reboot is insufficient.\n\nA warning patch is added which attempts to detect a migration\nfrom a qemu version which had the quick and dirty fix (it only\ndetects certain cases, but hopefully is helpful.)\nFor additional information on Spectre v2 as it relates to QEMU,\nsee:\n https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/\n\nA patch is added to continue to detect Spectre v2 mitigation\nfeatures (as shown by cpuid), and if found provide that feature\nto guests, even if running on older KVM (kernel) versions which\ndo not yet expose that feature to QEMU. (bsc#1082276)\n\nThese two patches will be removed when we can reasonably assume\neveryone is running with the appropriate updates.\n\nSpectre fixes for IBM Z Series were included by providing more hw features\nto guests (bsc#1076813)\n\nAlso security fixes for the following CVE issues are included:\n\n- CVE-2017-17381: The Virtio Vring implementation in QEMU allowed local OS guest users to cause a denial of service (divide-by-zero error and QEMU process crash) by unsetting vring alignment while updating Virtio rings. (bsc#1071228)\n- CVE-2017-16845: The PS2 driver in Qemu did not validate \u0027rptr\u0027 and \u0027count\u0027 values during guest migration, leading to out-of-bounds access. (bsc#1068613)\n- CVE-2017-15119: The Network Block Device (NBD) server in Quick Emulator (QEMU), was vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS. (bsc#1070144)\n- CVE-2017-18043: Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allowed a user to cause a denial of service (Qemu process crash). (bsc#1076775)\n- CVE-2018-5683: The VGA driver in Qemu allowed local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation. (bsc#1076114)\n- CVE-2018-7550: The multiboot functionality in Quick Emulator (aka QEMU) allowed local guest OS users to execute arbitrary code on the QEMU host via an out-of-bounds read or write memory access. (bsc#1083291)\n- CVE-2017-15124: VNC server implementation in Quick Emulator (QEMU) was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host. (bsc#1073489)\n\nAdditional bugs fixed:\n\n- Fix pcihp for 1.6 and older machine types (bsc#1074572)\n- Fix packaging dependencies (coreutils) for qemu-ksm package (bsc#1040202)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-CAASP-ALL-2018-516,SUSE-SLE-DESKTOP-12-SP3-2018-516,SUSE-SLE-SERVER-12-SP3-2018-516",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0762-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0762-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180762-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0762-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003831.html"
},
{
"category": "self",
"summary": "SUSE Bug 1040202",
"url": "https://bugzilla.suse.com/1040202"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068613",
"url": "https://bugzilla.suse.com/1068613"
},
{
"category": "self",
"summary": "SUSE Bug 1070144",
"url": "https://bugzilla.suse.com/1070144"
},
{
"category": "self",
"summary": "SUSE Bug 1071228",
"url": "https://bugzilla.suse.com/1071228"
},
{
"category": "self",
"summary": "SUSE Bug 1073489",
"url": "https://bugzilla.suse.com/1073489"
},
{
"category": "self",
"summary": "SUSE Bug 1074572",
"url": "https://bugzilla.suse.com/1074572"
},
{
"category": "self",
"summary": "SUSE Bug 1076114",
"url": "https://bugzilla.suse.com/1076114"
},
{
"category": "self",
"summary": "SUSE Bug 1076775",
"url": "https://bugzilla.suse.com/1076775"
},
{
"category": "self",
"summary": "SUSE Bug 1076813",
"url": "https://bugzilla.suse.com/1076813"
},
{
"category": "self",
"summary": "SUSE Bug 1082276",
"url": "https://bugzilla.suse.com/1082276"
},
{
"category": "self",
"summary": "SUSE Bug 1083291",
"url": "https://bugzilla.suse.com/1083291"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15119 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15124 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16845 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17381 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18043 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5683 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5683/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7550 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7550/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-03-21T16:41:39Z",
"generator": {
"date": "2018-03-21T16:41:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0762-1",
"initial_release_date": "2018-03-21T16:41:39Z",
"revision_history": [
{
"date": "2018-03-21T16:41:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.12.1.aarch64",
"product": {
"name": "qemu-2.9.1-6.12.1.aarch64",
"product_id": "qemu-2.9.1-6.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.9.1-6.12.1.aarch64",
"product": {
"name": "qemu-arm-2.9.1-6.12.1.aarch64",
"product_id": "qemu-arm-2.9.1-6.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.12.1.aarch64",
"product": {
"name": "qemu-block-curl-2.9.1-6.12.1.aarch64",
"product_id": "qemu-block-curl-2.9.1-6.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"product_id": "qemu-block-iscsi-2.9.1-6.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.9.1-6.12.1.aarch64",
"product": {
"name": "qemu-block-rbd-2.9.1-6.12.1.aarch64",
"product_id": "qemu-block-rbd-2.9.1-6.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.12.1.aarch64",
"product": {
"name": "qemu-block-ssh-2.9.1-6.12.1.aarch64",
"product_id": "qemu-block-ssh-2.9.1-6.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.12.1.aarch64",
"product": {
"name": "qemu-guest-agent-2.9.1-6.12.1.aarch64",
"product_id": "qemu-guest-agent-2.9.1-6.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.12.1.aarch64",
"product": {
"name": "qemu-lang-2.9.1-6.12.1.aarch64",
"product_id": "qemu-lang-2.9.1-6.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.12.1.aarch64",
"product": {
"name": "qemu-tools-2.9.1-6.12.1.aarch64",
"product_id": "qemu-tools-2.9.1-6.12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-6.12.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-6.12.1.noarch",
"product_id": "qemu-ipxe-1.0.0-6.12.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.10.2-6.12.1.noarch",
"product": {
"name": "qemu-seabios-1.10.2-6.12.1.noarch",
"product_id": "qemu-seabios-1.10.2-6.12.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-6.12.1.noarch",
"product": {
"name": "qemu-sgabios-8-6.12.1.noarch",
"product_id": "qemu-sgabios-8-6.12.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.10.2-6.12.1.noarch",
"product": {
"name": "qemu-vgabios-1.10.2-6.12.1.noarch",
"product_id": "qemu-vgabios-1.10.2-6.12.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.12.1.ppc64le",
"product": {
"name": "qemu-2.9.1-6.12.1.ppc64le",
"product_id": "qemu-2.9.1-6.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.12.1.ppc64le",
"product": {
"name": "qemu-block-curl-2.9.1-6.12.1.ppc64le",
"product_id": "qemu-block-curl-2.9.1-6.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"product_id": "qemu-block-iscsi-2.9.1-6.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"product": {
"name": "qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"product_id": "qemu-block-ssh-2.9.1-6.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"product": {
"name": "qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"product_id": "qemu-guest-agent-2.9.1-6.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.12.1.ppc64le",
"product": {
"name": "qemu-lang-2.9.1-6.12.1.ppc64le",
"product_id": "qemu-lang-2.9.1-6.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.9.1-6.12.1.ppc64le",
"product": {
"name": "qemu-ppc-2.9.1-6.12.1.ppc64le",
"product_id": "qemu-ppc-2.9.1-6.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.12.1.ppc64le",
"product": {
"name": "qemu-tools-2.9.1-6.12.1.ppc64le",
"product_id": "qemu-tools-2.9.1-6.12.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.12.1.s390x",
"product": {
"name": "qemu-2.9.1-6.12.1.s390x",
"product_id": "qemu-2.9.1-6.12.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.12.1.s390x",
"product": {
"name": "qemu-block-curl-2.9.1-6.12.1.s390x",
"product_id": "qemu-block-curl-2.9.1-6.12.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.12.1.s390x",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.12.1.s390x",
"product_id": "qemu-block-iscsi-2.9.1-6.12.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.12.1.s390x",
"product": {
"name": "qemu-block-ssh-2.9.1-6.12.1.s390x",
"product_id": "qemu-block-ssh-2.9.1-6.12.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.12.1.s390x",
"product": {
"name": "qemu-guest-agent-2.9.1-6.12.1.s390x",
"product_id": "qemu-guest-agent-2.9.1-6.12.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.9.1-6.12.1.s390x",
"product": {
"name": "qemu-kvm-2.9.1-6.12.1.s390x",
"product_id": "qemu-kvm-2.9.1-6.12.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.12.1.s390x",
"product": {
"name": "qemu-lang-2.9.1-6.12.1.s390x",
"product_id": "qemu-lang-2.9.1-6.12.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.9.1-6.12.1.s390x",
"product": {
"name": "qemu-s390-2.9.1-6.12.1.s390x",
"product_id": "qemu-s390-2.9.1-6.12.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.12.1.s390x",
"product": {
"name": "qemu-tools-2.9.1-6.12.1.s390x",
"product_id": "qemu-tools-2.9.1-6.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.12.1.x86_64",
"product": {
"name": "qemu-2.9.1-6.12.1.x86_64",
"product_id": "qemu-2.9.1-6.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.12.1.x86_64",
"product": {
"name": "qemu-block-curl-2.9.1-6.12.1.x86_64",
"product_id": "qemu-block-curl-2.9.1-6.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.9.1-6.12.1.x86_64",
"product": {
"name": "qemu-kvm-2.9.1-6.12.1.x86_64",
"product_id": "qemu-kvm-2.9.1-6.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.12.1.x86_64",
"product": {
"name": "qemu-tools-2.9.1-6.12.1.x86_64",
"product_id": "qemu-tools-2.9.1-6.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.9.1-6.12.1.x86_64",
"product": {
"name": "qemu-x86-2.9.1-6.12.1.x86_64",
"product_id": "qemu-x86-2.9.1-6.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"product_id": "qemu-block-iscsi-2.9.1-6.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.9.1-6.12.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.9.1-6.12.1.x86_64",
"product_id": "qemu-block-rbd-2.9.1-6.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.12.1.x86_64",
"product": {
"name": "qemu-block-ssh-2.9.1-6.12.1.x86_64",
"product_id": "qemu-block-ssh-2.9.1-6.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.12.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.9.1-6.12.1.x86_64",
"product_id": "qemu-guest-agent-2.9.1-6.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.12.1.x86_64",
"product": {
"name": "qemu-lang-2.9.1-6.12.1.x86_64",
"product_id": "qemu-lang-2.9.1-6.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-block-curl-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-6.12.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-6.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-kvm-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.10.2-6.12.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch"
},
"product_reference": "qemu-seabios-1.10.2-6.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-6.12.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch"
},
"product_reference": "qemu-sgabios-8-6.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-tools-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.10.2-6.12.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch"
},
"product_reference": "qemu-vgabios-1.10.2-6.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-x86-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-arm-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-block-curl-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-block-curl-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-block-curl-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-block-ssh-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-guest-agent-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-6.12.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-6.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-kvm-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-kvm-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-lang-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-lang-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-lang-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-lang-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-ppc-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-s390-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.10.2-6.12.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch"
},
"product_reference": "qemu-seabios-1.10.2-6.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-6.12.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch"
},
"product_reference": "qemu-sgabios-8-6.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-tools-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-tools-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-tools-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-tools-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.10.2-6.12.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch"
},
"product_reference": "qemu-vgabios-1.10.2-6.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-x86-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-arm-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-block-curl-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-block-curl-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-block-curl-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-block-ssh-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-guest-agent-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-6.12.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-6.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-kvm-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-kvm-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-lang-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-lang-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-lang-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-lang-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-ppc-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-s390-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.10.2-6.12.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch"
},
"product_reference": "qemu-seabios-1.10.2-6.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-6.12.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch"
},
"product_reference": "qemu-sgabios-8-6.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.12.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64"
},
"product_reference": "qemu-tools-2.9.1-6.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le"
},
"product_reference": "qemu-tools-2.9.1-6.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x"
},
"product_reference": "qemu-tools-2.9.1-6.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-tools-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.10.2-6.12.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch"
},
"product_reference": "qemu-vgabios-1.10.2-6.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.9.1-6.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
},
"product_reference": "qemu-x86-2.9.1-6.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15119"
}
],
"notes": [
{
"category": "general",
"text": "The Network Block Device (NBD) server in Quick Emulator (QEMU) before 2.11 is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15119",
"url": "https://www.suse.com/security/cve/CVE-2017-15119"
},
{
"category": "external",
"summary": "SUSE Bug 1070144 for CVE-2017-15119",
"url": "https://bugzilla.suse.com/1070144"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-21T16:41:39Z",
"details": "low"
}
],
"title": "CVE-2017-15119"
},
{
"cve": "CVE-2017-15124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15124"
}
],
"notes": [
{
"category": "general",
"text": "VNC server implementation in Quick Emulator (QEMU) 2.11.0 and older was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15124",
"url": "https://www.suse.com/security/cve/CVE-2017-15124"
},
{
"category": "external",
"summary": "SUSE Bug 1073489 for CVE-2017-15124",
"url": "https://bugzilla.suse.com/1073489"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-21T16:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2017-15124"
},
{
"cve": "CVE-2017-16845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16845"
}
],
"notes": [
{
"category": "general",
"text": "hw/input/ps2.c in Qemu does not validate \u0027rptr\u0027 and \u0027count\u0027 values during guest migration, leading to out-of-bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16845",
"url": "https://www.suse.com/security/cve/CVE-2017-16845"
},
{
"category": "external",
"summary": "SUSE Bug 1068613 for CVE-2017-16845",
"url": "https://bugzilla.suse.com/1068613"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-21T16:41:39Z",
"details": "low"
}
],
"title": "CVE-2017-16845"
},
{
"cve": "CVE-2017-17381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17381"
}
],
"notes": [
{
"category": "general",
"text": "The Virtio Vring implementation in QEMU allows local OS guest users to cause a denial of service (divide-by-zero error and QEMU process crash) by unsetting vring alignment while updating Virtio rings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17381",
"url": "https://www.suse.com/security/cve/CVE-2017-17381"
},
{
"category": "external",
"summary": "SUSE Bug 1071228 for CVE-2017-17381",
"url": "https://bugzilla.suse.com/1071228"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-21T16:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2017-17381"
},
{
"cve": "CVE-2017-18043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18043"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allows a user to cause a denial of service (Qemu process crash).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18043",
"url": "https://www.suse.com/security/cve/CVE-2017-18043"
},
{
"category": "external",
"summary": "SUSE Bug 1076775 for CVE-2017-18043",
"url": "https://bugzilla.suse.com/1076775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-21T16:41:39Z",
"details": "low"
}
],
"title": "CVE-2017-18043"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-21T16:41:39Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-5683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5683"
}
],
"notes": [
{
"category": "general",
"text": "The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5683",
"url": "https://www.suse.com/security/cve/CVE-2018-5683"
},
{
"category": "external",
"summary": "SUSE Bug 1076114 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076114"
},
{
"category": "external",
"summary": "SUSE Bug 1076116 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-21T16:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2018-5683"
},
{
"cve": "CVE-2018-7550",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7550"
}
],
"notes": [
{
"category": "general",
"text": "The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7550",
"url": "https://www.suse.com/security/cve/CVE-2018-7550"
},
{
"category": "external",
"summary": "SUSE Bug 1083291 for CVE-2018-7550",
"url": "https://bugzilla.suse.com/1083291"
},
{
"category": "external",
"summary": "SUSE Bug 1083292 for CVE-2018-7550",
"url": "https://bugzilla.suse.com/1083292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-21T16:41:39Z",
"details": "important"
}
],
"title": "CVE-2018-7550"
}
]
}
SUSE-SU-2018:1699-1
Vulnerability from csaf_suse - Published: 2018-06-15 12:42 - Updated: 2018-06-15 12:42Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes several issues.\n\nThis feature was added:\n\n- Added support for qemu monitor command \n\nThese security issues were fixed:\n\n- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).\n- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).\n\nThis non-security issue was fixed:\n\n- bsc#1086039 - Dom0 does not represent DomU cpu flags\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-7-2018-1142,SUSE-SLE-SAP-12-SP2-2018-1142,SUSE-SLE-SERVER-12-SP2-2018-1142,SUSE-Storage-4-2018-1142",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1699-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1699-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181699-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1699-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1086039",
"url": "https://bugzilla.suse.com/1086039"
},
{
"category": "self",
"summary": "SUSE Bug 1092631",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-06-15T12:42:33Z",
"generator": {
"date": "2018-06-15T12:42:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1699-1",
"initial_release_date": "2018-06-15T12:42:33Z",
"revision_history": [
{
"date": "2018-06-15T12:42:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-doc-html-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-libs-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-libs-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-tools-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-tools-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-tools-domU-4.7.5_04-43.33.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.5_04-43.33.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.5_04-43.33.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.5_04-43.33.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.5_04-43.33.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.5_04-43.33.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.5_04-43.33.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-15T12:42:33Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-15T12:42:33Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-15T12:42:33Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-15T12:42:33Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:0069-1
Vulnerability from csaf_suse - Published: 2018-01-11 12:16 - Updated: 2018-01-11 12:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThis update is only provided as a fix update for IBM Z platform.\n\n- CVE-2017-5753 / \u0027Spectre Attack\u0027: IBM Z fixes were included but not enabled in the previous update. This update enables those fixes.\n- CVE-2017-5715 / \u0027Spectre Attack\u0027: IBM Z fixes were already included in the previous update. A bugfix for the patches has been applied on top.\n- CVE-2017-5754: The IBM Z architecture is not affected by the \u0027Meltdown\u0027 attack.\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-HA-12-SP2-2018-48,SUSE-SLE-SDK-12-SP2-2018-48,SUSE-SLE-SERVER-12-SP2-2018-48",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0069-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0069-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180069-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0069-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003588.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-01-11T12:16:49Z",
"generator": {
"date": "2018-01-11T12:16:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0069-1",
"initial_release_date": "2018-01-11T12:16:49Z",
"revision_history": [
{
"date": "2018-01-11T12:16:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-docs-4.4.103-92.59.1.noarch",
"product": {
"name": "kernel-docs-4.4.103-92.59.1.noarch",
"product_id": "kernel-docs-4.4.103-92.59.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-devel-4.4.103-92.59.1.noarch",
"product": {
"name": "kernel-devel-4.4.103-92.59.1.noarch",
"product_id": "kernel-devel-4.4.103-92.59.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.103-92.59.1.noarch",
"product": {
"name": "kernel-macros-4.4.103-92.59.1.noarch",
"product_id": "kernel-macros-4.4.103-92.59.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.103-92.59.1.noarch",
"product": {
"name": "kernel-source-4.4.103-92.59.1.noarch",
"product_id": "kernel-source-4.4.103-92.59.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.103-92.59.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.103-92.59.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.103-92.59.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.103-92.59.1.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.103-92.59.1.s390x",
"product_id": "cluster-network-kmp-default-4.4.103-92.59.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.103-92.59.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.103-92.59.1.s390x",
"product_id": "dlm-kmp-default-4.4.103-92.59.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.103-92.59.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.103-92.59.1.s390x",
"product_id": "gfs2-kmp-default-4.4.103-92.59.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.103-92.59.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.103-92.59.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.103-92.59.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.103-92.59.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.103-92.59.1.s390x",
"product_id": "kernel-obs-build-4.4.103-92.59.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.103-92.59.1.s390x",
"product": {
"name": "kernel-default-4.4.103-92.59.1.s390x",
"product_id": "kernel-default-4.4.103-92.59.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.103-92.59.1.s390x",
"product": {
"name": "kernel-default-base-4.4.103-92.59.1.s390x",
"product_id": "kernel-default-base-4.4.103-92.59.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.103-92.59.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.103-92.59.1.s390x",
"product_id": "kernel-default-devel-4.4.103-92.59.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.103-92.59.1.s390x",
"product": {
"name": "kernel-default-man-4.4.103-92.59.1.s390x",
"product_id": "kernel-default-man-4.4.103-92.59.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.103-92.59.1.s390x",
"product": {
"name": "kernel-syms-4.4.103-92.59.1.s390x",
"product_id": "kernel-syms-4.4.103-92.59.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.59.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.59.1.s390x"
},
"product_reference": "cluster-network-kmp-default-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.59.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.59.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.59.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.4.103-92.59.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.59.1.noarch"
},
"product_reference": "kernel-docs-4.4.103-92.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.59.1.s390x"
},
"product_reference": "kernel-obs-build-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.59.1.s390x"
},
"product_reference": "kernel-default-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.59.1.s390x"
},
"product_reference": "kernel-default-base-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.59.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.59.1.s390x"
},
"product_reference": "kernel-default-man-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.103-92.59.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.59.1.noarch"
},
"product_reference": "kernel-devel-4.4.103-92.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.103-92.59.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.59.1.noarch"
},
"product_reference": "kernel-macros-4.4.103-92.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.103-92.59.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.59.1.noarch"
},
"product_reference": "kernel-source-4.4.103-92.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.59.1.s390x"
},
"product_reference": "kernel-syms-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.59.1.s390x"
},
"product_reference": "kernel-default-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.59.1.s390x"
},
"product_reference": "kernel-default-base-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.59.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.59.1.s390x"
},
"product_reference": "kernel-default-man-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.103-92.59.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.59.1.noarch"
},
"product_reference": "kernel-devel-4.4.103-92.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.103-92.59.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.59.1.noarch"
},
"product_reference": "kernel-macros-4.4.103-92.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.103-92.59.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.59.1.noarch"
},
"product_reference": "kernel-source-4.4.103-92.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-92.59.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.59.1.s390x"
},
"product_reference": "kernel-syms-4.4.103-92.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.59.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.59.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.59.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-11T12:16:49Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.59.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.59.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.59.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.59.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.59.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-11T12:16:49Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
}
]
}
SUSE-SU-2018:0638-1
Vulnerability from csaf_suse - Published: 2018-03-08 17:07 - Updated: 2018-03-08 17:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes several issues.\n\nThis new feature was included:\n\n- add script and sysv service to watch for vcpu online/offline events in a HVM domU\n\nThese security issues were fixed:\n\n- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via\n side effects of speculative execution, aka \u0027Spectre\u0027 and \u0027Meltdown\u0027 attacks\n (bsc#1074562, bsc#1068032)\n- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged\n users to cause a denial of service (out-of-bounds read and QEMU process crash)\n by leveraging improper memory address validation (bsc#1076116).\n- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest\n privileged users to cause a denial of service (out-of-bounds array access and\n QEMU process crash) via vectors related to negative pitch (bsc#1076180).\n- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded\n recursion, stack consumption, and hypervisor crash) or possibly gain privileges\n via crafted page-table stacking (bsc#1061081)\n- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host\n OS crash) or gain host OS privileges in shadow mode by mapping a certain\n auxiliary page (bsc#1070158).\n- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS\n crash) or gain host OS privileges by leveraging an incorrect mask for\n reference-count overflow checking in shadow mode (bsc#1070159).\n- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS\n crash) or gain host OS privileges by leveraging incorrect error handling for\n reference counting in shadow mode (bsc#1070160).\n- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host\n OS crash) if shadow mode and log-dirty mode are in place, because of an\n incorrect assertion related to M2P (bsc#1070163).\n- Added missing intermediate preemption checks for guest requesting removal of\n memory. This allowed malicious guest administrator to cause denial of service\n due to the high cost of this operation (bsc#1080635).\n- Because of XEN not returning the proper error messages when transitioning\n grant tables from v2 to v1 a malicious guest was able to cause DoS or\n potentially allowed for privilege escalation as well as information leaks\n (bsc#1080662).\n\nThese non-security issues were fixed:\n\n- bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100\n seconds. If many domUs shutdown in parallel the backends couldn\u0027t keep up\n- bsc#1031382: Prevent VMs from crashing when migrating between dom0 hosts in\n case read() returns zero on the receiver side.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-xen-13501,slessp4-xen-13501",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0638-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0638-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180638-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0638-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003795.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1031382",
"url": "https://bugzilla.suse.com/1031382"
},
{
"category": "self",
"summary": "SUSE Bug 1035442",
"url": "https://bugzilla.suse.com/1035442"
},
{
"category": "self",
"summary": "SUSE Bug 1061081",
"url": "https://bugzilla.suse.com/1061081"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1070158",
"url": "https://bugzilla.suse.com/1070158"
},
{
"category": "self",
"summary": "SUSE Bug 1070159",
"url": "https://bugzilla.suse.com/1070159"
},
{
"category": "self",
"summary": "SUSE Bug 1070160",
"url": "https://bugzilla.suse.com/1070160"
},
{
"category": "self",
"summary": "SUSE Bug 1070163",
"url": "https://bugzilla.suse.com/1070163"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1076116",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "self",
"summary": "SUSE Bug 1076180",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "self",
"summary": "SUSE Bug 1080635",
"url": "https://bugzilla.suse.com/1080635"
},
{
"category": "self",
"summary": "SUSE Bug 1080662",
"url": "https://bugzilla.suse.com/1080662"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15595 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17563 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17563/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17564 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17565 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17566 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18030 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5683 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5683/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-03-08T17:07:37Z",
"generator": {
"date": "2018-03-08T17:07:37Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0638-1",
"initial_release_date": "2018-03-08T17:07:37Z",
"revision_history": [
{
"date": "2018-03-08T17:07:37Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.4.4_28-61.23.2.i586",
"product": {
"name": "xen-devel-4.4.4_28-61.23.2.i586",
"product_id": "xen-devel-4.4.4_28-61.23.2.i586"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"product": {
"name": "xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"product_id": "xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586"
}
},
{
"category": "product_version",
"name": "xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"product": {
"name": "xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"product_id": "xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_28-61.23.2.i586",
"product": {
"name": "xen-libs-4.4.4_28-61.23.2.i586",
"product_id": "xen-libs-4.4.4_28-61.23.2.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_28-61.23.2.i586",
"product": {
"name": "xen-tools-domU-4.4.4_28-61.23.2.i586",
"product_id": "xen-tools-domU-4.4.4_28-61.23.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.4.4_28-61.23.2.x86_64",
"product": {
"name": "xen-devel-4.4.4_28-61.23.2.x86_64",
"product_id": "xen-devel-4.4.4_28-61.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-4.4.4_28-61.23.2.x86_64",
"product": {
"name": "xen-4.4.4_28-61.23.2.x86_64",
"product_id": "xen-4.4.4_28-61.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.4.4_28-61.23.2.x86_64",
"product": {
"name": "xen-doc-html-4.4.4_28-61.23.2.x86_64",
"product_id": "xen-doc-html-4.4.4_28-61.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"product": {
"name": "xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"product_id": "xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_28-61.23.2.x86_64",
"product": {
"name": "xen-libs-4.4.4_28-61.23.2.x86_64",
"product_id": "xen-libs-4.4.4_28-61.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"product": {
"name": "xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"product_id": "xen-libs-32bit-4.4.4_28-61.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.4.4_28-61.23.2.x86_64",
"product": {
"name": "xen-tools-4.4.4_28-61.23.2.x86_64",
"product_id": "xen-tools-4.4.4_28-61.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"product": {
"name": "xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"product_id": "xen-tools-domU-4.4.4_28-61.23.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.4.4_28-61.23.2.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586"
},
"product_reference": "xen-devel-4.4.4_28-61.23.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.4.4_28-61.23.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
},
"product_reference": "xen-devel-4.4.4_28-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_28-61.23.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64"
},
"product_reference": "xen-4.4.4_28-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_28-61.23.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_28-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586"
},
"product_reference": "xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586"
},
"product_reference": "xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_28-61.23.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586"
},
"product_reference": "xen-libs-4.4.4_28-61.23.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_28-61.23.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64"
},
"product_reference": "xen-libs-4.4.4_28-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_28-61.23.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_28-61.23.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64"
},
"product_reference": "xen-tools-4.4.4_28-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_28-61.23.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586"
},
"product_reference": "xen-tools-domU-4.4.4_28-61.23.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_28-61.23.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_28-61.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64"
},
"product_reference": "xen-4.4.4_28-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_28-61.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_28-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586"
},
"product_reference": "xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586"
},
"product_reference": "xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_28-61.23.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586"
},
"product_reference": "xen-libs-4.4.4_28-61.23.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_28-61.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64"
},
"product_reference": "xen-libs-4.4.4_28-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_28-61.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_28-61.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64"
},
"product_reference": "xen-tools-4.4.4_28-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_28-61.23.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586"
},
"product_reference": "xen-tools-domU-4.4.4_28-61.23.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_28-61.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15595"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15595",
"url": "https://www.suse.com/security/cve/CVE-2017-15595"
},
{
"category": "external",
"summary": "SUSE Bug 1061081 for CVE-2017-15595",
"url": "https://bugzilla.suse.com/1061081"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-15595",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T17:07:37Z",
"details": "important"
}
],
"title": "CVE-2017-15595"
},
{
"cve": "CVE-2017-17563",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17563"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17563",
"url": "https://www.suse.com/security/cve/CVE-2017-17563"
},
{
"category": "external",
"summary": "SUSE Bug 1070159 for CVE-2017-17563",
"url": "https://bugzilla.suse.com/1070159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T17:07:37Z",
"details": "moderate"
}
],
"title": "CVE-2017-17563"
},
{
"cve": "CVE-2017-17564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17564"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17564",
"url": "https://www.suse.com/security/cve/CVE-2017-17564"
},
{
"category": "external",
"summary": "SUSE Bug 1070160 for CVE-2017-17564",
"url": "https://bugzilla.suse.com/1070160"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17564",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T17:07:37Z",
"details": "moderate"
}
],
"title": "CVE-2017-17564"
},
{
"cve": "CVE-2017-17565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17565"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) if shadow mode and log-dirty mode are in place, because of an incorrect assertion related to M2P.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17565",
"url": "https://www.suse.com/security/cve/CVE-2017-17565"
},
{
"category": "external",
"summary": "SUSE Bug 1070163 for CVE-2017-17565",
"url": "https://bugzilla.suse.com/1070163"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17565",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T17:07:37Z",
"details": "moderate"
}
],
"title": "CVE-2017-17565"
},
{
"cve": "CVE-2017-17566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17566"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) or gain host OS privileges in shadow mode by mapping a certain auxiliary page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17566",
"url": "https://www.suse.com/security/cve/CVE-2017-17566"
},
{
"category": "external",
"summary": "SUSE Bug 1070158 for CVE-2017-17566",
"url": "https://bugzilla.suse.com/1070158"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17566",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T17:07:37Z",
"details": "moderate"
}
],
"title": "CVE-2017-17566"
},
{
"cve": "CVE-2017-18030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18030"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18030",
"url": "https://www.suse.com/security/cve/CVE-2017-18030"
},
{
"category": "external",
"summary": "SUSE Bug 1076179 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076179"
},
{
"category": "external",
"summary": "SUSE Bug 1076180 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T17:07:37Z",
"details": "low"
}
],
"title": "CVE-2017-18030"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T17:07:37Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T17:07:37Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T17:07:37Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-5683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5683"
}
],
"notes": [
{
"category": "general",
"text": "The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5683",
"url": "https://www.suse.com/security/cve/CVE-2018-5683"
},
{
"category": "external",
"summary": "SUSE Bug 1076114 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076114"
},
{
"category": "external",
"summary": "SUSE Bug 1076116 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_28-61.23.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_28-61.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T17:07:37Z",
"details": "moderate"
}
],
"title": "CVE-2018-5683"
}
]
}
SUSE-RU-2018:0779-1
Vulnerability from csaf_suse - Published: 2018-03-22 13:45 - Updated: 2018-03-22 13:45Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Recommended update for drbd and drbd-utils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for drbd and drbd-utils provides the following fixes:\n\nChanges in drbd:\n\n- Fix a possible kernel trace while starting the initial syncing of a stacked drbd.\n (bsc#1058770)\n- Fix auto promotion after split-brain. (bsc#1074228)\n- Support passing \u0027--force\u0027 to drbdadm dump-md. (bsc#1077176)\n- Many upstream fixes in version 9.0.8 (bsc#1045473):\n * Fix a race condition between adding connections and receiving data.\n * Fix a OOPS on a diskfull node when a request from a diskless node.\n * Fix a distributed deadlock when doing a discard/write-same burst.\n * Fix an issue with diskless nodes adopting wrong current UUIDs.\n * Fix wrongly rejected two-phase-state transactions.\n * Fix initial resync, triggered by \u0027--force primary\u0027.\n * Speed-up AL-updates with bio flags REQ_META and REQ_PRIO.\n * Merged changes from 8.4.10 and with that compatibility with Linux-4.12.\n- The kernel modules were rebuilt with retpoline support to mitigate Spectre v2 (bsc#1068032 CVE-2017-5715)\n\nChanges in drbd-utils:\n\n- Fix the wrong device due to udev change. (bsc#1059566)\n- Support passing \u0027--force\u0027 to drbdadm dump-md. (bsc#1077176)\n- Fix a possible kernel trace while starting the initial syncing of a stacked drbd.\n (bsc#1058770)\n- Backport some fixes of peer_device objects.\n- Do not hardcode loglevel local5 and make it possible to change that using --logfacility.\n (bsc#1064402)\n- Update documentation and examples regarding fencing: it is now moved from the dir to\n the net section. (bsc#1061145)\n- Skip running drbdadm sh-b-pri in drbd9. (bsc#1061147)\n- Disable quorum in default configuration. (bsc#1032142)\n- Fix auto promotion after split-brain. (bsc#1074228)\n- Use upstream\u0027s RA.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-HA-12-SP2-2018-530",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-ru-2018_0779-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-RU-2018:0779-1",
"url": "https://www.suse.com/support/update/announcement//suse-ru-20180779-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-RU-2018:0779-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2018-March/008124.html"
},
{
"category": "self",
"summary": "SUSE Bug 1032142",
"url": "https://bugzilla.suse.com/1032142"
},
{
"category": "self",
"summary": "SUSE Bug 1045473",
"url": "https://bugzilla.suse.com/1045473"
},
{
"category": "self",
"summary": "SUSE Bug 1058770",
"url": "https://bugzilla.suse.com/1058770"
},
{
"category": "self",
"summary": "SUSE Bug 1059566",
"url": "https://bugzilla.suse.com/1059566"
},
{
"category": "self",
"summary": "SUSE Bug 1061145",
"url": "https://bugzilla.suse.com/1061145"
},
{
"category": "self",
"summary": "SUSE Bug 1061147",
"url": "https://bugzilla.suse.com/1061147"
},
{
"category": "self",
"summary": "SUSE Bug 1064402",
"url": "https://bugzilla.suse.com/1064402"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1074228",
"url": "https://bugzilla.suse.com/1074228"
},
{
"category": "self",
"summary": "SUSE Bug 1077176",
"url": "https://bugzilla.suse.com/1077176"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Recommended update for drbd and drbd-utils",
"tracking": {
"current_release_date": "2018-03-22T13:45:01Z",
"generator": {
"date": "2018-03-22T13:45:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-RU-2018:0779-1",
"initial_release_date": "2018-03-22T13:45:01Z",
"revision_history": [
{
"date": "2018-03-22T13:45:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "drbd-9.0.8+git.c8bc3670-10.8.1.ppc64le",
"product": {
"name": "drbd-9.0.8+git.c8bc3670-10.8.1.ppc64le",
"product_id": "drbd-9.0.8+git.c8bc3670-10.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.ppc64le",
"product": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.ppc64le",
"product_id": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "drbd-utils-9.0.0-8.15.1.ppc64le",
"product": {
"name": "drbd-utils-9.0.0-8.15.1.ppc64le",
"product_id": "drbd-utils-9.0.0-8.15.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "drbd-9.0.8+git.c8bc3670-10.8.1.s390x",
"product": {
"name": "drbd-9.0.8+git.c8bc3670-10.8.1.s390x",
"product_id": "drbd-9.0.8+git.c8bc3670-10.8.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.s390x",
"product": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.s390x",
"product_id": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-utils-9.0.0-8.15.1.s390x",
"product": {
"name": "drbd-utils-9.0.0-8.15.1.s390x",
"product_id": "drbd-utils-9.0.0-8.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "drbd-9.0.8+git.c8bc3670-10.8.1.x86_64",
"product": {
"name": "drbd-9.0.8+git.c8bc3670-10.8.1.x86_64",
"product_id": "drbd-9.0.8+git.c8bc3670-10.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.x86_64",
"product": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.x86_64",
"product_id": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-utils-9.0.0-8.15.1.x86_64",
"product": {
"name": "drbd-utils-9.0.0-8.15.1.x86_64",
"product_id": "drbd-utils-9.0.0-8.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-9.0.8+git.c8bc3670-10.8.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-9.0.8+git.c8bc3670-10.8.1.ppc64le"
},
"product_reference": "drbd-9.0.8+git.c8bc3670-10.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-9.0.8+git.c8bc3670-10.8.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-9.0.8+git.c8bc3670-10.8.1.s390x"
},
"product_reference": "drbd-9.0.8+git.c8bc3670-10.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-9.0.8+git.c8bc3670-10.8.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-9.0.8+git.c8bc3670-10.8.1.x86_64"
},
"product_reference": "drbd-9.0.8+git.c8bc3670-10.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.ppc64le"
},
"product_reference": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.s390x"
},
"product_reference": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.x86_64"
},
"product_reference": "drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-9.0.0-8.15.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-utils-9.0.0-8.15.1.ppc64le"
},
"product_reference": "drbd-utils-9.0.0-8.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-9.0.0-8.15.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-utils-9.0.0-8.15.1.s390x"
},
"product_reference": "drbd-utils-9.0.0-8.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-9.0.0-8.15.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-utils-9.0.0-8.15.1.x86_64"
},
"product_reference": "drbd-utils-9.0.0-8.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-9.0.8+git.c8bc3670-10.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-9.0.8+git.c8bc3670-10.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-9.0.8+git.c8bc3670-10.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-utils-9.0.0-8.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-utils-9.0.0-8.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-utils-9.0.0-8.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-9.0.8+git.c8bc3670-10.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-9.0.8+git.c8bc3670-10.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-9.0.8+git.c8bc3670-10.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-utils-9.0.0-8.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-utils-9.0.0-8.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-utils-9.0.0-8.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-9.0.8+git.c8bc3670-10.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-9.0.8+git.c8bc3670-10.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-9.0.8+git.c8bc3670-10.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-utils-9.0.0-8.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-utils-9.0.0-8.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:drbd-utils-9.0.0-8.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-22T13:45:01Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:0472-1
Vulnerability from csaf_suse - Published: 2018-02-19 09:15 - Updated: 2018-02-19 09:15Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via\n side effects of speculative execution, aka \u0027Spectre\u0027 and \u0027Meltdown\u0027 attacks\n (bsc#1074562, bsc#1068032)\n- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded\n recursion, stack consumption, and hypervisor crash) or possibly gain privileges\n via crafted page-table stacking (bsc#1061081)\n- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host\n OS crash) or gain host OS privileges in shadow mode by mapping a certain\n auxiliary page (bsc#1070158).\n- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS\n crash) or gain host OS privileges by leveraging an incorrect mask for\n reference-count overflow checking in shadow mode (bsc#1070159).\n- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS\n crash) or gain host OS privileges by leveraging incorrect error handling for\n reference counting in shadow mode (bsc#1070160).\n- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host\n OS crash) if shadow mode and log-dirty mode are in place, because of an\n incorrect assertion related to M2P (bsc#1070163).\n- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged\n users to cause a denial of service (out-of-bounds read and QEMU process crash)\n by leveraging improper memory address validation (bsc#1076116).\n- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest\n privileged users to cause a denial of service (out-of-bounds array access and\n QEMU process crash) via vectors related to negative pitch (bsc#1076180).\n\nThese non-security issues were fixed:\n\n- bsc#1051729: Prevent invalid symlinks after install of SLES 12 SP2\n- bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100\n seconds. If many domUs shutdown in parallel the backends couldn\u0027t keep up\n- bsc#1027519: Added several upstream patches\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP2-2018-325,SUSE-SLE-SDK-12-SP2-2018-325,SUSE-SLE-SERVER-12-SP2-2018-325",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0472-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0472-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180472-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0472-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-February/003741.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1035442",
"url": "https://bugzilla.suse.com/1035442"
},
{
"category": "self",
"summary": "SUSE Bug 1051729",
"url": "https://bugzilla.suse.com/1051729"
},
{
"category": "self",
"summary": "SUSE Bug 1061081",
"url": "https://bugzilla.suse.com/1061081"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1070158",
"url": "https://bugzilla.suse.com/1070158"
},
{
"category": "self",
"summary": "SUSE Bug 1070159",
"url": "https://bugzilla.suse.com/1070159"
},
{
"category": "self",
"summary": "SUSE Bug 1070160",
"url": "https://bugzilla.suse.com/1070160"
},
{
"category": "self",
"summary": "SUSE Bug 1070163",
"url": "https://bugzilla.suse.com/1070163"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1076116",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "self",
"summary": "SUSE Bug 1076180",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15595 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17563 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17563/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17564 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17565 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17566 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18030 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5683 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5683/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-02-19T09:15:16Z",
"generator": {
"date": "2018-02-19T09:15:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0472-1",
"initial_release_date": "2018-02-19T09:15:16Z",
"revision_history": [
{
"date": "2018-02-19T09:15:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.7.4_06-43.24.1.aarch64",
"product": {
"name": "xen-devel-4.7.4_06-43.24.1.aarch64",
"product_id": "xen-devel-4.7.4_06-43.24.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.7.4_06-43.24.1.x86_64",
"product": {
"name": "xen-4.7.4_06-43.24.1.x86_64",
"product_id": "xen-4.7.4_06-43.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.7.4_06-43.24.1.x86_64",
"product": {
"name": "xen-libs-4.7.4_06-43.24.1.x86_64",
"product_id": "xen-libs-4.7.4_06-43.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"product_id": "xen-libs-32bit-4.7.4_06-43.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.7.4_06-43.24.1.x86_64",
"product": {
"name": "xen-devel-4.7.4_06-43.24.1.x86_64",
"product_id": "xen-devel-4.7.4_06-43.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.7.4_06-43.24.1.x86_64",
"product": {
"name": "xen-doc-html-4.7.4_06-43.24.1.x86_64",
"product_id": "xen-doc-html-4.7.4_06-43.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.7.4_06-43.24.1.x86_64",
"product": {
"name": "xen-tools-4.7.4_06-43.24.1.x86_64",
"product_id": "xen-tools-4.7.4_06-43.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"product": {
"name": "xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"product_id": "xen-tools-domU-4.7.4_06-43.24.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-libs-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.7.4_06-43.24.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64"
},
"product_reference": "xen-devel-4.7.4_06-43.24.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-devel-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-libs-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-tools-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-libs-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-tools-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.4_06-43.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15595"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15595",
"url": "https://www.suse.com/security/cve/CVE-2017-15595"
},
{
"category": "external",
"summary": "SUSE Bug 1061081 for CVE-2017-15595",
"url": "https://bugzilla.suse.com/1061081"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-15595",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T09:15:16Z",
"details": "important"
}
],
"title": "CVE-2017-15595"
},
{
"cve": "CVE-2017-17563",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17563"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17563",
"url": "https://www.suse.com/security/cve/CVE-2017-17563"
},
{
"category": "external",
"summary": "SUSE Bug 1070159 for CVE-2017-17563",
"url": "https://bugzilla.suse.com/1070159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T09:15:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-17563"
},
{
"cve": "CVE-2017-17564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17564"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17564",
"url": "https://www.suse.com/security/cve/CVE-2017-17564"
},
{
"category": "external",
"summary": "SUSE Bug 1070160 for CVE-2017-17564",
"url": "https://bugzilla.suse.com/1070160"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17564",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T09:15:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-17564"
},
{
"cve": "CVE-2017-17565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17565"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) if shadow mode and log-dirty mode are in place, because of an incorrect assertion related to M2P.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17565",
"url": "https://www.suse.com/security/cve/CVE-2017-17565"
},
{
"category": "external",
"summary": "SUSE Bug 1070163 for CVE-2017-17565",
"url": "https://bugzilla.suse.com/1070163"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17565",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T09:15:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-17565"
},
{
"cve": "CVE-2017-17566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17566"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) or gain host OS privileges in shadow mode by mapping a certain auxiliary page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17566",
"url": "https://www.suse.com/security/cve/CVE-2017-17566"
},
{
"category": "external",
"summary": "SUSE Bug 1070158 for CVE-2017-17566",
"url": "https://bugzilla.suse.com/1070158"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-17566",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T09:15:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-17566"
},
{
"cve": "CVE-2017-18030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18030"
}
],
"notes": [
{
"category": "general",
"text": "The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18030",
"url": "https://www.suse.com/security/cve/CVE-2017-18030"
},
{
"category": "external",
"summary": "SUSE Bug 1076179 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076179"
},
{
"category": "external",
"summary": "SUSE Bug 1076180 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1076180"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-18030",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T09:15:16Z",
"details": "low"
}
],
"title": "CVE-2017-18030"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T09:15:16Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T09:15:16Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T09:15:16Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-5683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5683"
}
],
"notes": [
{
"category": "general",
"text": "The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5683",
"url": "https://www.suse.com/security/cve/CVE-2018-5683"
},
{
"category": "external",
"summary": "SUSE Bug 1076114 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076114"
},
{
"category": "external",
"summary": "SUSE Bug 1076116 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1076116"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-5683",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.4_06-43.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:xen-devel-4.7.4_06-43.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-19T09:15:16Z",
"details": "moderate"
}
],
"title": "CVE-2018-5683"
}
]
}
SUSE-SU-2018:1386-1
Vulnerability from csaf_suse - Published: 2018-05-23 11:01 - Updated: 2018-05-23 11:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes several issues.\n\nThis security issue was fixed:\n\n- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).\n\n Systems with microprocessors utilizing speculative execution and speculative\n execution of memory reads before the addresses of all prior memory writes are\n known may allow unauthorized disclosure of information to an attacker with\n local user access via a side-channel analysis.\n\n This patch permits the new x86 cpu feature flag named \u0027ssbd\u0027 to be\n presented to the guest, given that the host has this feature, and\n KVM exposes it to the guest as well.\n\n For this feature to be enabled please use the qemu commandline\n -cpu $MODEL,+spec-ctrl,+ssbd\n so the guest OS can take advantage of the feature.\n\n spec-ctrl and ssbd support is also required in the host.\n- CVE-2017-5715: This update has the next round of Spectre v2 related patches,\n which now integrates with corresponding changes in libvirt. A January 2018\n release of qemu initially addressed the Spectre v2 vulnerability for KVM guests\n by exposing the spec-ctrl feature for all x86 vcpu types. We remove that\n initial patch and now rely on patches from upstream (bsc#1068032).\n\n This update defines spec_ctrl and ibpb cpu feature flags as well as new cpu\n models which are clones of existing models with either -IBRS or -IBPB added to\n the end of the model name. These new vcpu models explicitly include the new\n feature(s), whereas the feature flags can be added to the cpu parameter as with\n other features. In short, for continued Spectre v2 protection, ensure that\n either the appropriate cpu feature flag is added to the QEMU command-line, or\n one of the new cpu models is used. Although migration from older versions is\n supported, the new cpu features won\u0027t be properly exposed to the guest until it\n is restarted with the cpu features explicitly added. A reboot is insufficient.\n- A patch is added to continue to detect Spectre v2 mitigation features (as\n shown by cpuid), and if found provide that feature to guests, even if running\n on older KVM (kernel) versions which do not yet expose that feature to QEMU.\n (bsc#1082276)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-2018-968",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1386-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1386-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181386-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1386-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004082.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1082276",
"url": "https://bugzilla.suse.com/1082276"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-05-23T11:01:58Z",
"generator": {
"date": "2018-05-23T11:01:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1386-1",
"initial_release_date": "2018-05-23T11:01:58Z",
"revision_history": [
{
"date": "2018-05-23T11:01:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-48.40.2.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-48.40.2.noarch",
"product_id": "qemu-ipxe-1.0.0-48.40.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.7.4-48.40.2.noarch",
"product": {
"name": "qemu-seabios-1.7.4-48.40.2.noarch",
"product_id": "qemu-seabios-1.7.4-48.40.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-48.40.2.noarch",
"product": {
"name": "qemu-sgabios-8-48.40.2.noarch",
"product_id": "qemu-sgabios-8-48.40.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.7.4-48.40.2.noarch",
"product": {
"name": "qemu-vgabios-1.7.4-48.40.2.noarch",
"product_id": "qemu-vgabios-1.7.4-48.40.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.40.2.ppc64le",
"product": {
"name": "qemu-2.0.2-48.40.2.ppc64le",
"product_id": "qemu-2.0.2-48.40.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.40.2.ppc64le",
"product": {
"name": "qemu-block-curl-2.0.2-48.40.2.ppc64le",
"product_id": "qemu-block-curl-2.0.2-48.40.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"product": {
"name": "qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"product_id": "qemu-guest-agent-2.0.2-48.40.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.40.2.ppc64le",
"product": {
"name": "qemu-lang-2.0.2-48.40.2.ppc64le",
"product_id": "qemu-lang-2.0.2-48.40.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.0.2-48.40.2.ppc64le",
"product": {
"name": "qemu-ppc-2.0.2-48.40.2.ppc64le",
"product_id": "qemu-ppc-2.0.2-48.40.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.40.2.ppc64le",
"product": {
"name": "qemu-tools-2.0.2-48.40.2.ppc64le",
"product_id": "qemu-tools-2.0.2-48.40.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.40.2.s390x",
"product": {
"name": "qemu-2.0.2-48.40.2.s390x",
"product_id": "qemu-2.0.2-48.40.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.40.2.s390x",
"product": {
"name": "qemu-block-curl-2.0.2-48.40.2.s390x",
"product_id": "qemu-block-curl-2.0.2-48.40.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.40.2.s390x",
"product": {
"name": "qemu-guest-agent-2.0.2-48.40.2.s390x",
"product_id": "qemu-guest-agent-2.0.2-48.40.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.0.2-48.40.2.s390x",
"product": {
"name": "qemu-kvm-2.0.2-48.40.2.s390x",
"product_id": "qemu-kvm-2.0.2-48.40.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.40.2.s390x",
"product": {
"name": "qemu-lang-2.0.2-48.40.2.s390x",
"product_id": "qemu-lang-2.0.2-48.40.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.0.2-48.40.2.s390x",
"product": {
"name": "qemu-s390-2.0.2-48.40.2.s390x",
"product_id": "qemu-s390-2.0.2-48.40.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.40.2.s390x",
"product": {
"name": "qemu-tools-2.0.2-48.40.2.s390x",
"product_id": "qemu-tools-2.0.2-48.40.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-2.0.2-48.40.2.x86_64",
"product_id": "qemu-2.0.2-48.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-block-curl-2.0.2-48.40.2.x86_64",
"product_id": "qemu-block-curl-2.0.2-48.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-block-rbd-2.0.2-48.40.2.x86_64",
"product_id": "qemu-block-rbd-2.0.2-48.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-guest-agent-2.0.2-48.40.2.x86_64",
"product_id": "qemu-guest-agent-2.0.2-48.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-kvm-2.0.2-48.40.2.x86_64",
"product_id": "qemu-kvm-2.0.2-48.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-lang-2.0.2-48.40.2.x86_64",
"product_id": "qemu-lang-2.0.2-48.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-tools-2.0.2-48.40.2.x86_64",
"product_id": "qemu-tools-2.0.2-48.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-x86-2.0.2-48.40.2.x86_64",
"product_id": "qemu-x86-2.0.2-48.40.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.40.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.ppc64le"
},
"product_reference": "qemu-2.0.2-48.40.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.40.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.s390x"
},
"product_reference": "qemu-2.0.2-48.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.40.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.ppc64le"
},
"product_reference": "qemu-block-curl-2.0.2-48.40.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.40.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.s390x"
},
"product_reference": "qemu-block-curl-2.0.2-48.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-block-curl-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-block-rbd-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.40.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.ppc64le"
},
"product_reference": "qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.40.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.s390x"
},
"product_reference": "qemu-guest-agent-2.0.2-48.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-guest-agent-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-48.40.2.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.40.2.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-48.40.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.0.2-48.40.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.s390x"
},
"product_reference": "qemu-kvm-2.0.2-48.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-kvm-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.40.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.ppc64le"
},
"product_reference": "qemu-lang-2.0.2-48.40.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.40.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.s390x"
},
"product_reference": "qemu-lang-2.0.2-48.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-lang-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.0.2-48.40.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.40.2.ppc64le"
},
"product_reference": "qemu-ppc-2.0.2-48.40.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.0.2-48.40.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.40.2.s390x"
},
"product_reference": "qemu-s390-2.0.2-48.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.7.4-48.40.2.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.40.2.noarch"
},
"product_reference": "qemu-seabios-1.7.4-48.40.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-48.40.2.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.40.2.noarch"
},
"product_reference": "qemu-sgabios-8-48.40.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.40.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.ppc64le"
},
"product_reference": "qemu-tools-2.0.2-48.40.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.40.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.s390x"
},
"product_reference": "qemu-tools-2.0.2-48.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-tools-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.7.4-48.40.2.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.40.2.noarch"
},
"product_reference": "qemu-vgabios-1.7.4-48.40.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-x86-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.40.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.40.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.40.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-23T11:01:58Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.40.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.40.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.40.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-23T11:01:58Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1486-1
Vulnerability from csaf_suse - Published: 2018-06-01 09:36 - Updated: 2018-06-01 09:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for HA kernel modules",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update provides rebuilds of HA kernel modules with retpoline\nsupport to mitigate Spectre Variant 2 (CVE-2017-5715 bsc#1068032)\n\ncluster fs also received these bugfixes:\n\n- backport patch to fix dlmglue false deadlock (bnc#962257)\n- Fix for online increase of filesystem in kernel mode fails (bsc#936517).\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-HA-12-2018-1014",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1486-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1486-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181486-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1486-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004106.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 936517",
"url": "https://bugzilla.suse.com/936517"
},
{
"category": "self",
"summary": "SUSE Bug 962257",
"url": "https://bugzilla.suse.com/962257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for HA kernel modules",
"tracking": {
"current_release_date": "2018-06-01T09:36:08Z",
"generator": {
"date": "2018-06-01T09:36:08Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1486-1",
"initial_release_date": "2018-06-01T09:36:08Z",
"revision_history": [
{
"date": "2018-06-01T09:36:08Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.s390x",
"product": {
"name": "cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.s390x",
"product_id": "cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.s390x",
"product": {
"name": "dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.s390x",
"product_id": "dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-8.4.4.7-9.11.1.s390x",
"product": {
"name": "drbd-8.4.4.7-9.11.1.s390x",
"product_id": "drbd-8.4.4.7-9.11.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.s390x",
"product": {
"name": "drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.s390x",
"product_id": "drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.s390x",
"product": {
"name": "gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.s390x",
"product_id": "gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.s390x",
"product": {
"name": "ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.s390x",
"product_id": "ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.x86_64",
"product_id": "cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-xen-1.4_k3.12.61_52.133-26.4.1.x86_64",
"product": {
"name": "cluster-network-kmp-xen-1.4_k3.12.61_52.133-26.4.1.x86_64",
"product_id": "cluster-network-kmp-xen-1.4_k3.12.61_52.133-26.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.x86_64",
"product_id": "dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-xen-4.0.2_k3.12.61_52.133-22.5.1.x86_64",
"product": {
"name": "dlm-kmp-xen-4.0.2_k3.12.61_52.133-22.5.1.x86_64",
"product_id": "dlm-kmp-xen-4.0.2_k3.12.61_52.133-22.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-8.4.4.7-9.11.1.x86_64",
"product": {
"name": "drbd-8.4.4.7-9.11.1.x86_64",
"product_id": "drbd-8.4.4.7-9.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64",
"product": {
"name": "drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64",
"product_id": "drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-xen-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64",
"product": {
"name": "drbd-kmp-xen-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64",
"product_id": "drbd-kmp-xen-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.x86_64",
"product": {
"name": "gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.x86_64",
"product_id": "gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-xen-3.1.6_k3.12.61_52.133-22.5.1.x86_64",
"product": {
"name": "gfs2-kmp-xen-3.1.6_k3.12.61_52.133-22.5.1.x86_64",
"product_id": "gfs2-kmp-xen-3.1.6_k3.12.61_52.133-22.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.x86_64",
"product_id": "ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-xen-1.8.2_k3.12.61_52.133-22.5.1.x86_64",
"product": {
"name": "ocfs2-kmp-xen-1.8.2_k3.12.61_52.133-22.5.1.x86_64",
"product_id": "ocfs2-kmp-xen-1.8.2_k3.12.61_52.133-22.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.s390x"
},
"product_reference": "cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.x86_64"
},
"product_reference": "cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-xen-1.4_k3.12.61_52.133-26.4.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:cluster-network-kmp-xen-1.4_k3.12.61_52.133-26.4.1.x86_64"
},
"product_reference": "cluster-network-kmp-xen-1.4_k3.12.61_52.133-26.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.s390x"
},
"product_reference": "dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-xen-4.0.2_k3.12.61_52.133-22.5.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:dlm-kmp-xen-4.0.2_k3.12.61_52.133-22.5.1.x86_64"
},
"product_reference": "dlm-kmp-xen-4.0.2_k3.12.61_52.133-22.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.4.7-9.11.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:drbd-8.4.4.7-9.11.1.s390x"
},
"product_reference": "drbd-8.4.4.7-9.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.4.7-9.11.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:drbd-8.4.4.7-9.11.1.x86_64"
},
"product_reference": "drbd-8.4.4.7-9.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.s390x"
},
"product_reference": "drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64"
},
"product_reference": "drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-xen-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:drbd-kmp-xen-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64"
},
"product_reference": "drbd-kmp-xen-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.s390x"
},
"product_reference": "gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.x86_64"
},
"product_reference": "gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-xen-3.1.6_k3.12.61_52.133-22.5.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:gfs2-kmp-xen-3.1.6_k3.12.61_52.133-22.5.1.x86_64"
},
"product_reference": "gfs2-kmp-xen-3.1.6_k3.12.61_52.133-22.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.s390x"
},
"product_reference": "ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-xen-1.8.2_k3.12.61_52.133-22.5.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12",
"product_id": "SUSE Linux Enterprise High Availability Extension 12:ocfs2-kmp-xen-1.8.2_k3.12.61_52.133-22.5.1.x86_64"
},
"product_reference": "ocfs2-kmp-xen-1.8.2_k3.12.61_52.133-22.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12:cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:cluster-network-kmp-xen-1.4_k3.12.61_52.133-26.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:dlm-kmp-xen-4.0.2_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:drbd-8.4.4.7-9.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:drbd-8.4.4.7-9.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:drbd-kmp-xen-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:gfs2-kmp-xen-3.1.6_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:ocfs2-kmp-xen-1.8.2_k3.12.61_52.133-22.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12:cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:cluster-network-kmp-xen-1.4_k3.12.61_52.133-26.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:dlm-kmp-xen-4.0.2_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:drbd-8.4.4.7-9.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:drbd-8.4.4.7-9.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:drbd-kmp-xen-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:gfs2-kmp-xen-3.1.6_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:ocfs2-kmp-xen-1.8.2_k3.12.61_52.133-22.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12:cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:cluster-network-kmp-xen-1.4_k3.12.61_52.133-26.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:dlm-kmp-xen-4.0.2_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:drbd-8.4.4.7-9.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:drbd-8.4.4.7-9.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:drbd-kmp-xen-8.4.4.7_k3.12.61_52.133-9.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:gfs2-kmp-xen-3.1.6_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12:ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12:ocfs2-kmp-xen-1.8.2_k3.12.61_52.133-22.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-01T09:36:08Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:1822-1
Vulnerability from csaf_suse - Published: 2018-06-27 08:00 - Updated: 2018-06-27 08:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for gcc43",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for gcc43 fixes the following issues:\n\nThis update adds support for \u0027expolines\u0027 on s390x, allowing fixing CVE-2017-5715 in a more lightweight fashion. (bsc#1086069)\n\nThe option flags are the same as for the x86 retpolines.\n\nA compiler crash when building userland packages with x86 retpolines was fixed. (bsc#1092807)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slestso13-gcc43-13678",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1822-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1822-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181822-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1822-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004222.html"
},
{
"category": "self",
"summary": "SUSE Bug 1086069",
"url": "https://bugzilla.suse.com/1086069"
},
{
"category": "self",
"summary": "SUSE Bug 1092807",
"url": "https://bugzilla.suse.com/1092807"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for gcc43",
"tracking": {
"current_release_date": "2018-06-27T08:00:13Z",
"generator": {
"date": "2018-06-27T08:00:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1822-1",
"initial_release_date": "2018-06-27T08:00:13Z",
"revision_history": [
{
"date": "2018-06-27T08:00:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libffi43-4.3.4_20091019-24.8.1.s390x",
"product": {
"name": "libffi43-4.3.4_20091019-24.8.1.s390x",
"product_id": "libffi43-4.3.4_20091019-24.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libffi43-4.3.4_20091019-24.8.1.x86_64",
"product": {
"name": "libffi43-4.3.4_20091019-24.8.1.x86_64",
"product_id": "libffi43-4.3.4_20091019-24.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgfortran43-4.3.4_20091019-24.8.1.x86_64",
"product": {
"name": "libgfortran43-4.3.4_20091019-24.8.1.x86_64",
"product_id": "libgfortran43-4.3.4_20091019-24.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Studio Onsite 1.3",
"product": {
"name": "SUSE Studio Onsite 1.3",
"product_id": "SUSE Studio Onsite 1.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-studioonsite:1.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Studio Onsite Runner 1.3",
"product": {
"name": "SUSE Studio Onsite Runner 1.3",
"product_id": "SUSE Studio Onsite Runner 1.3"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libffi43-4.3.4_20091019-24.8.1.s390x as component of SUSE Studio Onsite 1.3",
"product_id": "SUSE Studio Onsite 1.3:libffi43-4.3.4_20091019-24.8.1.s390x"
},
"product_reference": "libffi43-4.3.4_20091019-24.8.1.s390x",
"relates_to_product_reference": "SUSE Studio Onsite 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libffi43-4.3.4_20091019-24.8.1.x86_64 as component of SUSE Studio Onsite 1.3",
"product_id": "SUSE Studio Onsite 1.3:libffi43-4.3.4_20091019-24.8.1.x86_64"
},
"product_reference": "libffi43-4.3.4_20091019-24.8.1.x86_64",
"relates_to_product_reference": "SUSE Studio Onsite 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgfortran43-4.3.4_20091019-24.8.1.x86_64 as component of SUSE Studio Onsite 1.3",
"product_id": "SUSE Studio Onsite 1.3:libgfortran43-4.3.4_20091019-24.8.1.x86_64"
},
"product_reference": "libgfortran43-4.3.4_20091019-24.8.1.x86_64",
"relates_to_product_reference": "SUSE Studio Onsite 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libffi43-4.3.4_20091019-24.8.1.s390x as component of SUSE Studio Onsite Runner 1.3",
"product_id": "SUSE Studio Onsite Runner 1.3:libffi43-4.3.4_20091019-24.8.1.s390x"
},
"product_reference": "libffi43-4.3.4_20091019-24.8.1.s390x",
"relates_to_product_reference": "SUSE Studio Onsite Runner 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libffi43-4.3.4_20091019-24.8.1.x86_64 as component of SUSE Studio Onsite Runner 1.3",
"product_id": "SUSE Studio Onsite Runner 1.3:libffi43-4.3.4_20091019-24.8.1.x86_64"
},
"product_reference": "libffi43-4.3.4_20091019-24.8.1.x86_64",
"relates_to_product_reference": "SUSE Studio Onsite Runner 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgfortran43-4.3.4_20091019-24.8.1.x86_64 as component of SUSE Studio Onsite Runner 1.3",
"product_id": "SUSE Studio Onsite Runner 1.3:libgfortran43-4.3.4_20091019-24.8.1.x86_64"
},
"product_reference": "libgfortran43-4.3.4_20091019-24.8.1.x86_64",
"relates_to_product_reference": "SUSE Studio Onsite Runner 1.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Studio Onsite 1.3:libffi43-4.3.4_20091019-24.8.1.s390x",
"SUSE Studio Onsite 1.3:libffi43-4.3.4_20091019-24.8.1.x86_64",
"SUSE Studio Onsite 1.3:libgfortran43-4.3.4_20091019-24.8.1.x86_64",
"SUSE Studio Onsite Runner 1.3:libffi43-4.3.4_20091019-24.8.1.s390x",
"SUSE Studio Onsite Runner 1.3:libffi43-4.3.4_20091019-24.8.1.x86_64",
"SUSE Studio Onsite Runner 1.3:libgfortran43-4.3.4_20091019-24.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Studio Onsite 1.3:libffi43-4.3.4_20091019-24.8.1.s390x",
"SUSE Studio Onsite 1.3:libffi43-4.3.4_20091019-24.8.1.x86_64",
"SUSE Studio Onsite 1.3:libgfortran43-4.3.4_20091019-24.8.1.x86_64",
"SUSE Studio Onsite Runner 1.3:libffi43-4.3.4_20091019-24.8.1.s390x",
"SUSE Studio Onsite Runner 1.3:libffi43-4.3.4_20091019-24.8.1.x86_64",
"SUSE Studio Onsite Runner 1.3:libgfortran43-4.3.4_20091019-24.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Studio Onsite 1.3:libffi43-4.3.4_20091019-24.8.1.s390x",
"SUSE Studio Onsite 1.3:libffi43-4.3.4_20091019-24.8.1.x86_64",
"SUSE Studio Onsite 1.3:libgfortran43-4.3.4_20091019-24.8.1.x86_64",
"SUSE Studio Onsite Runner 1.3:libffi43-4.3.4_20091019-24.8.1.s390x",
"SUSE Studio Onsite Runner 1.3:libffi43-4.3.4_20091019-24.8.1.x86_64",
"SUSE Studio Onsite Runner 1.3:libgfortran43-4.3.4_20091019-24.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-27T08:00:13Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:2528-1
Vulnerability from csaf_suse - Published: 2018-08-27 10:02 - Updated: 2018-08-27 10:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for xen fixes the following issues:\n\nThese security issue were fixed:\n\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution\n and address translations may have allowed unauthorized disclosure of\n information residing in the L1 data cache to an attacker with local user access\n with guest OS privilege via a terminal page fault and a side-channel analysis\n (bsc#1091107, bsc#1027519).\n- CVE-2018-12617: An integer overflow that could cause a segmentation\n fault in qmp_guest_file_read() with g_malloc() in qemu-guest-agent was\n fixed (bsc#1098744)\n- CVE-2018-3665: System software utilizing Lazy FP state restore technique\n on systems using Intel Core-based microprocessors may potentially allow\n a local process to infer data from another process through a speculative\n execution side channel. (bsc#1095242)\n- CVE-2018-3639: Systems with microprocessors utilizing speculative\n execution and speculative execution of memory reads before the addresses\n of all prior memory writes are known may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis, aka Speculative Store Bypass (SSB), Variant 4. (bsc#1092631)\n- CVE-2017-5715: Systems with microprocessors utilizing speculative\n execution and indirect branch prediction may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis. (bsc#1074562)\n- CVE-2017-5753: Systems with microprocessors utilizing speculative\n execution and branch prediction may allow unauthorized disclosure of\n information to an attacker with local user access via a side-channel\n analysis. (bsc#1074562)\n- CVE-2017-5754: Systems with microprocessors utilizing speculative\n execution and indirect branch prediction may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis of the data cache. (bsc#1074562)\n- CVE-2018-12891: Certain PV MMU operations may take a long time to\n process. For that reason Xen explicitly checks for the need to preempt\n the current vCPU at certain points. A few rarely taken code paths did\n bypass such checks. By suitably enforcing the conditions through its own\n page table contents, a malicious guest may cause such bypasses to be used\n for an unbounded number of iterations. A malicious or buggy PV guest may\n cause a Denial of Service (DoS) affecting the entire host. Specifically,\n it may prevent use of a physical CPU for an indeterminate period of\n time. (bsc#1097521)\n- CVE-2018-12893: One of the fixes in XSA-260 added some safety checks\n to help prevent Xen livelocking with debug exceptions. Unfortunately,\n due to an oversight, at least one of these safety checks can be\n triggered by a guest. A malicious PV guest can crash Xen, leading to\n a Denial of Service. Only x86 PV guests can exploit the vulnerability. x86\n HVM and PVH guests cannot exploit the vulnerability. An attacker\n needs to be able to control hardware debugging facilities to exploit\n the vulnerability, but such permissions are typically available to\n unprivileged users. (bsc#1097522)\n- CVE-2018-11806: m_cat in slirp/mbuf.c in Qemu has a heap-based buffer\n overflow via incoming fragmented datagrams. (bsc#1096224)\n- CVE-2018-10982: An issue was discovered in Xen allowed x86 HVM guest\n OS users to cause a denial of service (unexpectedly high interrupt\n number, array overrun, and hypervisor crash) or possibly gain hypervisor\n privileges by setting up an HPET timer to deliver interrupts in IO-APIC\n mode, aka vHPET interrupt injection. (bsc#1090822)\n- CVE-2018-10981: An issue was discovered in Xen that allowed x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request. (bsc#1090823)\n\nFollowing bugs were fixed:\n\n- After updating to kernel 3.0.101-0.47.106.32-xen system crashes in check_bugs() (bsc#1097206)\n- bsc#1079730 - in xen-kmp, unplug emulated devices after migration\n This is required since xen-4.10 and/or qemu-2.10 because the state\n of unplug is not propagated from one dom0 to another. Without\n this unplug qemu\u0027s block-backend will be unable to open qcow2\n disks on the receiving dom0\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-xen-13752,slessp3-xen-13752",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2528-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2528-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182528-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2528-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1079730",
"url": "https://bugzilla.suse.com/1079730"
},
{
"category": "self",
"summary": "SUSE Bug 1090822",
"url": "https://bugzilla.suse.com/1090822"
},
{
"category": "self",
"summary": "SUSE Bug 1090823",
"url": "https://bugzilla.suse.com/1090823"
},
{
"category": "self",
"summary": "SUSE Bug 1091107",
"url": "https://bugzilla.suse.com/1091107"
},
{
"category": "self",
"summary": "SUSE Bug 1092631",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "self",
"summary": "SUSE Bug 1095242",
"url": "https://bugzilla.suse.com/1095242"
},
{
"category": "self",
"summary": "SUSE Bug 1096224",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "self",
"summary": "SUSE Bug 1097206",
"url": "https://bugzilla.suse.com/1097206"
},
{
"category": "self",
"summary": "SUSE Bug 1097521",
"url": "https://bugzilla.suse.com/1097521"
},
{
"category": "self",
"summary": "SUSE Bug 1097522",
"url": "https://bugzilla.suse.com/1097522"
},
{
"category": "self",
"summary": "SUSE Bug 1098744",
"url": "https://bugzilla.suse.com/1098744"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10981 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10982 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11806 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12617 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12891 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12891/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12893 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3665 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3665/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-08-27T10:02:13Z",
"generator": {
"date": "2018-08-27T10:02:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2528-1",
"initial_release_date": "2018-08-27T10:02:13Z",
"revision_history": [
{
"date": "2018-08-27T10:02:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"product": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586"
}
},
{
"category": "product_version",
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"product": {
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"product_id": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.2.5_21-45.25.1.i586",
"product": {
"name": "xen-libs-4.2.5_21-45.25.1.i586",
"product_id": "xen-libs-4.2.5_21-45.25.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.2.5_21-45.25.1.i586",
"product": {
"name": "xen-tools-domU-4.2.5_21-45.25.1.i586",
"product_id": "xen-tools-domU-4.2.5_21-45.25.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.2.5_21-45.25.1.x86_64",
"product": {
"name": "xen-4.2.5_21-45.25.1.x86_64",
"product_id": "xen-4.2.5_21-45.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.2.5_21-45.25.1.x86_64",
"product": {
"name": "xen-doc-html-4.2.5_21-45.25.1.x86_64",
"product_id": "xen-doc-html-4.2.5_21-45.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"product": {
"name": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"product_id": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"product": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.2.5_21-45.25.1.x86_64",
"product": {
"name": "xen-libs-4.2.5_21-45.25.1.x86_64",
"product_id": "xen-libs-4.2.5_21-45.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"product_id": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.2.5_21-45.25.1.x86_64",
"product": {
"name": "xen-tools-4.2.5_21-45.25.1.x86_64",
"product_id": "xen-tools-4.2.5_21-45.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.2.5_21-45.25.1.x86_64",
"product": {
"name": "xen-tools-domU-4.2.5_21-45.25.1.x86_64",
"product_id": "xen-tools-domU-4.2.5_21-45.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586"
},
"product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-45.25.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586"
},
"product_reference": "xen-libs-4.2.5_21-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-45.25.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586"
},
"product_reference": "xen-tools-domU-4.2.5_21-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64"
},
"product_reference": "xen-4.2.5_21-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64"
},
"product_reference": "xen-doc-html-4.2.5_21-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64"
},
"product_reference": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586"
},
"product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-45.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586"
},
"product_reference": "xen-libs-4.2.5_21-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64"
},
"product_reference": "xen-libs-4.2.5_21-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64"
},
"product_reference": "xen-tools-4.2.5_21-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-45.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586"
},
"product_reference": "xen-tools-domU-4.2.5_21-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
},
"product_reference": "xen-tools-domU-4.2.5_21-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-10981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10981"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10981",
"url": "https://www.suse.com/security/cve/CVE-2018-10981"
},
{
"category": "external",
"summary": "SUSE Bug 1090823 for CVE-2018-10981",
"url": "https://bugzilla.suse.com/1090823"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-10981",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "moderate"
}
],
"title": "CVE-2018-10981"
},
{
"cve": "CVE-2018-10982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10982"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10982",
"url": "https://www.suse.com/security/cve/CVE-2018-10982"
},
{
"category": "external",
"summary": "SUSE Bug 1090822 for CVE-2018-10982",
"url": "https://bugzilla.suse.com/1090822"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-10982",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "important"
}
],
"title": "CVE-2018-10982"
},
{
"cve": "CVE-2018-11806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11806"
}
],
"notes": [
{
"category": "general",
"text": "m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11806",
"url": "https://www.suse.com/security/cve/CVE-2018-11806"
},
{
"category": "external",
"summary": "SUSE Bug 1096223 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "external",
"summary": "SUSE Bug 1096224 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "moderate"
}
],
"title": "CVE-2018-11806"
},
{
"cve": "CVE-2018-12617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12617"
}
],
"notes": [
{
"category": "general",
"text": "qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12617",
"url": "https://www.suse.com/security/cve/CVE-2018-12617"
},
{
"category": "external",
"summary": "SUSE Bug 1098735 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "external",
"summary": "SUSE Bug 1098744 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "moderate"
}
],
"title": "CVE-2018-12617"
},
{
"cve": "CVE-2018-12891",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12891"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing the conditions through its own page table contents, a malicious guest may cause such bypasses to be used for an unbounded number of iterations. A malicious or buggy PV guest may cause a Denial of Service (DoS) affecting the entire host. Specifically, it may prevent use of a physical CPU for an indeterminate period of time. All Xen versions from 3.4 onwards are vulnerable. Xen versions 3.3 and earlier are vulnerable to an even wider class of attacks, due to them lacking preemption checks altogether in the affected code paths. Only x86 systems are affected. ARM systems are not affected. Only multi-vCPU x86 PV guests can leverage the vulnerability. x86 HVM or PVH guests as well as x86 single-vCPU PV ones cannot leverage the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12891",
"url": "https://www.suse.com/security/cve/CVE-2018-12891"
},
{
"category": "external",
"summary": "SUSE Bug 1097521 for CVE-2018-12891",
"url": "https://bugzilla.suse.com/1097521"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12891",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "important"
}
],
"title": "CVE-2018-12891"
},
{
"cve": "CVE-2018-12893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12893"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can crash Xen, leading to a Denial of Service. All Xen systems which have applied the XSA-260 fix are vulnerable. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only x86 PV guests can exploit the vulnerability. x86 HVM and PVH guests cannot exploit the vulnerability. An attacker needs to be able to control hardware debugging facilities to exploit the vulnerability, but such permissions are typically available to unprivileged users.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12893",
"url": "https://www.suse.com/security/cve/CVE-2018-12893"
},
{
"category": "external",
"summary": "SUSE Bug 1097522 for CVE-2018-12893",
"url": "https://bugzilla.suse.com/1097522"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12893",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "important"
}
],
"title": "CVE-2018-12893"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3646"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3646",
"url": "https://www.suse.com/security/cve/CVE-2018-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087081 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1087081"
},
{
"category": "external",
"summary": "SUSE Bug 1089343 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1089343"
},
{
"category": "external",
"summary": "SUSE Bug 1091107 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1091107"
},
{
"category": "external",
"summary": "SUSE Bug 1099306 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1099306"
},
{
"category": "external",
"summary": "SUSE Bug 1104365 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1104365"
},
{
"category": "external",
"summary": "SUSE Bug 1104894 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1104894"
},
{
"category": "external",
"summary": "SUSE Bug 1106548 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1106548"
},
{
"category": "external",
"summary": "SUSE Bug 1113534 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1113534"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "important"
}
],
"title": "CVE-2018-3646"
},
{
"cve": "CVE-2018-3665",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3665"
}
],
"notes": [
{
"category": "general",
"text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3665",
"url": "https://www.suse.com/security/cve/CVE-2018-3665"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1087086 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087086"
},
{
"category": "external",
"summary": "SUSE Bug 1090338 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1090338"
},
{
"category": "external",
"summary": "SUSE Bug 1095241 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1095241"
},
{
"category": "external",
"summary": "SUSE Bug 1095242 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1095242"
},
{
"category": "external",
"summary": "SUSE Bug 1096740 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1096740"
},
{
"category": "external",
"summary": "SUSE Bug 1100091 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1100091"
},
{
"category": "external",
"summary": "SUSE Bug 1100555 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1100555"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "moderate"
}
],
"title": "CVE-2018-3665"
}
]
}
SUSE-SU-2018:0171-1
Vulnerability from csaf_suse - Published: 2018-01-22 11:02 - Updated: 2018-01-22 11:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThis update is only provided as a fix update for IBM Z platform.\n\n- CVE-2017-5753 / \u0027Spectre Attack\u0027: IBM Z fixes were included but not enabled in the previous update. This update enables those fixes.\n- CVE-2017-5715 / \u0027Spectre Attack\u0027: IBM Z fixes were already included in the previous update. A bugfix for the patches has been applied on top.\n- CVE-2017-5754: The IBM Z architecture is not affected by the \u0027Meltdown\u0027 attack.\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slessp3-kernel-20180111-13427,slexsp3-kernel-20180111-13427",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0171-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0171-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180171-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0171-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003616.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-01-22T11:02:03Z",
"generator": {
"date": "2018-01-22T11:02:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0171-1",
"initial_release_date": "2018-01-22T11:02:03Z",
"revision_history": [
{
"date": "2018-01-22T11:02:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.106.14.1.s390x",
"product": {
"name": "kernel-default-3.0.101-0.47.106.14.1.s390x",
"product_id": "kernel-default-3.0.101-0.47.106.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.106.14.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-0.47.106.14.1.s390x",
"product_id": "kernel-default-base-3.0.101-0.47.106.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.106.14.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.106.14.1.s390x",
"product_id": "kernel-default-devel-3.0.101-0.47.106.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-0.47.106.14.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-0.47.106.14.1.s390x",
"product_id": "kernel-default-man-3.0.101-0.47.106.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.106.14.1.s390x",
"product": {
"name": "kernel-source-3.0.101-0.47.106.14.1.s390x",
"product_id": "kernel-source-3.0.101-0.47.106.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.106.14.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-0.47.106.14.1.s390x",
"product_id": "kernel-syms-3.0.101-0.47.106.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.106.14.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-0.47.106.14.1.s390x",
"product_id": "kernel-trace-3.0.101-0.47.106.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.106.14.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.106.14.1.s390x",
"product_id": "kernel-trace-base-3.0.101-0.47.106.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.106.14.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.106.14.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-0.47.106.14.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.14.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.14.1.s390x"
},
"product_reference": "kernel-default-3.0.101-0.47.106.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.14.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.14.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.14.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.14.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-0.47.106.14.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.14.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-0.47.106.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.14.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.14.1.s390x"
},
"product_reference": "kernel-source-3.0.101-0.47.106.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.14.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.14.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.14.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.14.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.14.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.14.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.14.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.14.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.14.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.14.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.14.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-22T11:02:03Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.14.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.14.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.14.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-22T11:02:03Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
}
]
}
SUSE-SU-2018:0552-1
Vulnerability from csaf_suse - Published: 2018-03-08 13:47 - Updated: 2018-03-08 13:47Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for SUSE Manager Server 3.1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\nnutch:\n\n- Fix hadoop log dir. (bsc#1061574)\n\nosad, rhnlib:\n\n- Fix update mechanism when updating the updateservice (bsc#1073619)\n\npxe-default-image:\n\n- Spectre and Meltdown mitigation. (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754, bsc#1068032)\n\nspacecmd:\n\n- Support multiple FQDNs per system. (bsc#1063419)\n- Added custom JSON encoder in order to parse date fields correctly. (bsc#1070372)\n\nspacewalk-backend:\n\n- Fix spacewalk-data-fsck restore of broken package database entry. (bsc#1071526)\n- Support multiple FQDNs per system. (bsc#1063419)\n- Fix restore hostname and ip*addr in templated documents. (bsc#1075044)\n- Fix directory name in spacewalk-data-fsck.\n\nspacewalk-branding:\n\n- Replace custom states with configuration channels.\n- Fix pre formatted code. (bsc#1067608)\n- Fix message about package profile sync. (bsc#1073739)\n- Fix naming of the Tools channel. (bsc#979633)\n\nspacewalk-client-tools:\n\n- Support multiple FQDNs per system. (bsc#1063419)\n- Fix update mechanism when updating the updateservice. (bsc#1073619)\n\nspacewalk-java:\n\n- Fix the file count for deployed files. (bsc#1074300)\n- Remove previous activation keys when migrating to salt. (bsc#1031081)\n- Improve webui for comparing files. (bsc#1076201)\n- Separate Salt calls based on config revisions and server grouping. (bsc#1074854)\n- For minion, no option to modifiy config file but just view.\n- Handle gpg_check correctly. (bsc#1076578)\n- Uniform date formatting in System Details view. (bsc#1045289)\n- Import content of custom states from filesystem to database on startup, backup old state files.\n- Change the directory of the (normal) configuration channels from mgr_cfg_org_N to manager_org_N.\n- Replace custom states with configuration channels.\n- Hide ownership/permission fields from create/upload config file forms for state channels. (bsc#1072153)\n- Hide files from state channels from deploy/compare file lists. (bsc#1072160)\n- Disable and hide deploy files tab for state config channels. (bsc#1072157)\n- Allow ordering config channels in state revision.\n- Disallow creating \u0027normal\u0027 config channels when a \u0027state\u0027 channel with the same name and org already exists and\n vice versa.\n- UI has been updated to manage state channels.\n- Support multiple FQDNs per system. (bsc#1063419)\n- Setting \u0027Base Channels\u0027 as default tab for \u0027Channels\u0027 tab in SSM Overview screen. (bsc#979616)\n- Log triggers that are in ERROR state.\n- Refresh pillar data on formular change. (bsc#1028285)\n- Uniform the notification message when rebooting a system. (bsc#1036302)\n- Avoid use of the potentially-slow rhnServerNeededPackageCache view.\n- Speed up scheduling of package updates through the SSM. (bsc#1076034)\n- Fix encoding/decoding of url_bounce with more parameters. (bsc#1075408)\n- After dry-run, sync channels back with the server. (bsc#1071468)\n- Fix message about package profile sync. (bsc#1073739)\n- On registration, assign server to the organization of the creator when activation key is empty. (bsc#1016377)\n- Fix logging issues when saving autoyast profiles. (bsc#1073474)\n- Add VM state as info gathered from VMware. (bsc#1063759)\n- Improve performance of token checking, when RPMs or metadata are downloaded from minions. (bsc#1061273)\n- Allow selecting unnamed context in kubeconfig. (bsc#1073482)\n- Fix action names and date formatting in system event history. (bsc#1073713)\n- Fix incorrect \u0027os-release\u0027 report after SP migration. (bsc#1071553)\n- Fix failed package installation when in RES 32 and 64 bit packages are installed together. (bsc#1071314)\n- Add user preferences in order to change items-per-page. (bsc#1055296)\n- Order salt formulas alphabetically. (bsc#1022077)\n- Improved error message. (bsc#1064258)\n- Display messages about wrong input more end-user friendly. (bsc#1015956)\n- Add api calls for content staging.\n- Fix content refresh when product keys change. (bsc#1069943)\n- Allow \u0027Package List Refresh\u0027 when package arch has changed. (bsc#1065259)\n- New API call for scheduling highstate application.\n- Adding initial version of web ui notifications.\n- Show the time on the event history page in the users preferred timezone.\n\nspacewalk-reports, spacewalk-search:\n\n- More rhnServerNetwork refactoring (bsc#1063419)\n\nspacewalk-utils:\n\n- Remove restrictions imposed on regex used in \u0027removelist\u0027 parameter passed to spacewalk-clone-by-date that allowed\n only exact match. (bsc#1075254)\n\nspacewalk-web:\n\n- Replace custom states with configuration channels.\n- Add \u0027yaml\u0027 option for Ace editor.\n- Add links to salt formula list and adjust behavior. (bsc#1022078)\n- Allow selecting unnamed context in kubeconfig. (bsc#1073482)\n- Add user preferences in order to change items-per-page. (bsc#1055296)\n- Fix main menu column height.\n- Adding initial version of web ui notifications.\n\nsusemanager:\n\n- Fix custom SERVER_KEY overriding. (bsc#1075862)\n- Detect subvolumes on /var even with newer btrfs tools. (bsc#1077076)\n- Notify admin that database backups need reconfiguration after db upgrade.\n- Add syslinux-x86_64 dependency for ppc64le. (bsc#1065023)\n- Do not try to force db encoding on db upgrade; use same value as for installation. (bsc#1077730)\n\nsusemanager-schema:\n\n- Make migration idempotent. (bsc#1078749)\n- Fix schema with proper extension. (bsc#1079820)\n- Migrate old custom states to state channels, assign systems to these new channels, delete old custom-state-to-system\n assignments, delete the custom states from the db; Before migrating, rename custom states with same name as existing\n configuration channel labels.\n- Update queries for global channels.\n- Check if channel is already subscribed even before checking if parent channel is subscribed or not. (bsc#1072797)\n- Support multiple FQDNs per system. (bsc#1063419)\n- Avoid use of the potentially-slow rhnServerNeededPackageCache view.\n- Handle duplicate serverpackage entries while fixing duplicate evr ids. (bsc#1075345)\n- Fix duplicate entries in channel listings.\n- Handle nevra not found case while fixing duplicate evr ids. (bsc#1074508)\n- Added a script which will remove existing server locks against minions. (bsc#1064258)\n- Add column to store the \u0027test\u0027 option for state apply actions.\n- Adding initial version of web ui notifications.\n\nsusemanager-sls:\n\n- Compare osmajorrelease in jinja always as integer.\n- Python3 compatibility fixes in modules and states.\n- Fix cleanup state error when deleting ssh-push minion. (bsc#1070161)\n- Fix image inspect when entrypoint is used by overwriting it. (bsc#1070782)\n\nsusemanager-sync-data:\n\n- Use TLS for mirroring OES2018 channels. (bsc#1074430)\n- Add SUSE Manager Server 3.0 and 3.1 channels for mirroring.\n\nvirtual-host-gatherer:\n\n- Add VM state as info gathered from VMware. (bsc#1063759)\n- Explore the entire tree of nodes from VMware. (bsc#1070597)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SUSE-Manager-Server-3.1-2018-361",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0552-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0552-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180552-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0552-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html"
},
{
"category": "self",
"summary": "SUSE Bug 1015956",
"url": "https://bugzilla.suse.com/1015956"
},
{
"category": "self",
"summary": "SUSE Bug 1016377",
"url": "https://bugzilla.suse.com/1016377"
},
{
"category": "self",
"summary": "SUSE Bug 1022077",
"url": "https://bugzilla.suse.com/1022077"
},
{
"category": "self",
"summary": "SUSE Bug 1022078",
"url": "https://bugzilla.suse.com/1022078"
},
{
"category": "self",
"summary": "SUSE Bug 1028285",
"url": "https://bugzilla.suse.com/1028285"
},
{
"category": "self",
"summary": "SUSE Bug 1031081",
"url": "https://bugzilla.suse.com/1031081"
},
{
"category": "self",
"summary": "SUSE Bug 1036302",
"url": "https://bugzilla.suse.com/1036302"
},
{
"category": "self",
"summary": "SUSE Bug 1045289",
"url": "https://bugzilla.suse.com/1045289"
},
{
"category": "self",
"summary": "SUSE Bug 1055296",
"url": "https://bugzilla.suse.com/1055296"
},
{
"category": "self",
"summary": "SUSE Bug 1061273",
"url": "https://bugzilla.suse.com/1061273"
},
{
"category": "self",
"summary": "SUSE Bug 1061574",
"url": "https://bugzilla.suse.com/1061574"
},
{
"category": "self",
"summary": "SUSE Bug 1063419",
"url": "https://bugzilla.suse.com/1063419"
},
{
"category": "self",
"summary": "SUSE Bug 1063759",
"url": "https://bugzilla.suse.com/1063759"
},
{
"category": "self",
"summary": "SUSE Bug 1064258",
"url": "https://bugzilla.suse.com/1064258"
},
{
"category": "self",
"summary": "SUSE Bug 1065023",
"url": "https://bugzilla.suse.com/1065023"
},
{
"category": "self",
"summary": "SUSE Bug 1065259",
"url": "https://bugzilla.suse.com/1065259"
},
{
"category": "self",
"summary": "SUSE Bug 1067608",
"url": "https://bugzilla.suse.com/1067608"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1069943",
"url": "https://bugzilla.suse.com/1069943"
},
{
"category": "self",
"summary": "SUSE Bug 1070161",
"url": "https://bugzilla.suse.com/1070161"
},
{
"category": "self",
"summary": "SUSE Bug 1070372",
"url": "https://bugzilla.suse.com/1070372"
},
{
"category": "self",
"summary": "SUSE Bug 1070597",
"url": "https://bugzilla.suse.com/1070597"
},
{
"category": "self",
"summary": "SUSE Bug 1070782",
"url": "https://bugzilla.suse.com/1070782"
},
{
"category": "self",
"summary": "SUSE Bug 1071314",
"url": "https://bugzilla.suse.com/1071314"
},
{
"category": "self",
"summary": "SUSE Bug 1071468",
"url": "https://bugzilla.suse.com/1071468"
},
{
"category": "self",
"summary": "SUSE Bug 1071526",
"url": "https://bugzilla.suse.com/1071526"
},
{
"category": "self",
"summary": "SUSE Bug 1071553",
"url": "https://bugzilla.suse.com/1071553"
},
{
"category": "self",
"summary": "SUSE Bug 1072153",
"url": "https://bugzilla.suse.com/1072153"
},
{
"category": "self",
"summary": "SUSE Bug 1072157",
"url": "https://bugzilla.suse.com/1072157"
},
{
"category": "self",
"summary": "SUSE Bug 1072160",
"url": "https://bugzilla.suse.com/1072160"
},
{
"category": "self",
"summary": "SUSE Bug 1072797",
"url": "https://bugzilla.suse.com/1072797"
},
{
"category": "self",
"summary": "SUSE Bug 1073474",
"url": "https://bugzilla.suse.com/1073474"
},
{
"category": "self",
"summary": "SUSE Bug 1073482",
"url": "https://bugzilla.suse.com/1073482"
},
{
"category": "self",
"summary": "SUSE Bug 1073619",
"url": "https://bugzilla.suse.com/1073619"
},
{
"category": "self",
"summary": "SUSE Bug 1073713",
"url": "https://bugzilla.suse.com/1073713"
},
{
"category": "self",
"summary": "SUSE Bug 1073739",
"url": "https://bugzilla.suse.com/1073739"
},
{
"category": "self",
"summary": "SUSE Bug 1074300",
"url": "https://bugzilla.suse.com/1074300"
},
{
"category": "self",
"summary": "SUSE Bug 1074430",
"url": "https://bugzilla.suse.com/1074430"
},
{
"category": "self",
"summary": "SUSE Bug 1074508",
"url": "https://bugzilla.suse.com/1074508"
},
{
"category": "self",
"summary": "SUSE Bug 1074854",
"url": "https://bugzilla.suse.com/1074854"
},
{
"category": "self",
"summary": "SUSE Bug 1075044",
"url": "https://bugzilla.suse.com/1075044"
},
{
"category": "self",
"summary": "SUSE Bug 1075254",
"url": "https://bugzilla.suse.com/1075254"
},
{
"category": "self",
"summary": "SUSE Bug 1075345",
"url": "https://bugzilla.suse.com/1075345"
},
{
"category": "self",
"summary": "SUSE Bug 1075408",
"url": "https://bugzilla.suse.com/1075408"
},
{
"category": "self",
"summary": "SUSE Bug 1075862",
"url": "https://bugzilla.suse.com/1075862"
},
{
"category": "self",
"summary": "SUSE Bug 1076034",
"url": "https://bugzilla.suse.com/1076034"
},
{
"category": "self",
"summary": "SUSE Bug 1076201",
"url": "https://bugzilla.suse.com/1076201"
},
{
"category": "self",
"summary": "SUSE Bug 1076578",
"url": "https://bugzilla.suse.com/1076578"
},
{
"category": "self",
"summary": "SUSE Bug 1077076",
"url": "https://bugzilla.suse.com/1077076"
},
{
"category": "self",
"summary": "SUSE Bug 1077730",
"url": "https://bugzilla.suse.com/1077730"
},
{
"category": "self",
"summary": "SUSE Bug 1078749",
"url": "https://bugzilla.suse.com/1078749"
},
{
"category": "self",
"summary": "SUSE Bug 1079820",
"url": "https://bugzilla.suse.com/1079820"
},
{
"category": "self",
"summary": "SUSE Bug 979616",
"url": "https://bugzilla.suse.com/979616"
},
{
"category": "self",
"summary": "SUSE Bug 979633",
"url": "https://bugzilla.suse.com/979633"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
}
],
"title": "Security update for SUSE Manager Server 3.1",
"tracking": {
"current_release_date": "2018-03-08T13:47:54Z",
"generator": {
"date": "2018-03-08T13:47:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0552-1",
"initial_release_date": "2018-03-08T13:47:54Z",
"revision_history": [
{
"date": "2018-03-08T13:47:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nutch-1.0-0.9.6.2.noarch",
"product": {
"name": "nutch-1.0-0.9.6.2.noarch",
"product_id": "nutch-1.0-0.9.6.2.noarch"
}
},
{
"category": "product_version",
"name": "osa-common-5.11.80.5-2.9.2.noarch",
"product": {
"name": "osa-common-5.11.80.5-2.9.2.noarch",
"product_id": "osa-common-5.11.80.5-2.9.2.noarch"
}
},
{
"category": "product_version",
"name": "osa-dispatcher-5.11.80.5-2.9.2.noarch",
"product": {
"name": "osa-dispatcher-5.11.80.5-2.9.2.noarch",
"product_id": "osa-dispatcher-5.11.80.5-2.9.2.noarch"
}
},
{
"category": "product_version",
"name": "pxe-default-image-3.1-0.13.3.3.noarch",
"product": {
"name": "pxe-default-image-3.1-0.13.3.3.noarch",
"product_id": "pxe-default-image-3.1-0.13.3.3.noarch"
}
},
{
"category": "product_version",
"name": "rhnlib-2.7.2.2-3.3.2.noarch",
"product": {
"name": "rhnlib-2.7.2.2-3.3.2.noarch",
"product_id": "rhnlib-2.7.2.2-3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-2.7.8.9-2.12.2.noarch",
"product": {
"name": "spacecmd-2.7.8.9-2.12.2.noarch",
"product_id": "spacecmd-2.7.8.9-2.12.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-app-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-applet-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-iss-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-libs-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-server-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-sql-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-tools-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-base-2.7.1.14-2.12.3.noarch",
"product": {
"name": "spacewalk-base-2.7.1.14-2.12.3.noarch",
"product_id": "spacewalk-base-2.7.1.14-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"product": {
"name": "spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"product_id": "spacewalk-base-minimal-2.7.1.14-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"product": {
"name": "spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"product_id": "spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"product": {
"name": "spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"product_id": "spacewalk-client-tools-2.7.6.3-3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-html-2.7.1.14-2.12.3.noarch",
"product": {
"name": "spacewalk-html-2.7.1.14-2.12.3.noarch",
"product_id": "spacewalk-html-2.7.1.14-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-2.7.46.10-2.14.2.noarch",
"product": {
"name": "spacewalk-java-2.7.46.10-2.14.2.noarch",
"product_id": "spacewalk-java-2.7.46.10-2.14.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"product": {
"name": "spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"product_id": "spacewalk-java-config-2.7.46.10-2.14.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"product": {
"name": "spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"product_id": "spacewalk-java-lib-2.7.46.10-2.14.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"product": {
"name": "spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"product_id": "spacewalk-java-oracle-2.7.46.10-2.14.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"product": {
"name": "spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"product_id": "spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-reports-2.7.5.4-2.6.3.noarch",
"product": {
"name": "spacewalk-reports-2.7.5.4-2.6.3.noarch",
"product_id": "spacewalk-reports-2.7.5.4-2.6.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-search-2.7.3.4-2.9.7.noarch",
"product": {
"name": "spacewalk-search-2.7.3.4-2.9.7.noarch",
"product_id": "spacewalk-search-2.7.3.4-2.9.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"product": {
"name": "spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"product_id": "spacewalk-taskomatic-2.7.46.10-2.14.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-utils-2.7.10.6-2.6.3.noarch",
"product": {
"name": "spacewalk-utils-2.7.10.6-2.6.3.noarch",
"product_id": "spacewalk-utils-2.7.10.6-2.6.3.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-schema-3.1.15-2.16.1.noarch",
"product": {
"name": "susemanager-schema-3.1.15-2.16.1.noarch",
"product_id": "susemanager-schema-3.1.15-2.16.1.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-sls-3.1.15-2.16.2.noarch",
"product": {
"name": "susemanager-sls-3.1.15-2.16.2.noarch",
"product_id": "susemanager-sls-3.1.15-2.16.2.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-sync-data-3.1.10-2.14.2.noarch",
"product": {
"name": "susemanager-sync-data-3.1.10-2.14.2.noarch",
"product_id": "susemanager-sync-data-3.1.10-2.14.2.noarch"
}
},
{
"category": "product_version",
"name": "virtual-host-gatherer-1.0.16-2.9.3.noarch",
"product": {
"name": "virtual-host-gatherer-1.0.16-2.9.3.noarch",
"product_id": "virtual-host-gatherer-1.0.16-2.9.3.noarch"
}
},
{
"category": "product_version",
"name": "virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"product": {
"name": "virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"product_id": "virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch"
}
},
{
"category": "product_version",
"name": "virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch",
"product": {
"name": "virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch",
"product_id": "virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"product": {
"name": "spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"product_id": "spacewalk-branding-2.7.2.11-2.12.6.ppc64le"
}
},
{
"category": "product_version",
"name": "susemanager-3.1.12-2.12.3.ppc64le",
"product": {
"name": "susemanager-3.1.12-2.12.3.ppc64le",
"product_id": "susemanager-3.1.12-2.12.3.ppc64le"
}
},
{
"category": "product_version",
"name": "susemanager-tools-3.1.12-2.12.3.ppc64le",
"product": {
"name": "susemanager-tools-3.1.12-2.12.3.ppc64le",
"product_id": "susemanager-tools-3.1.12-2.12.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "spacewalk-branding-2.7.2.11-2.12.6.s390x",
"product": {
"name": "spacewalk-branding-2.7.2.11-2.12.6.s390x",
"product_id": "spacewalk-branding-2.7.2.11-2.12.6.s390x"
}
},
{
"category": "product_version",
"name": "susemanager-3.1.12-2.12.3.s390x",
"product": {
"name": "susemanager-3.1.12-2.12.3.s390x",
"product_id": "susemanager-3.1.12-2.12.3.s390x"
}
},
{
"category": "product_version",
"name": "susemanager-tools-3.1.12-2.12.3.s390x",
"product": {
"name": "susemanager-tools-3.1.12-2.12.3.s390x",
"product_id": "susemanager-tools-3.1.12-2.12.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"product": {
"name": "spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"product_id": "spacewalk-branding-2.7.2.11-2.12.6.x86_64"
}
},
{
"category": "product_version",
"name": "susemanager-3.1.12-2.12.3.x86_64",
"product": {
"name": "susemanager-3.1.12-2.12.3.x86_64",
"product_id": "susemanager-3.1.12-2.12.3.x86_64"
}
},
{
"category": "product_version",
"name": "susemanager-tools-3.1.12-2.12.3.x86_64",
"product": {
"name": "susemanager-tools-3.1.12-2.12.3.x86_64",
"product_id": "susemanager-tools-3.1.12-2.12.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Server 3.1",
"product": {
"name": "SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:3.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nutch-1.0-0.9.6.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch"
},
"product_reference": "nutch-1.0-0.9.6.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osa-common-5.11.80.5-2.9.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch"
},
"product_reference": "osa-common-5.11.80.5-2.9.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osa-dispatcher-5.11.80.5-2.9.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch"
},
"product_reference": "osa-dispatcher-5.11.80.5-2.9.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pxe-default-image-3.1-0.13.3.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch"
},
"product_reference": "pxe-default-image-3.1-0.13.3.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhnlib-2.7.2.2-3.3.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch"
},
"product_reference": "rhnlib-2.7.2.2-3.3.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-2.7.8.9-2.12.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch"
},
"product_reference": "spacecmd-2.7.8.9-2.12.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-app-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-applet-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-iss-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-libs-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-server-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-sql-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-tools-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-2.7.1.14-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch"
},
"product_reference": "spacewalk-base-2.7.1.14-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-minimal-2.7.1.14-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch"
},
"product_reference": "spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch"
},
"product_reference": "spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-branding-2.7.2.11-2.12.6.ppc64le as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le"
},
"product_reference": "spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-branding-2.7.2.11-2.12.6.s390x as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x"
},
"product_reference": "spacewalk-branding-2.7.2.11-2.12.6.s390x",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-branding-2.7.2.11-2.12.6.x86_64 as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64"
},
"product_reference": "spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-client-tools-2.7.6.3-3.3.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch"
},
"product_reference": "spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-html-2.7.1.14-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch"
},
"product_reference": "spacewalk-html-2.7.1.14-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-2.7.46.10-2.14.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch"
},
"product_reference": "spacewalk-java-2.7.46.10-2.14.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-config-2.7.46.10-2.14.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch"
},
"product_reference": "spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-lib-2.7.46.10-2.14.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch"
},
"product_reference": "spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-oracle-2.7.46.10-2.14.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch"
},
"product_reference": "spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch"
},
"product_reference": "spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-reports-2.7.5.4-2.6.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch"
},
"product_reference": "spacewalk-reports-2.7.5.4-2.6.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-search-2.7.3.4-2.9.7.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch"
},
"product_reference": "spacewalk-search-2.7.3.4-2.9.7.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-taskomatic-2.7.46.10-2.14.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch"
},
"product_reference": "spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-utils-2.7.10.6-2.6.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch"
},
"product_reference": "spacewalk-utils-2.7.10.6-2.6.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-3.1.12-2.12.3.ppc64le as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le"
},
"product_reference": "susemanager-3.1.12-2.12.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-3.1.12-2.12.3.s390x as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x"
},
"product_reference": "susemanager-3.1.12-2.12.3.s390x",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-3.1.12-2.12.3.x86_64 as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64"
},
"product_reference": "susemanager-3.1.12-2.12.3.x86_64",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-schema-3.1.15-2.16.1.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch"
},
"product_reference": "susemanager-schema-3.1.15-2.16.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-sls-3.1.15-2.16.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch"
},
"product_reference": "susemanager-sls-3.1.15-2.16.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-sync-data-3.1.10-2.14.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch"
},
"product_reference": "susemanager-sync-data-3.1.10-2.14.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-tools-3.1.12-2.12.3.ppc64le as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le"
},
"product_reference": "susemanager-tools-3.1.12-2.12.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-tools-3.1.12-2.12.3.s390x as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x"
},
"product_reference": "susemanager-tools-3.1.12-2.12.3.s390x",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-tools-3.1.12-2.12.3.x86_64 as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64"
},
"product_reference": "susemanager-tools-3.1.12-2.12.3.x86_64",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtual-host-gatherer-1.0.16-2.9.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch"
},
"product_reference": "virtual-host-gatherer-1.0.16-2.9.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch"
},
"product_reference": "virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
},
"product_reference": "virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T13:47:54Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T13:47:54Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T13:47:54Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
}
]
}
SUSE-SU-2018:2189-1
Vulnerability from csaf_suse - Published: 2018-08-03 15:43 - Updated: 2018-08-03 15:43Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-firmware",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-firmware to version 20180525 fixes the following issues:\n\nThis security issue was fixed:\n\n- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker\n with local user access caused by speculative execution and indirect branch\n prediction (bsc#1095735)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Basesystem-15-2018-1490",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2189-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2189-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182189-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2189-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004373.html"
},
{
"category": "self",
"summary": "SUSE Bug 1095735",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for kernel-firmware",
"tracking": {
"current_release_date": "2018-08-03T15:43:39Z",
"generator": {
"date": "2018-08-03T15:43:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2189-1",
"initial_release_date": "2018-08-03T15:43:39Z",
"revision_history": [
{
"date": "2018-08-03T15:43:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-20180525-3.3.1.noarch",
"product": {
"name": "kernel-firmware-20180525-3.3.1.noarch",
"product_id": "kernel-firmware-20180525-3.3.1.noarch"
}
},
{
"category": "product_version",
"name": "ucode-amd-20180525-3.3.1.noarch",
"product": {
"name": "ucode-amd-20180525-3.3.1.noarch",
"product_id": "ucode-amd-20180525-3.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20180525-3.3.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-firmware-20180525-3.3.1.noarch"
},
"product_reference": "kernel-firmware-20180525-3.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20180525-3.3.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:ucode-amd-20180525-3.3.1.noarch"
},
"product_reference": "ucode-amd-20180525-3.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:kernel-firmware-20180525-3.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:ucode-amd-20180525-3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:kernel-firmware-20180525-3.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:ucode-amd-20180525-3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:kernel-firmware-20180525-3.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:ucode-amd-20180525-3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-03T15:43:39Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:0039-1
Vulnerability from csaf_suse - Published: 2018-01-08 12:27 - Updated: 2018-01-08 12:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kvm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThis update for kvm fixes the following issues:\n\nA security flaw mitigation has been applied:\n\n- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from \n the host VM to the CPU, to allow enabling/disabling branch prediction features in the\n Intel CPU. (bsc#1068032)\n\nAlso a security fix has been applied:\n\n- CVE-2017-2633: Fix various out of bounds access issues in the QEMU vnc infrastructure (bsc#1026612)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-kvm-13397,slessp3-kvm-13397",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0039-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0039-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180039-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0039-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003575.html"
},
{
"category": "self",
"summary": "SUSE Bug 1026612",
"url": "https://bugzilla.suse.com/1026612"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2633 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2633/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for kvm",
"tracking": {
"current_release_date": "2018-01-08T12:27:20Z",
"generator": {
"date": "2018-01-08T12:27:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0039-1",
"initial_release_date": "2018-01-08T12:27:20Z",
"revision_history": [
{
"date": "2018-01-08T12:27:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-53.14.1.i586",
"product": {
"name": "kvm-1.4.2-53.14.1.i586",
"product_id": "kvm-1.4.2-53.14.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-53.14.1.s390x",
"product": {
"name": "kvm-1.4.2-53.14.1.s390x",
"product_id": "kvm-1.4.2-53.14.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-53.14.1.x86_64",
"product": {
"name": "kvm-1.4.2-53.14.1.x86_64",
"product_id": "kvm-1.4.2-53.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.14.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.14.1.i586"
},
"product_reference": "kvm-1.4.2-53.14.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.14.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.i586"
},
"product_reference": "kvm-1.4.2-53.14.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.14.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.s390x"
},
"product_reference": "kvm-1.4.2-53.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.14.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.x86_64"
},
"product_reference": "kvm-1.4.2-53.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.14.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.i586"
},
"product_reference": "kvm-1.4.2-53.14.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.14.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.s390x"
},
"product_reference": "kvm-1.4.2-53.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.14.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.x86_64"
},
"product_reference": "kvm-1.4.2-53.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-2633",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2633"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the \u0027vnc_refresh_server_surface\u0027. A user inside a guest could use this flaw to crash the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2633",
"url": "https://www.suse.com/security/cve/CVE-2017-2633"
},
{
"category": "external",
"summary": "SUSE Bug 1026612 for CVE-2017-2633",
"url": "https://bugzilla.suse.com/1026612"
},
{
"category": "external",
"summary": "SUSE Bug 1026636 for CVE-2017-2633",
"url": "https://bugzilla.suse.com/1026636"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-2633",
"url": "https://bugzilla.suse.com/1074701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T12:27:20Z",
"details": "low"
}
],
"title": "CVE-2017-2633"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.14.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T12:27:20Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:0012-1
Vulnerability from csaf_suse - Published: 2018-01-04 07:36 - Updated: 2018-01-04 07:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nThis update adds mitigations for various side channel attacks against\nmodern CPUs that could disclose content of otherwise unreadable memory\n(bnc#1068032).\n\n- CVE-2017-5753 / \u0027Spec\u0167reAttack\u0027: Local attackers on systems with\n modern CPUs featuring deep instruction pipelining could use attacker\n controllable speculative execution over code patterns in the Linux\n Kernel to leak content from otherwise not readable memory in the same\n address space, allowing retrieval of passwords, cryptographic keys\n and other secrets.\n\n This problem is mitigated by adding speculative fencing on affected\n code paths throughout the Linux kernel.\n\n\n- CVE-2017-5715 / \u0027SpectreAttack\u0027: Local attackers on systems with modern\n CPUs featuring branch prediction could use mispredicted branches to\n speculatively execute code patterns that in turn could be made to\n leak other non-readable content in the same address space, an attack\n similar to CVE-2017-5753.\n\n This problem is mitigated by disabling predictive branches, depending\n on CPU architecture either by firmware updates and/or fixes in the\n user-kernel privilege boundaries.\n\n Please also check with your CPU / Hardware vendor on updated firmware\n or BIOS images regarding this issue.\n\n As this feature can have a performance impact, it can be disabled\n using the \u0027nospec\u0027 kernel commandline option.\n\n\n- CVE-2017-5754 / \u0027MeltdownAttack\u0027: Local attackers on systems with\n modern CPUs featuring deep instruction pipelining could use code\n patterns in userspace to speculative executive code that would read\n otherwise read protected memory, an attack similar to CVE-2017-5753.\n\n This problem is mitigated by unmapping the Linux Kernel from the user\n address space during user code execution, following a approach called\n \u0027KAISER\u0027. The terms used here are \u0027KAISER\u0027 / \u0027Kernel Address Isolation\u0027\n and \u0027PTI\u0027 / \u0027Page Table Isolation\u0027.\n\n Note that this is only done on affected platforms.\n\n This feature can be enabled / disabled by the \u0027pti=[on|off|auto]\u0027 or\n \u0027nopti\u0027 commandline options.\n\nAlso the following unrelated security bugs were fixed:\n\n- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).\n- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).\n\nThe following non-security bugs were fixed:\n\n- Add undefine _unique_build_ids (bsc#964063)\n- Always sign validate_negotiate_info reqs (bsc#1071009, fate#324404).\n- apei / ERST: Fix missing error handling in erst_reader() (bsc#1072556).\n- arm: Hide finish_arch_post_lock_switch() from modules (bsc#1068032).\n- autofs: fix careless error in recent commit (bnc#1012382 bsc#1065180).\n- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).\n- carl9170: prevent speculative execution (bnc#1068032).\n- Check cmdline_find_option() retval properly and use boot_cpu_has().\n- cw1200: prevent speculative execution (bnc#1068032).\n- e1000e: Avoid receiver overrun interrupt bursts (bsc#969470 FATE#319819).\n- e1000e: Fix e1000_check_for_copper_link_ich8lan return value (bsc#1073809).\n- Fix leak of validate_negotiate_info resp (bsc#1071009, fate#324404).\n- Fix NULL pointer deref in SMB2_tcon() (bsc#1071009, fate#324404).\n- Fix validate_negotiate_info uninitialized mem (bsc#1071009, fate#324404).\n- fs: prevent speculative execution (bnc#1068032).\n- genwqe: Take R/W permissions into account when dealing with memory pages (bsc#1073090).\n- ibmvnic: Include header descriptor support for ARP packets (bsc#1073912).\n- ibmvnic: Increase maximum number of RX/TX queues (bsc#1073912).\n- ibmvnic: Rename IBMVNIC_MAX_TX_QUEUES to IBMVNIC_MAX_QUEUES (bsc#1073912).\n- ipv6: prevent speculative execution (bnc#1068032).\n- kaiser: add \u0027nokaiser\u0027 boot option, using ALTERNATIVE.\n- kaiser: align addition to x86/mm/Makefile.\n- kaiser: asm/tlbflush.h handle noPGE at lower level.\n- kaiser: cleanups while trying for gold link.\n- kaiser: Disable on Xen PV.\n- kaiser: do not set _PAGE_NX on pgd_none.\n- kaiser: drop is_atomic arg to kaiser_pagetable_walk().\n- kaiser: enhanced by kernel and user PCIDs.\n- kaiser: ENOMEM if kaiser_pagetable_walk() NULL.\n- kaiser: fix build and FIXME in alloc_ldt_struct().\n- kaiser: fix perf crashes.\n- kaiser: fix regs to do_nmi() ifndef CONFIG_KAISER.\n- kaiser: fix unlikely error in alloc_ldt_struct().\n- kaiser: KAISER depends on SMP.\n- kaiser: kaiser_flush_tlb_on_return_to_user() check PCID.\n- kaiser: kaiser_remove_mapping() move along the pgd.\n- kaiser: Kernel Address Isolation.\n- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush.\n- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush user.\n- kaiser: name that 0x1000 KAISER_SHADOW_PGD_OFFSET.\n- kaiser: paranoid_entry pass cr3 need to paranoid_exit.\n- kaiser: PCID 0 for kernel and 128 for user.\n- kaiser: _pgd_alloc() without __GFP_REPEAT to avoid stalls.\n- kaiser: stack map PAGE_SIZE at THREAD_SIZE-PAGE_SIZE.\n- kaiser: tidied up asm/kaiser.h somewhat.\n- kaiser: tidied up kaiser_add/remove_mapping slightly.\n- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.\n- kaiser: vmstat show NR_KAISERTABLE as nr_overhead.\n- kaiser: x86_cr3_pcid_noflush and x86_cr3_pcid_user.\n- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).\n- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).\n- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).\n- mm/mmu_context, sched/core: Fix mmu_context.h assumption (bsc#1068032).\n- net: mpls: prevent speculative execution (bnc#1068032).\n- nfs: revalidate \u0027.\u0027 etc correctly on \u0027open\u0027 (bsc#1068951).\n- nfs: revalidate \u0027.\u0027 etc correctly on \u0027open\u0027 (git-fixes). Fix References tag.\n- nfsv4: always set NFS_LOCK_LOST when a lock is lost (bsc#1068951).\n- p54: prevent speculative execution (bnc#1068032).\n- powerpc/barrier: add gmb.\n- powerpc: Secure memory rfi flush (bsc#1068032).\n- ptrace: Add a new thread access check (bsc#1068032).\n- qla2xxx: prevent speculative execution (bnc#1068032).\n- Redo encryption backport to fix pkt signing (bsc#1071009, fate#324404).\n- s390: add ppa to system call and program check path (bsc#1068032).\n- s390: introduce CPU alternatives.\n- s390: introduce CPU alternatives (bsc#1068032).\n- s390/spinlock: add gmb memory barrier\n- s390/spinlock: add gmb memory barrier (bsc#1068032).\n- s390/spinlock: add ppa to system call path Signoff the s390 patches.\n- sched/core: Add switch_mm_irqs_off() and use it in the scheduler (bsc#1068032).\n- sched/core: Idle_task_exit() shouldn\u0027t use switch_mm_irqs_off() (bsc#1068032).\n- scsi_dh_alua: skip RTPG for devices only supporting active/optimized (bsc#1064311).\n- scsi_scan: Exit loop if TUR to LUN0 fails with 0x05/0x25 (bsc#1063043). This is specific to FUJITSU ETERNUS_DX* targets. They can return \u0027Illegal Request - Logical unit not supported\u0027 and processing should leave the timeout loop in this case.\n- scsi: ses: check return code from ses_recv_diag() (bsc#1039616).\n- scsi: ses: Fixup error message \u0027failed to get diagnostic page 0xffffffea\u0027 (bsc#1039616).\n- scsi: ses: Fix wrong page error (bsc#1039616).\n- scsi: ses: make page2 support optional (bsc#1039616).\n- Thermal/int340x: prevent speculative execution (bnc#1068032).\n- udf: prevent speculative execution (bnc#1068032).\n- Update config files: enable KAISER.\n- usb: host: fix incorrect updating of offset (bsc#1047487).\n- userns: prevent speculative execution (bnc#1068032).\n- uvcvideo: prevent speculative execution (bnc#1068032).\n- vxlan: correctly handle ipv6.disable module parameter (bsc#1072962).\n- x86/boot: Add early cmdline parsing for options with arguments.\n- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).\n- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).\n- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).\n- x86/CPU: Check speculation control CPUID bit (bsc#1068032).\n- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).\n- x86/entry: Add a function to overwrite the RSB (bsc#1068032).\n- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).\n- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).\n- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).\n- x86/idle: Toggle IBRS when going idle (bsc#1068032).\n- x86/kaiser: Check boottime cmdline params.\n- x86/kaiser: Move feature detection up (bsc#1068032).\n- x86/kaiser: Reenable PARAVIRT.\n- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.\n- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).\n- x86/kvm: Flush IBP when switching VMs (bsc#1068032).\n- x86/kvm: Pad RSB on VM transition (bsc#1068032).\n- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).\n- x86/mm/64: Fix reboot interaction with CR4.PCIDE (bsc#1068032).\n- x86/mm: Add a \u0027noinvpcid\u0027 boot option to turn off INVPCID (bsc#1068032).\n- x86/mm: Add INVPCID helpers (bsc#1068032).\n- x86/mm: Add the \u0027nopcid\u0027 boot option to turn off PCID (bsc#1068032).\n- x86/mm: Build arch/x86/mm/tlb.c even on !SMP (bsc#1068032).\n- x86/mm: Enable CR4.PCIDE on supported systems (bsc#1068032).\n- x86/mm: Fix INVPCID asm constraint (bsc#1068032).\n- x86/mm: If INVPCID is available, use it to flush global mappings (bsc#1068032).\n- x86/mm: Make flush_tlb_mm_range() more predictable (bsc#1068032).\n- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).\n- x86/mm: Reimplement flush_tlb_page() using flush_tlb_mm_range() (bsc#1068032).\n- x86/mm: Remove flush_tlb() and flush_tlb_current_task() (bsc#1068032).\n- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code (bsc#1068032).\n- x86/mm, sched/core: Turn off IRQs in switch_mm() (bsc#1068032).\n- x86/mm, sched/core: Uninline switch_mm() (bsc#1068032).\n- x86/mm: Set IBPB upon context switch (bsc#1068032).\n- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).\n- x86/paravirt: Dont patch flush_tlb_single (bsc#1068032).\n- x86/spec: Add IBRS control functions (bsc#1068032).\n- x86/spec: Add \u0027nospec\u0027 chicken bit (bsc#1068032).\n- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).\n- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).\n- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).\n- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).\n- x86/svm: Add code to clear registers on VM exit (bsc#1068032).\n- x86/svm: Clobber the RSB on VM exit (bsc#1068032).\n- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).\n- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-11,SUSE-SLE-DESKTOP-12-SP2-2018-11,SUSE-SLE-HA-12-SP2-2018-11,SUSE-SLE-Live-Patching-12-2018-11,SUSE-SLE-RPI-12-SP2-2018-11,SUSE-SLE-SDK-12-SP2-2018-11,SUSE-SLE-SERVER-12-SP2-2018-11,SUSE-SLE-WE-12-SP2-2018-11",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0012-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0012-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180012-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0012-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003566.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1039616",
"url": "https://bugzilla.suse.com/1039616"
},
{
"category": "self",
"summary": "SUSE Bug 1047487",
"url": "https://bugzilla.suse.com/1047487"
},
{
"category": "self",
"summary": "SUSE Bug 1063043",
"url": "https://bugzilla.suse.com/1063043"
},
{
"category": "self",
"summary": "SUSE Bug 1064311",
"url": "https://bugzilla.suse.com/1064311"
},
{
"category": "self",
"summary": "SUSE Bug 1065180",
"url": "https://bugzilla.suse.com/1065180"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068951",
"url": "https://bugzilla.suse.com/1068951"
},
{
"category": "self",
"summary": "SUSE Bug 1071009",
"url": "https://bugzilla.suse.com/1071009"
},
{
"category": "self",
"summary": "SUSE Bug 1072556",
"url": "https://bugzilla.suse.com/1072556"
},
{
"category": "self",
"summary": "SUSE Bug 1072962",
"url": "https://bugzilla.suse.com/1072962"
},
{
"category": "self",
"summary": "SUSE Bug 1073090",
"url": "https://bugzilla.suse.com/1073090"
},
{
"category": "self",
"summary": "SUSE Bug 1073792",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "self",
"summary": "SUSE Bug 1073809",
"url": "https://bugzilla.suse.com/1073809"
},
{
"category": "self",
"summary": "SUSE Bug 1073874",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "self",
"summary": "SUSE Bug 1073912",
"url": "https://bugzilla.suse.com/1073912"
},
{
"category": "self",
"summary": "SUSE Bug 964063",
"url": "https://bugzilla.suse.com/964063"
},
{
"category": "self",
"summary": "SUSE Bug 969470",
"url": "https://bugzilla.suse.com/969470"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17805 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17806 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-01-04T07:36:31Z",
"generator": {
"date": "2018-01-04T07:36:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0012-1",
"initial_release_date": "2018-01-04T07:36:31Z",
"revision_history": [
{
"date": "2018-01-04T07:36:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.103-92.56.1.aarch64",
"product": {
"name": "kernel-default-4.4.103-92.56.1.aarch64",
"product_id": "kernel-default-4.4.103-92.56.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.103-92.56.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.103-92.56.1.aarch64",
"product_id": "kernel-default-base-4.4.103-92.56.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.103-92.56.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.103-92.56.1.aarch64",
"product_id": "kernel-default-devel-4.4.103-92.56.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.103-92.56.1.aarch64",
"product": {
"name": "kernel-syms-4.4.103-92.56.1.aarch64",
"product_id": "kernel-syms-4.4.103-92.56.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.103-92.56.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.103-92.56.1.aarch64",
"product_id": "kernel-obs-build-4.4.103-92.56.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.103-92.56.1.noarch",
"product": {
"name": "kernel-devel-4.4.103-92.56.1.noarch",
"product_id": "kernel-devel-4.4.103-92.56.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.103-92.56.1.noarch",
"product": {
"name": "kernel-macros-4.4.103-92.56.1.noarch",
"product_id": "kernel-macros-4.4.103-92.56.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.103-92.56.1.noarch",
"product": {
"name": "kernel-source-4.4.103-92.56.1.noarch",
"product_id": "kernel-source-4.4.103-92.56.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.103-92.56.1.noarch",
"product": {
"name": "kernel-docs-4.4.103-92.56.1.noarch",
"product_id": "kernel-docs-4.4.103-92.56.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.103-92.56.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"product": {
"name": "cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"product_id": "cluster-network-kmp-default-4.4.103-92.56.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.103-92.56.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.103-92.56.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.103-92.56.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.103-92.56.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.103-92.56.1.ppc64le",
"product_id": "kernel-obs-build-4.4.103-92.56.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.103-92.56.1.ppc64le",
"product": {
"name": "kernel-default-4.4.103-92.56.1.ppc64le",
"product_id": "kernel-default-4.4.103-92.56.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.103-92.56.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.103-92.56.1.ppc64le",
"product_id": "kernel-default-base-4.4.103-92.56.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.103-92.56.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.103-92.56.1.ppc64le",
"product_id": "kernel-default-devel-4.4.103-92.56.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.103-92.56.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.103-92.56.1.ppc64le",
"product_id": "kernel-syms-4.4.103-92.56.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.103-92.56.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"product_id": "cluster-network-kmp-default-4.4.103-92.56.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.103-92.56.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.103-92.56.1.s390x",
"product_id": "dlm-kmp-default-4.4.103-92.56.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.103-92.56.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.103-92.56.1.s390x",
"product_id": "gfs2-kmp-default-4.4.103-92.56.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.103-92.56.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.103-92.56.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.103-92.56.1.s390x",
"product_id": "kernel-obs-build-4.4.103-92.56.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.103-92.56.1.s390x",
"product": {
"name": "kernel-default-4.4.103-92.56.1.s390x",
"product_id": "kernel-default-4.4.103-92.56.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.103-92.56.1.s390x",
"product": {
"name": "kernel-default-base-4.4.103-92.56.1.s390x",
"product_id": "kernel-default-base-4.4.103-92.56.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.103-92.56.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.103-92.56.1.s390x",
"product_id": "kernel-default-devel-4.4.103-92.56.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.103-92.56.1.s390x",
"product": {
"name": "kernel-default-man-4.4.103-92.56.1.s390x",
"product_id": "kernel-default-man-4.4.103-92.56.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.103-92.56.1.s390x",
"product": {
"name": "kernel-syms-4.4.103-92.56.1.s390x",
"product_id": "kernel-syms-4.4.103-92.56.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.103-92.56.1.x86_64",
"product": {
"name": "kernel-default-4.4.103-92.56.1.x86_64",
"product_id": "kernel-default-4.4.103-92.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.103-92.56.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.103-92.56.1.x86_64",
"product_id": "kernel-default-devel-4.4.103-92.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.103-92.56.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.103-92.56.1.x86_64",
"product_id": "kernel-default-extra-4.4.103-92.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.103-92.56.1.x86_64",
"product": {
"name": "kernel-syms-4.4.103-92.56.1.x86_64",
"product_id": "kernel-syms-4.4.103-92.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.103-92.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"product_id": "cluster-network-kmp-default-4.4.103-92.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.103-92.56.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.103-92.56.1.x86_64",
"product_id": "dlm-kmp-default-4.4.103-92.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.103-92.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.103-92.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"product_id": "kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.103-92.56.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.103-92.56.1.x86_64",
"product_id": "kernel-obs-build-4.4.103-92.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.103-92.56.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.103-92.56.1.x86_64",
"product_id": "kernel-default-base-4.4.103-92.56.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64"
},
"product_reference": "kernel-default-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
},
"product_reference": "kernel-default-extra-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.103-92.56.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch"
},
"product_reference": "kernel-devel-4.4.103-92.56.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.103-92.56.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch"
},
"product_reference": "kernel-macros-4.4.103-92.56.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.103-92.56.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch"
},
"product_reference": "kernel-source-4.4.103-92.56.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64"
},
"product_reference": "kernel-syms-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.103-92.56.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.103-92.56.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le"
},
"product_reference": "cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x"
},
"product_reference": "cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64"
},
"product_reference": "cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.103-92.56.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.103-92.56.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.103-92.56.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-92.56.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64"
},
"product_reference": "kernel-default-4.4.103-92.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-92.56.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.103-92.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-92.56.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.103-92.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.103-92.56.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch"
},
"product_reference": "kernel-devel-4.4.103-92.56.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.103-92.56.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch"
},
"product_reference": "kernel-macros-4.4.103-92.56.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.103-92.56.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch"
},
"product_reference": "kernel-source-4.4.103-92.56.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-92.56.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64"
},
"product_reference": "kernel-syms-4.4.103-92.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.4.103-92.56.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch"
},
"product_reference": "kernel-docs-4.4.103-92.56.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.103-92.56.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64"
},
"product_reference": "kernel-obs-build-4.4.103-92.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.103-92.56.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.4.103-92.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x"
},
"product_reference": "kernel-obs-build-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64"
},
"product_reference": "kernel-obs-build-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-92.56.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64"
},
"product_reference": "kernel-default-4.4.103-92.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-92.56.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le"
},
"product_reference": "kernel-default-4.4.103-92.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x"
},
"product_reference": "kernel-default-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64"
},
"product_reference": "kernel-default-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-92.56.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.103-92.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-92.56.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.103-92.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x"
},
"product_reference": "kernel-default-base-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-92.56.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.103-92.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-92.56.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.103-92.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x"
},
"product_reference": "kernel-default-man-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.103-92.56.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch"
},
"product_reference": "kernel-devel-4.4.103-92.56.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.103-92.56.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch"
},
"product_reference": "kernel-macros-4.4.103-92.56.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.103-92.56.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch"
},
"product_reference": "kernel-source-4.4.103-92.56.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-92.56.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64"
},
"product_reference": "kernel-syms-4.4.103-92.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-92.56.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.103-92.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x"
},
"product_reference": "kernel-syms-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64"
},
"product_reference": "kernel-syms-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-92.56.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64"
},
"product_reference": "kernel-default-4.4.103-92.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-92.56.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le"
},
"product_reference": "kernel-default-4.4.103-92.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x"
},
"product_reference": "kernel-default-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64"
},
"product_reference": "kernel-default-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-92.56.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.103-92.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-92.56.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.103-92.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x"
},
"product_reference": "kernel-default-base-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-92.56.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.103-92.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-92.56.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.103-92.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x"
},
"product_reference": "kernel-default-man-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.103-92.56.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch"
},
"product_reference": "kernel-devel-4.4.103-92.56.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.103-92.56.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch"
},
"product_reference": "kernel-macros-4.4.103-92.56.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.103-92.56.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch"
},
"product_reference": "kernel-source-4.4.103-92.56.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-92.56.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64"
},
"product_reference": "kernel-syms-4.4.103-92.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-92.56.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.103-92.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-92.56.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x"
},
"product_reference": "kernel-syms-4.4.103-92.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64"
},
"product_reference": "kernel-syms-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.103-92.56.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
},
"product_reference": "kernel-default-extra-4.4.103-92.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-17805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17805"
}
],
"notes": [
{
"category": "general",
"text": "The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17805",
"url": "https://www.suse.com/security/cve/CVE-2017-17805"
},
{
"category": "external",
"summary": "SUSE Bug 1073792 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:36:31Z",
"details": "important"
}
],
"title": "CVE-2017-17805"
},
{
"cve": "CVE-2017-17806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17806"
}
],
"notes": [
{
"category": "general",
"text": "The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17806",
"url": "https://www.suse.com/security/cve/CVE-2017-17806"
},
{
"category": "external",
"summary": "SUSE Bug 1073874 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:36:31Z",
"details": "low"
}
],
"title": "CVE-2017-17806"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:36:31Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:36:31Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_103-92_56-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.103-92.56.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.103-92.56.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.103-92.56.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T07:36:31Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
}
]
}
SUSE-SU-2018:0051-1
Vulnerability from csaf_suse - Published: 2018-01-09 11:47 - Updated: 2018-01-09 11:47Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-firmware",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-firmware fixes the following issues:\n\n- Add microcode_amd_fam17h.bin (bsc#1068032 CVE-2017-5715)\n\nThis new firmware enables the Indirect Branch Control (IBC) feature on\nAMD family 17h processor to mitigate an attack on the branch predictor\nthat could lead to information disclosure from e.g. kernel memory\n(bsc#1068032 CVE-2017-5715).\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-2018-37",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0051-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0051-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180051-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0051-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003579.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for kernel-firmware",
"tracking": {
"current_release_date": "2018-01-09T11:47:46Z",
"generator": {
"date": "2018-01-09T11:47:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0051-1",
"initial_release_date": "2018-01-09T11:47:46Z",
"revision_history": [
{
"date": "2018-01-09T11:47:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-20140807git-5.3.1.noarch",
"product": {
"name": "kernel-firmware-20140807git-5.3.1.noarch",
"product_id": "kernel-firmware-20140807git-5.3.1.noarch"
}
},
{
"category": "product_version",
"name": "ucode-amd-20140807git-5.3.1.noarch",
"product": {
"name": "ucode-amd-20140807git-5.3.1.noarch",
"product_id": "ucode-amd-20140807git-5.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20140807git-5.3.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-firmware-20140807git-5.3.1.noarch"
},
"product_reference": "kernel-firmware-20140807git-5.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20140807git-5.3.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:ucode-amd-20140807git-5.3.1.noarch"
},
"product_reference": "ucode-amd-20140807git-5.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kernel-firmware-20140807git-5.3.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:ucode-amd-20140807git-5.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kernel-firmware-20140807git-5.3.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:ucode-amd-20140807git-5.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kernel-firmware-20140807git-5.3.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:ucode-amd-20140807git-5.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-09T11:47:46Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:1498-1
Vulnerability from csaf_suse - Published: 2018-06-05 07:01 - Updated: 2018-06-05 07:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for gcc43",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for gcc43 fixes the following issues:\n\nThis update adds support for \u0027expolines\u0027 on s390x, allowing fixing CVE-2017-5715 in a more lightweight fashion. (bsc#1086069)\n\nThe option flags are the same as for the x86 retpolines.\n\nA compiler crash when building userland packages with x86 retpolines was fixed. (bsc#1092807)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-gcc43-13639,sleposp3-gcc43-13639,slessp3-gcc43-13639,slessp4-gcc43-13639",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1498-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1498-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181498-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1498-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004112.html"
},
{
"category": "self",
"summary": "SUSE Bug 1086069",
"url": "https://bugzilla.suse.com/1086069"
},
{
"category": "self",
"summary": "SUSE Bug 1092807",
"url": "https://bugzilla.suse.com/1092807"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for gcc43",
"tracking": {
"current_release_date": "2018-06-05T07:01:24Z",
"generator": {
"date": "2018-06-05T07:01:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1498-1",
"initial_release_date": "2018-06-05T07:01:24Z",
"revision_history": [
{
"date": "2018-06-05T07:01:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cpp43-4.3.4_20091019-37.9.1.i586",
"product": {
"name": "cpp43-4.3.4_20091019-37.9.1.i586",
"product_id": "cpp43-4.3.4_20091019-37.9.1.i586"
}
},
{
"category": "product_version",
"name": "gcc43-ada-4.3.4_20091019-37.9.1.i586",
"product": {
"name": "gcc43-ada-4.3.4_20091019-37.9.1.i586",
"product_id": "gcc43-ada-4.3.4_20091019-37.9.1.i586"
}
},
{
"category": "product_version",
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.i586",
"product": {
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.i586",
"product_id": "gcc43-fortran-4.3.4_20091019-37.9.1.i586"
}
},
{
"category": "product_version",
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.i586",
"product": {
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.i586",
"product_id": "gcc43-obj-c++-4.3.4_20091019-37.9.1.i586"
}
},
{
"category": "product_version",
"name": "gcc43-objc-4.3.4_20091019-37.9.1.i586",
"product": {
"name": "gcc43-objc-4.3.4_20091019-37.9.1.i586",
"product_id": "gcc43-objc-4.3.4_20091019-37.9.1.i586"
}
},
{
"category": "product_version",
"name": "libada43-4.3.4_20091019-37.9.1.i586",
"product": {
"name": "libada43-4.3.4_20091019-37.9.1.i586",
"product_id": "libada43-4.3.4_20091019-37.9.1.i586"
}
},
{
"category": "product_version",
"name": "libobjc43-4.3.4_20091019-37.9.1.i586",
"product": {
"name": "libobjc43-4.3.4_20091019-37.9.1.i586",
"product_id": "libobjc43-4.3.4_20091019-37.9.1.i586"
}
},
{
"category": "product_version",
"name": "gcc43-4.3.4_20091019-37.9.1.i586",
"product": {
"name": "gcc43-4.3.4_20091019-37.9.1.i586",
"product_id": "gcc43-4.3.4_20091019-37.9.1.i586"
}
},
{
"category": "product_version",
"name": "gcc43-c++-4.3.4_20091019-37.9.1.i586",
"product": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.i586",
"product_id": "gcc43-c++-4.3.4_20091019-37.9.1.i586"
}
},
{
"category": "product_version",
"name": "gcc43-info-4.3.4_20091019-37.9.1.i586",
"product": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.i586",
"product_id": "gcc43-info-4.3.4_20091019-37.9.1.i586"
}
},
{
"category": "product_version",
"name": "gcc43-locale-4.3.4_20091019-37.9.1.i586",
"product": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.i586",
"product_id": "gcc43-locale-4.3.4_20091019-37.9.1.i586"
}
},
{
"category": "product_version",
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"product": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"product_id": "libstdc++43-devel-4.3.4_20091019-37.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "cpp43-4.3.4_20091019-37.9.1.ia64",
"product": {
"name": "cpp43-4.3.4_20091019-37.9.1.ia64",
"product_id": "cpp43-4.3.4_20091019-37.9.1.ia64"
}
},
{
"category": "product_version",
"name": "gcc43-ada-4.3.4_20091019-37.9.1.ia64",
"product": {
"name": "gcc43-ada-4.3.4_20091019-37.9.1.ia64",
"product_id": "gcc43-ada-4.3.4_20091019-37.9.1.ia64"
}
},
{
"category": "product_version",
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.ia64",
"product": {
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.ia64",
"product_id": "gcc43-fortran-4.3.4_20091019-37.9.1.ia64"
}
},
{
"category": "product_version",
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.ia64",
"product": {
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.ia64",
"product_id": "gcc43-obj-c++-4.3.4_20091019-37.9.1.ia64"
}
},
{
"category": "product_version",
"name": "gcc43-objc-4.3.4_20091019-37.9.1.ia64",
"product": {
"name": "gcc43-objc-4.3.4_20091019-37.9.1.ia64",
"product_id": "gcc43-objc-4.3.4_20091019-37.9.1.ia64"
}
},
{
"category": "product_version",
"name": "libada43-4.3.4_20091019-37.9.1.ia64",
"product": {
"name": "libada43-4.3.4_20091019-37.9.1.ia64",
"product_id": "libada43-4.3.4_20091019-37.9.1.ia64"
}
},
{
"category": "product_version",
"name": "libobjc43-4.3.4_20091019-37.9.1.ia64",
"product": {
"name": "libobjc43-4.3.4_20091019-37.9.1.ia64",
"product_id": "libobjc43-4.3.4_20091019-37.9.1.ia64"
}
},
{
"category": "product_version",
"name": "gcc43-4.3.4_20091019-37.9.1.ia64",
"product": {
"name": "gcc43-4.3.4_20091019-37.9.1.ia64",
"product_id": "gcc43-4.3.4_20091019-37.9.1.ia64"
}
},
{
"category": "product_version",
"name": "gcc43-c++-4.3.4_20091019-37.9.1.ia64",
"product": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.ia64",
"product_id": "gcc43-c++-4.3.4_20091019-37.9.1.ia64"
}
},
{
"category": "product_version",
"name": "gcc43-info-4.3.4_20091019-37.9.1.ia64",
"product": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.ia64",
"product_id": "gcc43-info-4.3.4_20091019-37.9.1.ia64"
}
},
{
"category": "product_version",
"name": "gcc43-locale-4.3.4_20091019-37.9.1.ia64",
"product": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.ia64",
"product_id": "gcc43-locale-4.3.4_20091019-37.9.1.ia64"
}
},
{
"category": "product_version",
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.ia64",
"product": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.ia64",
"product_id": "libstdc++43-devel-4.3.4_20091019-37.9.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "cpp43-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "cpp43-4.3.4_20091019-37.9.1.ppc64",
"product_id": "cpp43-4.3.4_20091019-37.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.ppc64",
"product_id": "gcc43-fortran-4.3.4_20091019-37.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.ppc64",
"product_id": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.ppc64",
"product_id": "gcc43-obj-c++-4.3.4_20091019-37.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "gcc43-objc-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "gcc43-objc-4.3.4_20091019-37.9.1.ppc64",
"product_id": "gcc43-objc-4.3.4_20091019-37.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.ppc64",
"product_id": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "libobjc43-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "libobjc43-4.3.4_20091019-37.9.1.ppc64",
"product_id": "libobjc43-4.3.4_20091019-37.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "libobjc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "libobjc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"product_id": "libobjc43-32bit-4.3.4_20091019-37.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "gcc43-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "gcc43-4.3.4_20091019-37.9.1.ppc64",
"product_id": "gcc43-4.3.4_20091019-37.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"product_id": "gcc43-32bit-4.3.4_20091019-37.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "gcc43-c++-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.ppc64",
"product_id": "gcc43-c++-4.3.4_20091019-37.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "gcc43-info-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.ppc64",
"product_id": "gcc43-info-4.3.4_20091019-37.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "gcc43-locale-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.ppc64",
"product_id": "gcc43-locale-4.3.4_20091019-37.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64",
"product_id": "libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64",
"product": {
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64",
"product_id": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "cpp43-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "cpp43-4.3.4_20091019-37.9.1.s390x",
"product_id": "cpp43-4.3.4_20091019-37.9.1.s390x"
}
},
{
"category": "product_version",
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.s390x",
"product_id": "gcc43-fortran-4.3.4_20091019-37.9.1.s390x"
}
},
{
"category": "product_version",
"name": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.s390x",
"product_id": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.s390x"
}
},
{
"category": "product_version",
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.s390x",
"product_id": "gcc43-obj-c++-4.3.4_20091019-37.9.1.s390x"
}
},
{
"category": "product_version",
"name": "gcc43-objc-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "gcc43-objc-4.3.4_20091019-37.9.1.s390x",
"product_id": "gcc43-objc-4.3.4_20091019-37.9.1.s390x"
}
},
{
"category": "product_version",
"name": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.s390x",
"product_id": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libobjc43-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "libobjc43-4.3.4_20091019-37.9.1.s390x",
"product_id": "libobjc43-4.3.4_20091019-37.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libobjc43-32bit-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "libobjc43-32bit-4.3.4_20091019-37.9.1.s390x",
"product_id": "libobjc43-32bit-4.3.4_20091019-37.9.1.s390x"
}
},
{
"category": "product_version",
"name": "gcc43-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "gcc43-4.3.4_20091019-37.9.1.s390x",
"product_id": "gcc43-4.3.4_20091019-37.9.1.s390x"
}
},
{
"category": "product_version",
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"product_id": "gcc43-32bit-4.3.4_20091019-37.9.1.s390x"
}
},
{
"category": "product_version",
"name": "gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"product_id": "gcc43-c++-4.3.4_20091019-37.9.1.s390x"
}
},
{
"category": "product_version",
"name": "gcc43-info-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.s390x",
"product_id": "gcc43-info-4.3.4_20091019-37.9.1.s390x"
}
},
{
"category": "product_version",
"name": "gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"product_id": "gcc43-locale-4.3.4_20091019-37.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"product_id": "libstdc++43-devel-4.3.4_20091019-37.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"product": {
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"product_id": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cpp43-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "cpp43-4.3.4_20091019-37.9.1.x86_64",
"product_id": "cpp43-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gcc43-ada-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "gcc43-ada-4.3.4_20091019-37.9.1.x86_64",
"product_id": "gcc43-ada-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.x86_64",
"product_id": "gcc43-fortran-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64",
"product_id": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.x86_64",
"product_id": "gcc43-obj-c++-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gcc43-objc-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "gcc43-objc-4.3.4_20091019-37.9.1.x86_64",
"product_id": "gcc43-objc-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.x86_64",
"product_id": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libada43-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "libada43-4.3.4_20091019-37.9.1.x86_64",
"product_id": "libada43-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libobjc43-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "libobjc43-4.3.4_20091019-37.9.1.x86_64",
"product_id": "libobjc43-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libobjc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "libobjc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"product_id": "libobjc43-32bit-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gcc43-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "gcc43-4.3.4_20091019-37.9.1.x86_64",
"product_id": "gcc43-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"product_id": "gcc43-32bit-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"product_id": "gcc43-c++-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"product_id": "gcc43-info-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"product_id": "gcc43-locale-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"product_id": "libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"product": {
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"product_id": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-ada-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-ada-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-ada-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-ada-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-ada-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "gcc43-ada-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-ada-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-ada-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-ada-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-fortran-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "gcc43-fortran-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-fortran-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-fortran-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-fortran-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-obj-c++-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "gcc43-obj-c++-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-obj-c++-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-obj-c++-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-obj-c++-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-obj-c++-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-objc-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-objc-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-objc-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "gcc43-objc-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-objc-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-objc-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-objc-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-objc-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-objc-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-objc-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-32bit-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-32bit-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-32bit-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-objc-32bit-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libada43-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libada43-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "libada43-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libada43-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libada43-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "libada43-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libada43-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libada43-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "libada43-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libobjc43-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "libobjc43-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libobjc43-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "libobjc43-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libobjc43-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "libobjc43-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libobjc43-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "libobjc43-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libobjc43-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "libobjc43-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libobjc43-32bit-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-32bit-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "libobjc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libobjc43-32bit-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-32bit-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "libobjc43-32bit-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libobjc43-32bit-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-32bit-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "libobjc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:cpp43-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-c++-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-info-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-locale-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libstdc++43-devel-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:cpp43-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:cpp43-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:cpp43-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-32bit-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-c++-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-c++-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-c++-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-fortran-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-fortran-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-info-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-info-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-info-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-locale-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-locale-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-locale-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:cpp43-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:cpp43-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:cpp43-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-32bit-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-c++-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-c++-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-c++-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-fortran-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-fortran-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-fortran-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-info-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-info-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-info-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-locale-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-locale-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-locale-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp43-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "cpp43-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-32bit-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-c++-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-info-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc43-locale-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.i586"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ia64"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64"
},
"product_reference": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x"
},
"product_reference": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64"
},
"product_reference": "libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-fortran-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-info-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-fortran-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-info-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-ada-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-ada-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-ada-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libada43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libada43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libada43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-fortran-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-info-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-fortran-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-info-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-ada-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-ada-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-ada-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libada43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libada43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libada43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-fortran-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-info-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-fortran-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-info-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-info-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:gcc43-locale-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libstdc++43-devel-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cpp43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-ada-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-ada-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-ada-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-fortran-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-obj-c++-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:gcc43-objc-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libada43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libada43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libada43-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-32bit-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-32bit-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-32bit-4.3.4_20091019-37.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libobjc43-4.3.4_20091019-37.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-05T07:01:24Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:2092-1
Vulnerability from csaf_suse - Published: 2018-07-27 13:37 - Updated: 2018-07-27 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following new feature was added:\n\n- NVDIMM memory error notification (ACPI 6.2)\n\nThe following security bugs were fixed:\n\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function could\n have result in local attackers being able to crash the kernel or potentially\n elevate privileges because kmalloc_array is not used (bnc#1100418)\n- CVE-2018-13053: The alarm_timer_nsleep function had an integer overflow via a\n large relative timeout because ktime_add_safe was not used (bnc#1099924)\n- CVE-2018-9385: Prevent overread of the \u0027driver_override\u0027 buffer (bsc#1100491)\n- CVE-2018-13405: The inode_init_owner function allowed local users to create\n files with an unintended group ownership allowing attackers to escalate\n privileges by making a plain file executable and SGID (bnc#1100416)\n- CVE-2017-5753: Systems with microprocessors utilizing speculative execution\n and branch prediction may have allowed unauthorized disclosure of information\n to an attacker with local user access via a side-channel analysis (bsc#1068032)\n- CVE-2018-1118: Linux kernel vhost did not properly initialize memory in\n messages passed between virtual guests and the host operating system. This\n could have allowed local privileged users to read some kernel memory contents\n when reading from the /dev/vhost-net device file (bsc#1092472)\n- CVE-2018-12233: A memory corruption bug in JFS could have been triggered by\n calling setxattr twice with two different extended attribute names on the same\n file. This vulnerability could be triggered by an unprivileged user with the\n ability to create files and execute programs (bsc#1097234)\n- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did\n not handle unsigned integer overflow properly. As a result, a large value of\n the \u0027ie_len\u0027 argument could have caused a buffer overflow (bnc#1097356)\n- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO\n ioctl (bsc#1096728)\n- CVE-2018-3639: Systems with microprocessors utilizing speculative execution\n and speculative execution of memory reads the addresses of all prior memory\n writes are known may have allowed unauthorized disclosure of information to an\n attacker with local user access via a side-channel analysis, aka Speculative\n Store Bypass (SSB), Variant 4 (bsc#1087082)\n- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process\u0027s memory\n containing command line arguments (or environment strings), an attacker could\n have caused utilities from psutils or procps (such as ps, w) to block\n indefinitely (denial of service) or for some controlled time (as a\n synchronization primitive for other attacks) (bsc#1093158)\n- CVE-2018-1094: The ext4_fill_super function did not always initialize the\n crc32c checksum driver, which allowed attackers to cause a denial of service\n (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted\n ext4 image (bsc#1087007)\n- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory\n with a zero i_links_count, which allowed attackers to cause a denial of service\n (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4\n image (bsc#1087012)\n- 1093: The ext4_valid_block_bitmap function allowed attackers to cause a\n denial of service (out-of-bounds read and system crash) via a crafted ext4\n image because balloc.c and ialloc.c do not validate bitmap block numbers\n (bsc#1087095)\n- CVE-2018-1000200: Prevent NULL pointer dereference which could have resulted\n in an out of memory (OOM) killing of large mlocked processes (bsc#1090150)\n- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that\n allowed a local user to cause a denial of service by a number of certain\n crafted system calls (bsc#1092904)\n- CVE-2018-5803: Prevent error in the \u0027_sctp_make_chunk()\u0027 function when\n handling SCTP packets length that could have been exploited to cause a kernel\n crash (bnc#1083900)\n- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c\n __rds_rdma_map() function that allowed local attackers to cause a system panic\n and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST\n (bsc#1082962)\n- CVE-2018-8781: The udl_fb_mmap function had an integer-overflow vulnerability\n allowing local users with access to the udldrmfb driver to obtain full read and\n write permissions on kernel physical pages, resulting in a code execution in\n kernel space (bsc#1090643)\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might\n have allowed local users to cause a denial of service via an INT_MIN argument\n (bnc#1089752)\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed\n local users to cause a denial of service by triggering an attempted use of the\n-INT_MIN value (bnc#1089608)\n- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker\n with local user access caused by speculative execution and indirect branch\n prediction (bsc#1068032)\n\nThe following non-security bugs were fixed:\n\n- Fix copy_in_user() declaration (bsc#1052766).\n- 1wire: family module autoload fails because of upper/lower case mismatch (bsc#1051510).\n- 8021q: fix a memory leak for VLAN 0 device (networking-stable-18_01_12).\n- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (networking-stable-18_05_15).\n- 8139too: revisit napi_complete_done() usage (networking-stable-17_10_09).\n- 9p/trans_virtio: discard zero-length reply (bsc#1052766).\n- ACPI / APEI: Replace ioremap_page_range() with fixmap (bsc#1051510).\n- ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bsc#1051510).\n- ACPI / NUMA: ia64: Parse all entries of SRAT memory affinity table (bnc#1088796).\n- ACPI / bus: Do not call _STA on battery devices with unmet dependencies (bsc#1051510).\n- ACPI / button: make module loadable when booted in non-ACPI mode (bsc#1051510).\n- ACPI / hotplug / PCI: Check presence of slot itself in get_slot_status() (bsc#1051510).\n- ACPI / scan: Initialize watchdog before PNP (bsc#1073960).\n- ACPI / scan: Send change uevent with offine environmental data (bsc#1082485).\n- ACPI / scan: Use acpi_bus_get_status() to initialize ACPI_TYPE_DEVICE devs (bsc#1051510).\n- ACPI / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bsc#1051510).\n- ACPI / video: Default lcd_only to true on Win8-ready and newer machines (bsc#1051510).\n- ACPI / video: Only default only_lcd to true on Win8-ready _desktops_ (bsc#1051510).\n- ACPI / watchdog: Prefer iTCO_wdt on Lenovo Z50-70 (bsc#1051510).\n- ACPI / watchdog: properly initialize resources (bsc#1051510).\n- ACPI: EC: Fix debugfs_create_*() usage (bsc#1051510).\n- ACPI: acpi_pad: Fix memory leak in power saving threads (bsc#1051510).\n- ACPI: processor_perflib: Do not send _PPC change notification if not ready (bsc#1051510).\n- ACPI: sysfs: Make ACPI GPE mask kernel parameter cover all GPEs (bsc#1051510).\n- ACPICA: ACPI 6.0A: Changes to the NFIT ACPI table (bsc#1091424).\n- ACPICA: Events: add a return on failure from acpi_hw_register_read (bsc#1051510).\n- ACPICA: Fix memory leak on unusual memory leak (bsc#1051510).\n- ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (bsc#1051510).\n- ALSA: aloop: Add missing cable lock to ctl API callbacks (bsc#1051510).\n- ALSA: aloop: Mark paused device as inactive (bsc#1051510).\n- ALSA: asihpi: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: caiaq: Add yet more sanity checks for invalid EPs (bsc#1051510).\n- ALSA: control: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: control: fix a redundant-copy issue (bsc#1051510).\n- ALSA: core: Report audio_tstamp in snd_pcm_sync_ptr (bsc#1051510).\n- ALSA: dice: fix OUI for TC group (bsc#1051510).\n- ALSA: dice: fix error path to destroy initialized stream data (bsc#1051510).\n- ALSA: dice: fix kernel NULL pointer dereference due to invalid calculation for array index (bsc#1051510).\n- ALSA: emu10k1: Fix kABI breakage (bsc#1093027).\n- ALSA: emu10k1: add a IOMMU workaround (bsc#1093027).\n- ALSA: emu10k1: add optional debug printouts with DMA addresses (bsc#1093027).\n- ALSA: emu10k1: make sure synth DMA pages are allocated with DMA functions (bsc#1093027).\n- ALSA: emu10k1: remove reserved_page (bsc#1093027).\n- ALSA: emu10k1: use dma_set_mask_and_coherent() (bsc#1093027).\n- ALSA: hda - Fix incorrect usage of IS_REACHABLE() (bsc#1051510).\n- ALSA: hda - Handle kzalloc() failure in snd_hda_attach_pcm_stream() (bsc#1051510).\n- ALSA: hda - New VIA controller suppor no-snoop path (bsc#1051510).\n- ALSA: hda - Skip jack and others for non-existing PCM streams (bsc#1051510).\n- ALSA: hda/ca0132 - use ARRAY_SIZE (bsc#1051510).\n- ALSA: hda/ca0132: Add DSP Volume set and New mixers for SBZ + R3Di (bsc#1096696).\n- ALSA: hda/ca0132: Add PCI region2 iomap for SBZ (bsc#1096696).\n- ALSA: hda/ca0132: Add dsp setup + gpio functions for r3di (bsc#1096696).\n- ALSA: hda/ca0132: Add extra exit functions for R3Di and SBZ (bsc#1096696).\n- ALSA: hda/ca0132: Add new control changes for SBZ + R3Di (bsc#1096696).\n- ALSA: hda/ca0132: Add pincfg for SBZ + R3Di, add fp hp auto-detect (bsc#1096696).\n- ALSA: hda/ca0132: Delete pointless assignments to struct auto_pin_cfg fields (bsc#1051510).\n- ALSA: hda/ca0132: Delete redundant UNSOL event requests (bsc#1051510).\n- ALSA: hda/ca0132: Do not test for QUIRK_NONE (bsc#1051510).\n- ALSA: hda/ca0132: Fix DMic data rate for Alienware M17x R4 (bsc#1051510).\n- ALSA: hda/ca0132: R3Di and SBZ quirk entires + alt firmware loading (bsc#1096696).\n- ALSA: hda/ca0132: Restore PCM Analog Mic-In2 (bsc#1051510).\n- ALSA: hda/ca0132: Restore behavior of QUIRK_ALIENWARE (bsc#1051510).\n- ALSA: hda/ca0132: add alt_select_in/out for R3Di + SBZ (bsc#1096696).\n- ALSA: hda/ca0132: add ca0132_alt_set_vipsource (bsc#1096696).\n- ALSA: hda/ca0132: add dsp setup related commands for the sbz (bsc#1096696).\n- ALSA: hda/ca0132: add extra init functions for r3di + sbz (bsc#1096696).\n- ALSA: hda/ca0132: add the ability to set src_id on scp commands (bsc#1096696).\n- ALSA: hda/ca0132: constify parameter table for effects (bsc#1096696).\n- ALSA: hda/ca0132: constify read-only members of string array (bsc#1096696).\n- ALSA: hda/ca0132: constify templates for control element set (bsc#1096696).\n- ALSA: hda/ca0132: fix array_size.cocci warnings (bsc#1096696).\n- ALSA: hda/ca0132: fix build failure when a local macro is defined (bsc#1051510).\n- ALSA: hda/ca0132: make array ca0132_alt_chmaps static (bsc#1051510).\n- ALSA: hda/ca0132: merge strings just for printk (bsc#1096696).\n- ALSA: hda/ca0132: update core functions for sbz + r3di (bsc#1096696).\n- ALSA: hda/conexant - Add fixup for HP Z2 G4 workstation (bsc#1092975).\n- ALSA: hda/conexant - Add hp-mic-fix model string (bsc#1092975).\n- ALSA: hda/realtek - Add a quirk for FSC ESPRIMO U9210 (bsc#1051510).\n- ALSA: hda/realtek - Add shutup hint (bsc#1051510).\n- ALSA: hda/realtek - Add some fixes for ALC233 (bsc#1051510).\n- ALSA: hda/realtek - Clevo P950ER ALC1220 Fixup (bsc#1051510).\n- ALSA: hda/realtek - Enable mic-mute hotkey for several Lenovo AIOs (bsc#1051510).\n- ALSA: hda/realtek - Fix pop noise on Lenovo P50 and co (bsc#1051510).\n- ALSA: hda/realtek - Fix the problem of two front mics on more machines (bsc#1051510).\n- ALSA: hda/realtek - Fixup for HP x360 laptops with BandO speakers (bsc#1096705).\n- ALSA: hda/realtek - Fixup mute led on HP Spectre x360 (bsc#1096705).\n- ALSA: hda/realtek - Refactor alc269_fixup_hp_mute_led_mic*() (bsc#1096705).\n- ALSA: hda/realtek - Update ALC255 depop optimize (bsc#1051510).\n- ALSA: hda/realtek - adjust the location of one mic (bsc#1051510).\n- ALSA: hda/realtek - change the location for one of two front mics (bsc#1051510).\n- ALSA: hda/realtek - set PINCFG_HEADSET_MIC to parse_flags (bsc#1051510).\n- ALSA: hda: Add ASRock H81M-HDS to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Clevo W35xSS_370SS to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Gigabyte P55A-UD3 and Z87-D3HP to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Icelake PCI ID (bsc#1051510).\n- ALSA: hda: Add Intel NUC5i7RY to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Intel NUC7i3BNB to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Lenovo C50 All in one to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: hda: add dock and led support for HP EliteBook 830 G5 (bsc#1051510).\n- ALSA: hda: add dock and led support for HP ProBook 640 G4 (bsc#1051510).\n- ALSA: hdspm: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: hiface: Add sanity checks for invalid EPs (bsc#1051510).\n- ALSA: line6: Add yet more sanity checks for invalid EPs (bsc#1051510).\n- ALSA: line6: Use correct endpoint type for midi output (bsc#1051510).\n- ALSA: line6: add support for POD HD DESKTOP (bsc#1051510).\n- ALSA: line6: add support for POD HD500X (bsc#1051510).\n- ALSA: line6: remove unnecessary initialization to PODHD500X (bsc#1051510).\n- ALSA: opl3: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: pcm: Avoid potential races between OSS ioctls and read/write (bsc#1051510).\n- ALSA: pcm: Check PCM state at xfern compat ioctl (bsc#1051510).\n- ALSA: pcm: Fix UAF at PCM release via PCM timer access (bsc#1051510).\n- ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation (bsc#1051510).\n- ALSA: pcm: Fix mutex unbalance in OSS emulation ioctls (bsc#1051510).\n- ALSA: pcm: Return -EBUSY for OSS ioctls changing busy streams (bsc#1051510).\n- ALSA: pcm: potential uninitialized return values (bsc#1051510).\n- ALSA: rawmidi: Fix missing input substream checks in compat ioctls (bsc#1051510).\n- ALSA: rme9652: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: seq: Fix UBSAN warning at SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT ioctl (bsc#1051510).\n- ALSA: seq: Fix races at MIDI encoding in snd_virmidi_output_trigger() (bsc#1051510).\n- ALSA: seq: oss: Fix unbalanced use lock for synth MIDI device (bsc#1051510).\n- ALSA: seq: oss: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: timer: Fix UBSAN warning at SNDRV_TIMER_IOCTL_NEXT_DEVICE ioctl (bsc#1051510).\n- ALSA: timer: Fix pause event notification (bsc#1051510).\n- ALSA: usb-audio: Add \u0027Keep Interface\u0027 control (bsc#1089467).\n- ALSA: usb-audio: Add a quirk for Nura\u0027s first gen headset (bsc#1051510).\n- ALSA: usb-audio: Add keep_iface flag (bsc#1089467).\n- ALSA: usb-audio: Add native DSD support for Luxman DA-06 (bsc#1051510).\n- ALSA: usb-audio: Add native DSD support for Mytek DACs (bsc#1051510).\n- ALSA: usb-audio: Add native DSD support for TEAC UD-301 (bsc#1051510).\n- ALSA: usb-audio: Add sample rate quirk for Plantronics C310/C520-M (bsc#1051510).\n- ALSA: usb-audio: Add sample rate quirk for Plantronics P610 (bsc#1051510).\n- ALSA: usb-audio: Add sanity checks for invalid EPs (bsc#1051510).\n- ALSA: usb-audio: Allow to override the longname string (bsc#1091678).\n- ALSA: usb-audio: Apply vendor ID matching for sample rate quirk (bsc#1051510).\n- ALSA: usb-audio: Avoid superfluous usb_set_interface() calls (bsc#1089467).\n- ALSA: usb-audio: Change the semantics of the enable option (bsc#1051510).\n- ALSA: usb-audio: Disable the quirk for Nura headset (bsc#1051510).\n- ALSA: usb-audio: FIX native DSD support for TEAC UD-501 DAC (bsc#1051510).\n- ALSA: usb-audio: Generic DSD detection for XMOS-based implementations (bsc#1051510).\n- ALSA: usb-audio: Give proper vendor/product name for Dell WD15 Dock (bsc#1091678).\n- ALSA: usb-audio: Initialize Dell Dock playback volumes (bsc#1089467).\n- ALSA: usb-audio: Integrate native DSD support for ITF-USB based DACs (bsc#1051510).\n- ALSA: usb-audio: Remove explicitly listed Mytek devices (bsc#1051510).\n- ALSA: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658).\n- ALSA: usb-audio: Support changing input on Sound Blaster E1 (bsc#1051510).\n- ALSA: usb-audio: add boot quirk for Axe-Fx III (bsc#1051510).\n- ALSA: usb-audio: add more quirks for DSD interfaces (bsc#1051510).\n- ALSA: usb-audio: simplify set_sync_ep_implicit_fb_quirk (bsc#1051510).\n- ALSA: usb: mixer: volume quirk for CM102-A+/102S+ (bsc#1051510).\n- ALSA: usx2y: Add sanity checks for invalid EPs (bsc#1051510).\n- ALSA: usx2y: Fix invalid stream URBs (bsc#1051510).\n- ALSA: vmaster: Propagate slave error (bsc#1051510).\n- ASoC: Intel: Skylake: Disable clock gating during firmware and library download (bsc#1051510).\n- ASoC: Intel: cht_bsw_rt5645: Analog Mic support (bsc#1051510).\n- ASoC: Intel: sst: remove redundant variable dma_dev_name (bsc#1051510).\n- ASoC: adau17x1: Handling of DSP_RUN register during fw setup (bsc#1051510).\n- ASoC: cirrus: i2s: Fix LRCLK configuration (bsc#1051510).\n- ASoC: cirrus: i2s: Fix {TX|RX}LinCtrlData setup (bsc#1051510).\n- ASoC: cs35l35: Add use_single_rw to regmap config (bsc#1051510).\n- ASoC: dapm: delete dapm_kcontrol_data paths list before freeing it (bsc#1051510).\n- ASoC: fsl_esai: Fix divisor calculation failure at lower ratio (bsc#1051510).\n- ASoC: hdmi-codec: Fix module unloading caused kernel crash (bsc#1051510).\n- ASoC: hdmi-codec: fix spelling mistake: \u0027deteced\u0027 -\u003e \u0027detected\u0027 (bsc#1051510).\n- ASoC: hdmi-codec: remove multi detection support (bsc#1051510).\n- ASoC: omap: Remove OMAP_MUX dependency from Nokia N810 audio support (bsc#1051510).\n- ASoC: rockchip: Fix dai_name for HDMI codec (bsc#1051510).\n- ASoC: rockchip: rk3288-hdmi-analog: Select needed codecs (bsc#1051510).\n- ASoC: rsnd: mark PM functions __maybe_unused (bsc#1051510).\n- ASoC: rt5514: Add the missing register in the readable table (bsc#1051510).\n- ASoC: samsung: i2s: Ensure the RCLK rate is properly determined (bsc#1051510).\n- ASoC: samsung: odroid: Drop requirement of clocks in the sound node (bsc#1051510).\n- ASoC: samsung: odroid: Fix 32000 sample rate handling (bsc#1051510).\n- ASoC: samsung: odroid: Fix EPLL frequency values (bsc#1051510).\n- ASoC: ssm2602: Replace reg_default_raw with reg_default (bsc#1051510).\n- ASoC: topology: Check widget kcontrols before deref (bsc#1051510).\n- ASoC: topology: Check widget kcontrols before deref (bsc#1051510).\n- ASoC: topology: Fix bugs of freeing soc topology (bsc#1051510).\n- ASoC: topology: Fix kcontrol name string handling (bsc#1051510).\n- ASoC: topology: create TLV data for dapm widgets (bsc#1051510).\n- ASoC: topology: fix some tiny memory leaks (bsc#1051510).\n- Bluetooth: Add a new 04ca:3015 QCA_ROME device (bsc#1051510).\n- Bluetooth: Apply QCA Rome patches for some ATH3012 models (bsc#1082504).\n- Bluetooth: Fix missing encryption refresh on Security Request (bsc#1051510).\n- Bluetooth: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for BTUSB_QCA_ROME (bsc#1051510).\n- Bluetooth: btrtl: Fix a error code in rtl_load_config() (bsc#1051510).\n- Bluetooth: btusb: Add Dell XPS 13 9360 to btusb_needs_reset_resume_table (bsc#1051510).\n- Bluetooth: btusb: Add USB ID 7392:a611 for Edimax EW-7611ULB (bsc#1051510).\n- Bluetooth: btusb: Add device ID for RTL8822BE (bsc#1051510).\n- Bluetooth: btusb: Only check needs_reset_resume DMI table for QCA rome chipsets (bsc#1051510).\n- Bluetooth: btusb: add ID for LiteOn 04ca:3016 (bsc#1051510).\n- Bluetooth: hci_bcm: Add 6 new ACPI HIDs (bsc#1051510).\n- Bluetooth: hci_bcm: Add active_low irq polarity quirk for Asus T100CHI (bsc#1051510).\n- Bluetooth: hci_bcm: Add support for BCM2E72 (bsc#1051510).\n- Bluetooth: hci_bcm: Add support for MINIX Z83-4 based devices (bsc#1051510).\n- Bluetooth: hci_bcm: Fix setting of irq trigger type (bsc#1051510).\n- Bluetooth: hci_bcm: Handle empty packet after firmware loading (bsc#1051510).\n- Bluetooth: hci_bcm: Make bcm_request_irq fail if no IRQ resource (bsc#1051510).\n- Bluetooth: hci_bcm: Remove DMI quirk for the MINIX Z83-4 (bsc#1051510).\n- Bluetooth: hci_bcm: Treat Interrupt ACPI resources as always being active-low (bsc#1051510).\n- Bluetooth: hci_qca: Avoid missing rampatch failure with userspace fw loader (bsc#1051510).\n- Btrfs: fix copy_items() return value when logging an inode (bsc#1097105).\n- Btrfs: fix xattr loss after power failure (bsc#1097105).\n- Btrfs: use btrfs_op instead of bio_op in __btrfs_map_block (bsc#1099918).\n- Correct bug reference in the patch (bnc#1095155)\n- Delete patches.arch/powerpc64-ftrace-Use-the-generic-version-of-ftrace_r.patch (bsc#1088804).\n- Downgrade printk level for MMC SDHCI host version error (bsc#1097941).\n- Fix kABI breakage due to acpi_ec gpe field change (bsc#1051510).\n- Fix kABI breakage due to snd_usb_audio_quirk profile_name addition (bsc#1091678).\n- Fix kABI breakage due to sound/timer.h inclusion (bsc#1051510).\n- Fix kABI breakage for iwl_fw_runtime_ops change (bsc#1051510).\n- Fix kABI breakage for iwlwifi (bsc#1051510).\n- Fix kABI breakage of iio_buffer (bsc#1051510).\n- Fix kABI incompatibility by snd_pcm_oss_runtime.rw_ref addition (bsc#1051510).\n- Fix the build error in adau17x1 soc driver (bsc#1051510)\n- Fix the build of da9063_wdt module (bsc#1100843) Backport the missing prerequisite commit, move the previous fixes into the sorted section and refresh.\n- GFS2: Take inode off order_write list when setting jdata flag (bsc#1052766).\n- HID: add backlight level quirk for Asus ROG laptops (bsc#1101324).\n- HID: cp2112: fix broken gpio_direction_input callback (bsc#1051510).\n- HID: debug: check length before copy_to_user() (bsc#1051510).\n- HID: hiddev: fix potential Spectre v1 (bsc#1051510).\n- HID: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bsc#1051510).\n- HID: i2c-hid: Fix \u0027incomplete report\u0027 noise (bsc#1051510).\n- HID: i2c-hid: fix size check and type usage (bsc#1051510).\n- HID: intel-ish-hid: Enable Gemini Lake ish driver (bsc#1073765,).\n- HID: intel-ish-hid: use put_device() instead of kfree() (bsc#1051510).\n- HID: intel_ish-hid: ipc: register more pm callbacks to support hibernation (bsc#1051510).\n- HID: lenovo: Add support for IBM/Lenovo Scrollpoint mice (bsc#1051510).\n- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bsc#1051510).\n- HID: wacom: Add support for One by Wacom (CTL-472 / CTL-672) (bsc#1100633).\n- HID: wacom: Correct logical maximum Y for 2nd-gen Intuos Pro large (bsc#1051510).\n- HID: wacom: Correct touch maximum XY of 2nd-gen Intuos (bsc#1051510).\n- HID: wacom: EKR: ensure devres groups at higher indexes are released (bsc#1051510).\n- HID: wacom: Fix reporting of touch toggle (WACOM_HID_WD_MUTE_DEVICE) events (bsc#1051510).\n- HID: wacom: Release device resource data obtained by devres_alloc() (bsc#1051510).\n- HID: wacom: bluetooth: send exit report for recent Bluetooth devices (bsc#1051510).\n- IB/Hfi1: Read CCE Revision register to verify the device is responsive (bsc#1096793).\n- IB/core: Generate GID change event regardless of RoCE GID table property (bsc#1046306).\n- IB/core: Refer to RoCE port property instead of GID table property (bsc#1046306).\n- IB/cq: Do not force IB_POLL_DIRECT poll context for ib_process_cq_direct (bsc#1046306).\n- IB/hfi1 Use correct type for num_user_context (bsc#1096793).\n- IB/hfi1: Add a safe wrapper for _rcd_get_by_index (bsc#1096793).\n- IB/hfi1: Add tx_opcode_stats like the opcode_stats (bsc#1096793).\n- IB/hfi1: Complete check for locally terminated smp (bsc#1096793).\n- IB/hfi1: Compute BTH only for RDMA_WRITE_LAST/SEND_LAST packet (bsc#1096793).\n- IB/hfi1: Convert PortXmitWait/PortVLXmitWait counters to flit times (bsc#1096793).\n- IB/hfi1: Create common functions for affinity CPU mask operations (bsc#1096793).\n- IB/hfi1: Do not allocate PIO send contexts for VNIC (bsc#1096793).\n- IB/hfi1: Do not modify num_user_contexts module parameter (bsc#1096793).\n- IB/hfi1: Do not override given pcie_pset value (bsc#1096793).\n- IB/hfi1: Ensure VL index is within bounds (bsc#1096793).\n- IB/hfi1: Fix NULL pointer dereference when invalid num_vls is used (bsc#1060463).\n- IB/hfi1: Fix a wrapping test to insure the correct timeout (bsc#1096793).\n- IB/hfi1: Fix for early release of sdma context (bsc#1096793).\n- IB/hfi1: Fix handling of FECN marked multicast packet (bsc#1060463).\n- IB/hfi1: Fix loss of BECN with AHG (bsc#1096793).\n- IB/hfi1: Fix memory leak in exception path in get_irq_affinity() (bsc#1096793).\n- IB/hfi1: Fix serdes loopback set-up (bsc#1096793).\n- IB/hfi1: Handle initial value of 0 for CCTI setting (bsc#1096793).\n- IB/hfi1: Inline common calculation (bsc#1096793).\n- IB/hfi1: Insure int mask for in-kernel receive contexts is clear (bsc#1096793).\n- IB/hfi1: Look up ibport using a pointer in receive path (bsc#1096793).\n- IB/hfi1: Optimize kthread pointer locking when queuing CQ entries (bsc#1096793).\n- IB/hfi1: Optimize packet type comparison using 9B and bypass code paths (bsc#1096793).\n- IB/hfi1: Prevent LNI hang when LCB can\u0027t obtain lanes (bsc#1096793).\n- IB/hfi1: Prohibit invalid Init to Armed state transition (bsc#1096793).\n- IB/hfi1: Race condition between user notification and driver state (bsc#1096793).\n- IB/hfi1: Re-order IRQ cleanup to address driver cleanup race (bsc#1060463).\n- IB/hfi1: Refactor assign_ctxt() IOCTL (bsc#1096793).\n- IB/hfi1: Refactor get_base_info (bsc#1096793).\n- IB/hfi1: Refactor get_ctxt_info (bsc#1096793).\n- IB/hfi1: Refactor get_user() IOCTLs (bsc#1096793).\n- IB/hfi1: Refactor hfi_user_exp_rcv_clear() IOCTLs (bsc#1096793).\n- IB/hfi1: Refactor hfi_user_exp_rcv_invalid() IOCTLs (bsc#1096793).\n- IB/hfi1: Refactor hfi_user_exp_rcv_setup() IOCTL (bsc#1096793).\n- IB/hfi1: Remove unused hfi1_cpulist variables (bsc#1096793).\n- IB/hfi1: Reorder incorrect send context disable (bsc#1096793).\n- IB/hfi1: Return correct value for device state (bsc#1096793).\n- IB/hfi1: Send \u0027reboot\u0027 as planned down remote reason (bsc#1096793).\n- IB/hfi1: Set port number for errorinfo MAD response (bsc#1096793).\n- IB/hfi1: Show fault stats in both TX and RX directions (bsc#1096793).\n- IB/hfi1: Update HFI to use the latest PCI API (bsc#1096793).\n- IB/hfi1: Use after free race condition in send context error path (bsc#1096793).\n- IB/hfi1: Validate PKEY for incoming GSI MAD packets (bsc#1096793).\n- IB/ipoib: Avoid memory leak if the SA returns a different DGID (bsc#1046307).\n- IB/ipoib: Change number of TX wqe to 64 (bsc#1096793).\n- IB/ipoib: Fix for notify send CQ failure messages (bsc#1096793).\n- IB/ipoib: Fix for potential no-carrier state (bsc#1046307).\n- IB/ipoib: Get rid of the tx_outstanding variable in all modes (bsc#1096793).\n- IB/ipoib: Use NAPI in UD/TX flows (bsc#1096793).\n- IB/mlx4: Fix integer overflow when calculating optimal MTT size (bsc#1071218).\n- IB/mlx4: Move mlx4_uverbs_ex_query_device_resp to include/uapi/ (bsc#1071218).\n- IB/mlx5: Enable ECN capable bits for UD RoCE v2 QPs (bsc#1046305).\n- IB/mlx5: Respect new UMR capabilities (bsc#1093205).\n- IB/mlx5: Set the default active rate and width to QDR and 4X (bsc#1046305).\n- IB/mlx5: Use unlimited rate when static rate is not supported (bsc#1046305).\n- IB/mlx5:: pr_err() and mlx5_ib_dbg() strings should end with newlines (bsc#1093205).\n- IB/rdmavt: Add trace for RNRNAK timer (bsc#1096793).\n- IB/rdmavt: Allocate CQ memory on the correct node (bsc#1058717).\n- IB/rdmavt: No need to cancel RNRNAK retry timer when it is running (bsc#1096793).\n- IB/rdmavt: Use correct numa node for SRQ allocation (bsc#1096793).\n- IB/srp: Fix completion vector assignment algorithm (bsc#1046306).\n- IB/srp: Fix srp_abort() (bsc#1046306).\n- IB/srpt: Fix an out-of-bounds stack access in srpt_zerolength_write() (bsc#1046306).\n- IB/uverbs: Fix validating mandatory attributes (bsc#1046306).\n- IB/{hfi1, qib}: Add handling of kernel restart (bsc#1096793).\n- IB/{hfi1, rdmavt}: Fix memory leak in hfi1_alloc_devdata() upon failure (bsc#1096793).\n- IB/{rdmavt,hfi1}: Change hrtimer add to use pinned version (bsc#1096793).\n- Input: ALPS - fix TrackStick detection on Thinkpad L570 and Latitude 7370 (bsc#1051510).\n- Input: atmel_mxt_ts - add touchpad button mapping for Samsung Chromebook Pro (bsc#1051510).\n- Input: atmel_mxt_ts - fix the firmware update (bsc#1051510).\n- Input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (bsc#1051510).\n- Input: elan_i2c - add ELAN0618 (Lenovo v330 15IKB) ACPI ID (bsc#1051510).\n- Input: elan_i2c_smbus - fix corrupted stack (bsc#1051510).\n- Input: elan_i2c_smbus - fix more potential stack buffer overflows (bsc#1051510).\n- Input: elantech - enable middle button of touchpads on ThinkPad P52 (bsc#1051510).\n- Input: elantech - fix V4 report decoding for module with middle key (bsc#1051510).\n- Input: goodix - add new ACPI id for GPD Win 2 touch screen (bsc#1051510).\n- Input: goodix - disable IRQs while suspended (bsc#1051510).\n- Input: i8042 - add Lenovo ThinkPad L460 to i8042 reset list (bsc#1051510).\n- Input: i8042 - enable MUX on Sony VAIO VGN-CS series to fix touchpad (bsc#1051510).\n- Input: leds - fix out of bound access (bsc#1051510).\n- Input: synaptics - Lenovo Carbon X1 Gen5 (2017) devices should use RMI (bsc#1051510).\n- Input: synaptics - Lenovo Thinkpad X1 Carbon G5 (2017) with Elantech trackpoints should use RMI (bsc#1051510).\n- Input: synaptics - add Intertouch support on X1 Carbon 6th and X280 (bsc#1051510).\n- Input: synaptics - add Lenovo 80 series ids to SMBus (bsc#1051510).\n- Input: synaptics - reset the ABS_X/Y fuzz after initializing MT axes (bsc#1051510).\n- Input: synaptics-rmi4 - fix an unchecked out of memory error path (bsc#1051510).\n- Input: synaptics: Add intertouch blacklist for Thinkpad Helix (bsc#1090457).\n- Input: xpad - add GPD Win 2 Controller USB IDs (bsc#1051510).\n- Input: xpad - fix GPD Win 2 controller name (bsc#1051510).\n- Input: xpad - sync supported devices with 360Controller (bsc#1051510).\n- Input: xpad - sync supported devices with XBCD (bsc#1051510).\n- KABI protect struct nd_region ().\n- KABI: hide ftrace_enabled in paca (bsc#1088804).\n- KEYS: DNS: limit the length of option strings (networking-stable-18_04_26).\n- KEYS: Use individual pages in big_key for crypto buffers (bsc#1051510).\n- KVM: MMU: consider host cache mode in MMIO page check (bsc#1087213).\n- KVM: PPC: Book3S HV: Fix ppc_breakpoint_available compile error (bsc#1061840).\n- KVM: PPC: Book3S HV: Handle migration with POWER9 disabled DAWR (bsc#1061840).\n- KVM: PPC: Book3S HV: Return error from h_set_dabr() on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Return error from h_set_mode(SET_DAWR) on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: trace_tlbie must not be called in realmode (bsc#1061840).\n- MD: Free bioset when md_run fails (bsc#1093023).\n- Move upstreamed ideapad-laptop patch to sorted section (bsc#1093035)\n- NET: usb: qmi_wwan: add support for ublox R410M PID 0x90b2 (bsc#1090888).\n- NFC: fix device-allocation error return (bsc#1051510).\n- NFC: llcp: Limit size of SDP URI (bsc#1051510).\n- NFC: pn533: do not send USB data off of the stack (bsc#1051510).\n- NFS: Revert \u0027NFS: Move the flock open mode check into nfs_flock()\u0027 (bsc#1098983).\n- NFSv4: Revert commit 5f83d86cf531d (\u0027NFSv4.x: Fix wraparound issues..\u0027) (git-fixes).\n- PCI/ASPM: Add L1 Substates definitions (bsc#1051510).\n- PCI/ASPM: Calculate LTR_L1.2_THRESHOLD from device characteristics (bsc#1051510).\n- PCI/DPC: Do not enable DPC if AER control is not allowed by the BIOS (bsc#1093184).\n- PCI/PME: Handle invalid data when reading Root Status (bsc#1051510).\n- PCI: Add ACS quirk for Intel 300 series (bsc#1051510).\n- PCI: Add ACS quirk for Intel 7th and 8th Gen mobile (bsc#1051510).\n- PCI: Add function 1 DMA alias quirk for Highpoint RocketRAID 644L (bsc#1051510).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9220 (bsc#1051510).\n- PCI: Add function 1 DMA alias quirk for Marvell 9128 (bsc#1051510).\n- PCI: Create SR-IOV virtfn/physfn links before attaching driver (bsc#1051510).\n- PCI: Detach driver before procfs and sysfs teardown on device remove (bsc#1051510).\n- PCI: Mark Broadcom HT1100 and HT2000 Root Port Extended Tags as broken (bsc#1051510).\n- PCI: Remove messages about reassigning resources (bsc#1051510).\n- PCI: Restore config space on runtime resume despite being unbound (bsc#1051510).\n- PCI: aardvark: Fix PCIe Max Read Request Size setting (bsc#1051510).\n- PCI: aardvark: Fix logic in advk_pcie_{rd,wr}_conf() (bsc#1051510).\n- PCI: aardvark: Set PIO_ADDR_LS correctly in advk_pcie_rd_conf() (bsc#1051510).\n- PCI: aardvark: Use ISR1 instead of ISR0 interrupt in legacy irq mode (bsc#1051510).\n- PCI: designware-ep: Fix find_first_zero_bit() usage (bsc#1051510).\n- PCI: hv: Fix a __local_bh_enable_ip warning in hv_compose_msi_msg() (bnc#1094541).\n- PCI: pciehp: Clear Presence Detect and Data Link Layer Status Changed on resume (bsc#1051510).\n- PCI: shpchp: Enable bridge bus mastering if MSI is enabled (bsc#1051510).\n- PM / OPP: Add missing of_node_put(np) (bsc#1051510).\n- PM / OPP: Call notifier without holding opp_table-\u003elock (bsc#1051510).\n- PM / OPP: Move error message to debug level (bsc#1051510).\n- PM / devfreq: Fix potential NULL pointer dereference in governor_store (bsc#1051510).\n- PM / s2idle: Clear the events_check_enabled flag (bsc#1051510).\n- PM / wakeirq: Fix unbalanced IRQ enable for wakeirq (bsc#1051510).\n- PM: docs: Drop an excess character from devices.rst (bsc#1051510).\n- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).\n- Preliminary series sort\n- RDMA/bnxt_re: Fix broken RoCE driver due to recent L2 driver changes (bsc#1086283).\n- RDMA/bnxt_re: Remove redundant bnxt_qplib_disable_nq() call (bsc#1086283).\n- RDMA/core: Avoid that ib_drain_qp() triggers an out-of-bounds stack access (bsc#1046306).\n- RDMA/core: Reduce poll batch for direct cq polling (bsc#1046306).\n- RDMA/i40iw: Avoid panic when reading back the IRQ affinity hint (bsc#1084001).\n- RDMA/mlx4: Fix uABI structure layouts for 32/64 compat (bsc#1071218).\n- RDMA/mlx5: Fix crash while accessing garbage pointer and freed memory (bsc#1046305).\n- RDMA/mlx5: Protect from NULL pointer derefence (bsc#1046305).\n- RDMA/ocrdma: Fix permissions for OCRDMA_RESET_STATS (bsc#1058513).\n- RDMA/rxe: Fix an out-of-bounds read (bsc#1050662).\n- RDMA/ucma: Allow resolving address w/o specifying source address (bsc#1046306).\n- RDMA/ucma: Introduce safer rdma_addr_size() variants (bsc#1046306).\n- RDMAVT: Fix synchronization around percpu_ref (bsc#1058717).\n- RDS: Check cmsg_len before dereferencing CMSG_DATA (networking-stable-17_12_31).\n- README.BRANCH: add Takashi as co-maintainer\n- Re-sort some patches to match SLE15\n- Refresh patches.suse/btrfs-use-kvzalloc-to-allocate-btrfs_fs_info.patch - Fixed References (bsc#1062897). \n- Remove the old fallback for iTCO/WDAT conflict (bsc#1073960) Now the upstream fix is included, so let\u0027s rip off the old trickery.\n- Revert \u0027Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174\u0027 (bsc#1051510).\n- Revert \u0027Remove patces for bug 1087405 due to regression\u0027 This reverts commit f91a2ea5192d9e933c41600da5d1543155df381c.\n- Revert \u0027ath10k: send (re)assoc peer command when NSS changed\u0027 (bsc#1051510).\n- Revert \u0027drm/i915/edp: Allow alternate fixed mode for eDP if available.\u0027 (bsc#1093604).\n- Revert \u0027kernel-binary: do not package extract-cert when not signing modules\u0027 This reverts commit 10a8bc496a553b8069d490a8ae7508bdb19f58d9.\n- Revert \u0027rt2800: use TXOP_BACKOFF for probe frames\u0027 (bsc#1051510).\n- Revert \u0027scsi: core: return BLK_STS_OK for DID_OK in __scsi_error_from_host_byte()\u0027 (bsc#1099918).\n- Sort series.conf\n- USB: Accept bulk endpoints with 1024-byte maxpacket (bsc#1092888).\n- USB: serial: pl2303: new device id for Chilitag (bsc#1087092).\n- USB: serial: simple: add Motorola Tetra driver (bsc#1087092).\n- USB:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bsc#1090888).\n- Update patches.fixes/vti-fix-use-after-free-in-vti_tunnel_xmit-vti6_tnl_x.patch (bsc#1076830 networking-stable-17_10_09).\n- Update patches.suse/ceph-quota-add-counter-for-snaprealms-with-quota.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-add-initial-infrastructure-to-support-cephfs-quotas.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-cache-inode-pointer-in-ceph_snap_realm.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-don-t-allow-cross-quota-renames.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-support-for-ceph-quota-max_bytes.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-support-for-ceph-quota-max_files.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-update-mds-when-max_bytes-is-approaching.patch (bsc#1089115).\n- Update for above change patches.drivers/0003-md-cluster-Suspend-writes-in-RAID10-if-within-range.patch (bsc#1093023).\n- Update patches.suse/ceph-don-t-check-quota-for-snap-inode.patch (bsc#1089115).\n- Update patches.suse/ceph-fix-root-quota-realm-check.patch (bsc#1089115).\n- X.509: fix BUG_ON() when hash algorithm is unsupported (bsc#1051510).\n- X.509: fix NULL dereference when restricting key with unsupported_sig (bsc#1051510).\n- X.509: fix comparisons of -\u003epkey_algo (bsc#1051510).\n- X.509: reject invalid BIT STRING for subjectPublicKey (bsc#1051510).\n- acpi, nfit: quiet invalid block-aperture-region warnings (bsc#1091781).\n- acpi, nfit: rework NVDIMM leaf method detection (bsc#1091782).\n- acpi: Add helper for deactivating memory region (bsc#1100132).\n- acpi: nfit: Add support for detect platform CPU cache flush on power loss (bsc#1091424).\n- acpi: nfit: add persistent memory control flag for nd_region (bsc#1091424).\n- adding missing rcu_read_unlock in ipxip6_rcv (networking-stable-17_12_31).\n- af_netlink: ensure that NLMSG_DONE never fails in dumps (networking-stable-17_11_20).\n- afs: Connect up the CB.ProbeUuid (bsc#1052766).\n- afs: Fix missing error handling in afs_write_end() (bsc#1052766).\n- amd-xgbe: Add pre/post auto-negotiation phy hooks (networking-stable-18_04_26).\n- amd-xgbe: Improve KR auto-negotiation and training (networking-stable-18_04_26).\n- amd-xgbe: Only use the SFP supported transceiver signals (networking-stable-18_04_26).\n- amd-xgbe: Restore PCI interrupt enablement setting on resume (networking-stable-18_03_07).\n- apparmor: fix dangling symlinks to policy rawdata after replacement (bsc#1095893).\n- apparmor: fix display of .ns_name for containers (bsc#1095893).\n- apparmor: fix logging of the existence test for signals (bsc#1095893).\n- apparmor: fix memory leak on buffer on error exit path (bsc#1095893).\n- arch/*: Kconfig: fix documentation for NMI watchdog (bsc#1099918).\n- arm/arm64: smccc: Add SMCCC-specific return codes (bsc#1085308).\n- arm64: Add \u0027ssbd\u0027 command-line option (bsc#1085308).\n- arm64: Add ARCH_WORKAROUND_2 probing (bsc#1085308).\n- arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 (bsc#1085308).\n- arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 (bsc#1085308).\n- arm64: alternatives: Add dynamic patching feature (bsc#1085308).\n- arm64: fix endianness annotation for __apply_alternatives()/get_alt_insn() (bsc#1085308).\n- arm64: ssbd: Add global mitigation state accessor (bsc#1085308).\n- arm64: ssbd: Add prctl interface for per-thread mitigation (bsc#1085308).\n- arm64: ssbd: Introduce thread flag to control userspace mitigation (bsc#1085308).\n- arm64: ssbd: Restore mitigation status on CPU resume (bsc#1085308).\n- arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation (bsc#1085308).\n- arp: fix arp_filter on l3slave devices (networking-stable-18_04_10).\n- ath10k: Fix kernel panic while using worker (ath10k_sta_rc_update_wk) (bsc#1051510).\n- ath10k: correct target assert problem due to CE5 stuck (bsc#1051510).\n- ath10k: search all IEs for variant before falling back (bsc#1051510).\n- ath9k: fix crash in spectral scan (bsc#1051510).\n- auxdisplay: fix broken menu (bsc#1051510).\n- auxdisplay: img-ascii-lcd: Only build on archs that have IOMEM (bsc#1051510).\n- auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- backlight: as3711_bl: Fix Device Tree node lookup (bsc#1051510).\n- backlight: max8925_bl: Fix Device Tree node lookup (bsc#1051510).\n- backlight: tdo24m: Fix the SPI CS between transfers (bsc#1051510).\n- backlight: tps65217_bl: Fix Device Tree node lookup (bsc#1051510).\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1093023).\n- bcache: Annotate switch fall-through (bsc#1093023).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1093023).\n- bcache: Fix indentation (bsc#1093023).\n- bcache: Fix kernel-doc warnings (bsc#1093023).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1093023).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1093023).\n- bcache: Remove an unused variable (bsc#1093023).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1093023).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1093023).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1093023).\n- bcache: add backing_request_endio() for bi_end_io (bsc#1093023).\n- bcache: add io_disable to struct cached_dev (bsc#1093023).\n- bcache: add journal statistic (bsc#1093023).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1093023).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1093023).\n- bcache: allow quick writeback when backing idle (bsc#1093023).\n- bcache: closures: move control bits one bit right (bsc#1093023).\n- bcache: comment on direct access to bvec table (bsc#1093023).\n- bcache: correct flash only vols (check all uuids) (bsc#1093023).\n- bcache: count backing device I/O error for writeback I/O (bsc#1093023).\n- bcache: fix cached_dev-\u003ecount usage for bch_cache_set_error() (bsc#1093023).\n- bcache: fix error return value in memory shrink (bsc#1093023).\n- bcache: fix for allocator and register thread race (bsc#1093023).\n- bcache: fix for data collapse after re-attaching an attached device (bsc#1093023).\n- bcache: fix high CPU occupancy during journal (bsc#1093023).\n- bcache: fix inaccurate io state for detached bcache devices (bsc#1093023).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1093023).\n- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1093023).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1093023).\n- bcache: fix unmatched generic_end_io_acct() and generic_start_io_acct() (bsc#1093023).\n- bcache: fix using of loop variable in memory shrink (bsc#1093023).\n- bcache: fix writeback target calc on large devices (bsc#1093023).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1093023).\n- bcache: mark closure_sync() __sched (bsc#1093023).\n- bcache: move closure debug file into debug directory (bsc#1093023).\n- bcache: properly set task state in bch_writeback_thread() (bsc#1093023).\n- bcache: quit dc-\u003ewriteback_thread when BCACHE_DEV_DETACHING is set (bsc#1093023).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1093023).\n- bcache: ret IOERR when read meets metadata error (bsc#1093023).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1093023).\n- bcache: return attach error when no cache set exist (bsc#1093023).\n- bcache: segregate flash only volume write streams (bsc#1093023).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1093023).\n- bcache: set dc-\u003eio_disable to true in conditional_stop_bcache_device() (bsc#1093023).\n- bcache: set error_limit correctly (bsc#1093023).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1093023).\n- bcache: stop dc-\u003ewriteback_rate_update properly (bsc#1093023).\n- bcache: stop writeback thread after detaching (bsc#1093023).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1093023).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1093023).\n- bcache: writeback: properly order backing device IO (bsc#1093023).\n- bdi: Fix oops in wb_workfn() (bsc#1052766).\n- bdi: wake up concurrent wb_shutdown() callers (bsc#1052766).\n- be2net: Fix HW stall issue in Lancer (bsc#1086288).\n- be2net: Fix error detection logic for BE3 (bsc#1050252).\n- be2net: Handle transmit completion errors in Lancer (bsc#1086288).\n- bfq-iosched: ensure to clear bic/bfqq pointers when preparing request (bsc#1052766).\n- bfq: Re-enable auto-loading when built as a module (bsc#1099918).\n- bio-integrity: move the bio integrity profile check earlier in bio_integrity_prep (bsc#1093023).\n- bitmap: fix memset optimization on big-endian systems (bsc#1051510).\n- bitops: Introduce assign_bit() (bsc#1093023).\n- blacklist.conf: blacklist further commits not needed (bsc#1085933, bsc#1085938, bsc#1085939)\n- blacklist.conf: blacklist tools specific change bsc#1085941\n- blk-mq-debugfs: fix device sched directory for default scheduler (bsc#1099918).\n- blk-mq: do not keep offline CPUs mapped to hctx 0 (bsc#1099918).\n- blk-mq: make sure hctx-\u003enext_cpu is set correctly (bsc#1099918).\n- blk-mq: make sure that correct hctx-\u003enext_cpu is set (bsc#1099918).\n- blk-mq: reinit q-\u003etag_set_list entry only after grace period (bsc#1099918).\n- blk-mq: simplify queue mapping and schedule with each possisble CPU (bsc#1099918).\n- block, bfq: add missing invocations of bfqg_stats_update_io_add/remove (bsc#1099918).\n- block, bfq: fix occurrences of request finish method\u0027s old name (bsc#1099918).\n- block, bfq: put async queues for root bfq groups too (bsc#1052766).\n- block/loop: fix deadlock after loop_set_status (bsc#1052766).\n- block/swim: Remove extra put_disk() call from error path (bsc#1099918).\n- block: Add comment to submit_bio_wait() (bsc#1093023).\n- block: Fix __bio_integrity_endio() documentation (bsc#1099918).\n- block: Fix cloning of requests with a special payload (bsc#1099918).\n- block: Set BIO_TRACE_COMPLETION on new bio during split (bsc#1052766).\n- block: cope with WRITE ZEROES failing in blkdev_issue_zeroout() (bsc#1099918).\n- block: factor out __blkdev_issue_zero_pages() (bsc#1099918).\n- block: sed-opal: Fix a couple off by one bugs (bsc#1099918).\n- bnx2x: Collect the device debug information during Tx timeout (bsc#1086323).\n- bnx2x: Deprecate pci_get_bus_and_slot() (bsc#1086323).\n- bnx2x: Replace doorbell barrier() with wmb() (bsc#1086323).\n- bnx2x: Use NETIF_F_GRO_HW (bsc#1086323).\n- bnx2x: Use pci_ari_enabled() instead of local copy (bsc#1086323).\n- bnx2x: fix slowpath null crash (bsc#1086323).\n- bnx2x: fix spelling mistake: \u0027registeration\u0027 -\u003e \u0027registration\u0027 (bsc#1086323).\n- bnx2x: use the right constant (bsc#1086323).\n- bnxt_en: Add BCM5745X NPAR device IDs (bsc#1086282).\n- bnxt_en: Add IRQ remapping logic (bsc#1086282).\n- bnxt_en: Add TC to hardware QoS queue mapping logic (bsc#1086282).\n- bnxt_en: Add ULP calls to stop and restart IRQs (bsc#1086282).\n- bnxt_en: Add cache line size setting to optimize performance (bsc#1086282).\n- bnxt_en: Add extended port statistics support (bsc#1086282).\n- bnxt_en: Add support for ndo_set_vf_trust (bsc#1086282).\n- bnxt_en: Add the new firmware API to query hardware resources (bsc#1086282).\n- bnxt_en: Adjust default rings for multi-port NICs (bsc#1086282).\n- bnxt_en: Always forward VF MAC address to the PF (bsc#1086282).\n- bnxt_en: Change IRQ assignment for RDMA driver (bsc#1086282).\n- bnxt_en: Check max_tx_scheduler_inputs value from firmware (bsc#1086282).\n- bnxt_en: Check the lengths of encapsulated firmware responses (bsc#1086282).\n- bnxt_en: Check unsupported speeds in bnxt_update_link() on PF only (bsc#1086282).\n- bnxt_en: Display function level rx/tx_discard_pkts via ethtool (bsc#1086282).\n- bnxt_en: Do not allow VF to read EEPROM (bsc#1086282).\n- bnxt_en: Do not reserve rings on VF when min rings were not provisioned by PF (bsc#1086282).\n- bnxt_en: Do not set firmware time from VF driver on older firmware (bsc#1086282).\n- bnxt_en: Eliminate duplicate barriers on weakly-ordered archs (bsc#1086282).\n- bnxt_en: Expand bnxt_check_rings() to check all resources (bsc#1086282).\n- bnxt_en: Fix NULL pointer dereference at bnxt_free_irq() (bsc#1086282).\n- bnxt_en: Fix ethtool -x crash when device is down (bsc#1086282).\n- bnxt_en: Fix firmware message delay loop regression (bsc#1086282).\n- bnxt_en: Fix regressions when setting up MQPRIO TX rings (bsc#1086282).\n- bnxt_en: Fix vnic accounting in the bnxt_check_rings() path (bsc#1086282).\n- bnxt_en: Forward VF MAC address to the PF (bsc#1086282).\n- bnxt_en: Ignore src port field in decap filter nodes (bsc#1050242).\n- bnxt_en: Implement new method for the PF to assign SRIOV resources (bsc#1086282).\n- bnxt_en: Implement new method to reserve rings (bsc#1086282).\n- bnxt_en: Improve resource accounting for SRIOV (bsc#1086282).\n- bnxt_en: Improve ring allocation logic (bsc#1086282).\n- bnxt_en: Improve valid bit checking in firmware response message (bsc#1086282).\n- bnxt_en: Include additional hardware port statistics in ethtool -S (bsc#1086282).\n- bnxt_en: Increase RING_IDLE minimum threshold to 50 (bsc#1086282).\n- bnxt_en: Need to include RDMA rings in bnxt_check_rings() (bsc#1086282).\n- bnxt_en: Pass complete VLAN TCI to the stack (bsc#1086282).\n- bnxt_en: Read phy eeprom A2h address only when optical diagnostics is supported (bsc#1086282).\n- bnxt_en: Refactor bnxt_close_nic() (bsc#1086282).\n- bnxt_en: Refactor bnxt_need_reserve_rings() (bsc#1086282).\n- bnxt_en: Refactor hardware resource data structures (bsc#1086282).\n- bnxt_en: Refactor the functions to reserve hardware rings (bsc#1086282).\n- bnxt_en: Remap TC to hardware queues when configuring PFC (bsc#1086282).\n- bnxt_en: Reserve RSS and L2 contexts for VF (bsc#1086282).\n- bnxt_en: Reserve completion rings and MSIX for bnxt_re RDMA driver (bsc#1086282).\n- bnxt_en: Reserve resources for RFS (bsc#1086282).\n- bnxt_en: Reserve rings at driver open if none was reserved at probe time (bsc#1086282).\n- bnxt_en: Reserve rings in bnxt_set_channels() if device is down (bsc#1086282).\n- bnxt_en: Restore MSIX after disabling SRIOV (bsc#1086282).\n- bnxt_en: Set initial default RX and TX ring numbers the same in combined mode (bsc#1086282).\n- bnxt_en: Simplify ring alloc/free error messages (bsc#1086282).\n- bnxt_en: Support max-mtu with VF-reps (bsc#1086282).\n- bnxt_en: Update firmware interface to 1.9.0 (bsc#1086282).\n- bnxt_en: Update firmware interface to 1.9.1.15 (bsc#1086282).\n- bnxt_en: Use a dedicated VNIC mode for RDMA (bsc#1086282).\n- bnxt_en: close and open NIC, only when the interface is in running state (bsc#1086282).\n- bnxt_en: do not allow wildcard matches for L2 flows (bsc#1050242).\n- bnxt_en: export a common switchdev PARENT_ID for all reps of an adapter (bsc#1086282).\n- bnxt_en: fix clear flags in ethtool reset handling (bsc#1050242).\n- bnxt_en: reduce timeout on initial HWRM calls (bsc#1086282).\n- bonding: discard lowest hash bit for 802.3ad layer3+4 (networking-stable-17_11_20).\n- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (networking-stable-18_04_26).\n- bonding: fix the err path for dev hwaddr sync in bond_enslave (networking-stable-18_04_10).\n- bonding: move dev_mc_sync after master_upper_dev_link in bond_enslave (networking-stable-18_04_10).\n- bonding: process the err returned by dev_set_allmulti properly in bond_enslave (networking-stable-18_04_10).\n- bonding: send learning packets for vlans on slave (networking-stable-18_05_15).\n- bpf, ppc64: fix out of bounds access in tail call (bsc#1083647).\n- bpf, x64: fix memleak when not converging after image (bsc#1083647).\n- bpf: add schedule points in percpu arrays management (bsc#1083647).\n- bpf: fix bpf_skb_adjust_net/bpf_skb_proto_xlat to deal with gso sctp skbs (bsc#1076830).\n- bpf: fix mlock precharge on arraymaps (bsc#1083647).\n- bpf: make bnxt compatible w/ bpf_xdp_adjust_tail (bsc#1086282).\n- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).\n- brcmfmac: Fix check for ISO3166 code (bsc#1051510).\n- brd: fix overflow in __brd_direct_access (bsc#1052766).\n- bridge: check iface upper dev when setting master via ioctl (networking-stable-18_05_15).\n- Btrfs: Take trans lock before access running trans in check_delayed_ref (bsc#1097105).\n- Btrfs: return error value if create_io_em failed in cow_file_range (bsc#1097105).\n- can: af_can: can_pernet_init(): add missing error handling for kzalloc returning NULL (bsc#1051510).\n- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bsc#1051510).\n- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bsc#1051510).\n- can: c_can: do not indicate triple sampling support for D_CAN (bsc#1051510).\n- can: cc770: Fix queue stall and dropped RTR reply (bsc#1051510).\n- can: cc770: Fix stalls on rt-linux, remove redundant IRQ ack (bsc#1051510).\n- can: cc770: Fix use after free in cc770_tx_interrupt() (bsc#1051510).\n- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bsc#1051510).\n- can: esd_usb2: Fix can_dlc value for received RTR, frames (bsc#1051510).\n- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bsc#1051510).\n- can: flex_can: Correct the checking for frame length in flexcan_start_xmit() (bsc#1051510).\n- can: flexcan: fix VF610 state transition issue (bsc#1051510).\n- can: flexcan: fix i.MX28 state transition issue (bsc#1051510).\n- can: flexcan: fix i.MX6 state transition issue (bsc#1051510).\n- can: flexcan: fix p1010 state transition issue (bsc#1051510).\n- can: flexcan: fix state transition regression (bsc#1051510).\n- can: flexcan: implement error passive state quirk (bsc#1051510).\n- can: flexcan: rename legacy error state quirk (bsc#1051510).\n- can: gs_usb: fix busy loop if no more TX context is available (bsc#1051510).\n- can: gs_usb: fix return value of the \u0027set_bittiming\u0027 callback (bsc#1051510).\n- can: hi311x: Acquire SPI lock on -\u003edo_get_berr_counter (bsc#1051510).\n- can: hi311x: Work around TX complete interrupt erratum (bsc#1051510).\n- can: ifi: Check core revision upon probe (bsc#1051510).\n- can: ifi: Fix transmitter delay calculation (bsc#1051510).\n- can: ifi: Repair the error handling (bsc#1051510).\n- can: kvaser_usb: Correct return value in printout (bsc#1051510).\n- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bsc#1051510).\n- can: kvaser_usb: Ignore CMD_FLUSH_QUEUE_REPLY messages (bsc#1051510).\n- can: kvaser_usb: Increase correct stats counter in kvaser_usb_rx_can_msg() (bsc#1051510).\n- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bsc#1051510).\n- can: kvaser_usb: free buf in error paths (bsc#1051510).\n- can: kvaser_usb: ratelimit errors if incomplete messages are received (bsc#1051510).\n- can: mcba_usb: cancel urb on -EPROTO (bsc#1051510).\n- can: mcba_usb: fix device disconnect bug (bsc#1051510).\n- can: peak/pci: fix potential bug when probe() fails (bsc#1051510).\n- can: peak/pcie_fd: fix echo_skb is occupied! bug (bsc#1051510).\n- can: peak/pcie_fd: fix potential bug in restarting tx queue (bsc#1051510).\n- can: peak/pcie_fd: remove useless code when interface starts (bsc#1051510).\n- can: peak: Add support for new PCIe/M2 CAN FD interfaces (bsc#1051510).\n- can: peak: fix potential bug in packet fragmentation (bsc#1051510).\n- can: sun4i: fix loopback mode (bsc#1051510).\n- can: sun4i: handle overrun in RX FIFO (bsc#1051510).\n- can: ti_hecc: Fix napi poll return value for repoll (bsc#1051510).\n- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bsc#1051510).\n- can: vxcan: improve handling of missing peer name attribute (bsc#1051510).\n- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (networking-stable-18_04_13).\n- cdrom: information leak in cdrom_ioctl_media_changed() (bsc#1051510).\n- ceph: adding protection for showing cap reservation info (bsc#1089115).\n- ceph: always update atime/mtime/ctime for new inode (bsc#1089115).\n- ceph: change variable name to follow common rule (bsc#1089115).\n- ceph: check if mds create snaprealm when setting quota (bsc#1089115).\n- ceph: do not wait on writeback when there is no more dirty pages (bsc#1089115).\n- ceph: filter out used flags when printing unused open flags (bsc#1089115).\n- ceph: fix alignment of rasize (bsc#1098236).\n- ceph: fix dentry leak in splice_dentry() (bsc#1098236).\n- ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115).\n- ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115).\n- ceph: fix st_nlink stat for directories (bsc#1093904).\n- ceph: fix use-after-free in ceph_statfs() (bsc#1098236).\n- ceph: fix wrong check for the case of updating link count (bsc#1098236).\n- ceph: keep consistent semantic in fscache related option combination (bsc#1089115).\n- ceph: mark the cap cache as unreclaimable (bsc#1089115).\n- ceph: optimize mds session register (bsc#1089115).\n- ceph: optimize memory usage (bsc#1089115).\n- ceph: optimizing cap allocation (bsc#1089115).\n- ceph: optimizing cap reservation (bsc#1089115).\n- ceph: prevent i_version from going back (bsc#1098236).\n- ceph: quota: report root dir quota usage in statfs (bsc#1089115).\n- ceph: release unreserved caps if having enough available caps (bsc#1089115).\n- ceph: return proper bool type to caller instead of pointer (bsc#1089115).\n- ceph: support file lock on directory (bsc#1098236).\n- ceph: use seq_show_option for string type options (bsc#1089115).\n- cfg80211: clear wep keys after disconnection (bsc#1051510).\n- cfg80211: further limit wiphy names to 64 bytes (bsc#1051510).\n- cfg80211: limit wiphy names to 128 bytes (bsc#1051510).\n- cgroup: Fix deadlock in cpu hotplug path (Git-fixes).\n- cgroup: Reinit cgroup_taskset structure before cgroup_migrate_execute() returns (Git-fixes).\n- cifs: Check for timeout on Negotiate stage (bsc#1091171).\n- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734).\n- config: arm64: enable Spectre-v4 per-thread mitigation\n- coresight: Fix disabling of CoreSight TPIU (bsc#1051510).\n- cpufreq: intel_pstate: Add HWP boost utility and sched util hooks (bsc#1066110).\n- cpufreq: intel_pstate: Fix scaling max/min limits with Turbo 3.0 (bsc#1051510).\n- cpufreq: intel_pstate: HWP boost performance on IO wakeup (bsc#1066110).\n- cpufreq: intel_pstate: New sysfs entry to control HWP boost (bsc#1066110).\n- cpufreq: intel_pstate: enable boost for Skylake Xeon (bsc#1066110).\n- cpufreq: schedutil: Avoid using invalid next_freq (git-fixes).\n- cpuidle: fix broadcast control when broadcast can not be entered (Git-fixes).\n- cros_ec: fix nul-termination for firmware build info (bsc#1051510).\n- crypto: AF_ALG - remove SGL terminator indicator when chaining (bsc#1051510).\n- crypto: aes-generic - build with -Os on gcc-7+ (bsc#1051510).\n- crypto: aes-generic - fix aes-generic regression on powerpc (bsc#1051510).\n- crypto: af_alg - fix possible uninit-value in alg_bind() (bsc#1051510).\n- crypto: ahash - Fix early termination in hash walk (bsc#1051510).\n- crypto: arm,arm64 - Fix random regeneration of S_shipped (bsc#1051510).\n- crypto: atmel-aes - fix the keys zeroing on errors (bsc#1051510).\n- crypto: caam - Fix null dereference at error path (bsc#1051510).\n- crypto: caam - fix DMA mapping dir for generated IV (bsc#1051510).\n- crypto: caam - fix IV DMA mapping and updating (bsc#1051510).\n- crypto: caam - fix incorrect define (bsc#1051510).\n- crypto: caam - strip input zeros from RSA input buffer (bsc#1051510).\n- crypto: caam/qi - fix IV DMA mapping and updating (bsc#1051510).\n- crypto: caam/qi - fix IV DMA mapping and updating (bsc#1051510).\n- crypto: ccp - Fix sparse, use plain integer as NULL pointer (git-fixes 200664d5237f).\n- crypto: drbg - set freed buffers to NULL (bsc#1051510).\n- crypto: lrw - Free rctx-\u003eext with kzfree (bsc#1051510).\n- crypto: omap-sham - fix memleak (bsc#1051510).\n- crypto: qat - remove unused and redundant pointer vf_info (bsc#1051510).\n- crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss (bsc#1051510).\n- crypto: vmx - Remove overly verbose printk from AES XTS init (bsc#1051510).\n- crypto: vmx - Remove overly verbose printk from AES init routines (bsc#1051510).\n- crypto: x86/cast5-avx - fix ECB encryption when long sg follows short one (bsc#1051510).\n- cxgb4: Correct ntuple mask validation for hash filters (bsc#1064802 bsc#1066129).\n- cxgb4: fix error return code in adap_init0() (bsc#1064802 bsc#1066129).\n- cxgb4: fix offset in collecting TX rate limit info (bsc#1073513).\n- cxgb4vf: Fix SGE FL buffer initialization logic for 64K pages (bsc#1046542).\n- dax, dm: allow device-mapper to operate without dax support (bsc#1093023).\n- dax: check for QUEUE_FLAG_DAX in bdev_dax_supported() (bsc#1101315).\n- dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state (networking-stable-18_01_28).\n- dccp: fix tasklet usage (networking-stable-18_05_15).\n- delayacct: Account blkio completion on the correct task (bsc#1052766).\n- dell_rbu: make firmware payload memory uncachable (bsc#1087978).\n- device-dax: allow MAP_SYNC to succeed (bsc#1052766).\n- devlink: Remove redundant free on error path (networking-stable-18_03_28).\n- direct-io: Prevent NULL pointer access in submit_page_section (bsc#1052766).\n- disable patches.drivers/s390-qeth-use-Read-device-to-query-hypervisor-for-MA.patch Backport of mainline commit b7493e91c11a (\u0027s390/qeth: use Read device to query hypervisor for MAC\u0027) changes assigned MAC address (and breaks networking) on one of our machines and it\u0027s not clear which address is actually correct (bsc#1094575).\n- dlm: fix a clerical error when set SCTP_NODELAY (bsc#1091594).\n- dlm: make sctp_connect_to_sock() return in specified time (bsc#1080542).\n- dlm: remove O_NONBLOCK flag in sctp_connect_to_sock (bsc#1080542).\n- dm btree: fix serious bug in btree_split_beneath() (bsc#1093023).\n- dm bufio: add missed destroys of client mutex (bsc#1093023).\n- dm bufio: check result of register_shrinker() (bsc#1093023).\n- dm bufio: delete outdated comment (bsc#1093023).\n- dm bufio: do not embed a bio in the dm_buffer structure (bsc#1093023).\n- dm bufio: eliminate unnecessary labels in dm_bufio_client_create() (bsc#1093023).\n- dm bufio: fix buffer alignment (bsc#1093023).\n- dm bufio: fix integer overflow when limiting maximum cache size (bsc#1093023).\n- dm bufio: fix shrinker scans when (nr_to_scan lower than retain_target) (bsc#1093023).\n- dm bufio: get rid of slab cache name allocations (bsc#1093023).\n- dm bufio: move dm-bufio.h to include/linux/ (bsc#1093023).\n- dm bufio: relax alignment constraint on slab cache (bsc#1093023).\n- dm bufio: remove code that merges slab caches (bsc#1093023).\n- dm bufio: reorder fields in dm_buffer structure (bsc#1093023).\n- dm bufio: support non-power-of-two block sizes (bsc#1093023).\n- dm bufio: use REQ_OP_READ and REQ_OP_WRITE (bsc#1093023).\n- dm bufio: use slab cache for dm_buffer structure allocations (bsc#1093023).\n- dm cache background tracker: limit amount of background work that may be issued at once (bsc#1093023).\n- dm cache policy smq: allocate cache blocks in order (bsc#1093023).\n- dm cache policy smq: change max background work from 10240 to 4096 blocks (bsc#1093023).\n- dm cache policy smq: handle races with queuing background_work (bsc#1093023).\n- dm cache policy smq: take origin idle status into account when queuing writebacks (bsc#1093023).\n- dm cache: convert dm_cache_metadata.ref_count from atomic_t to refcount_t (bsc#1093023).\n- dm cache: fix race condition in the writeback mode overwrite_bio optimisation (bsc#1093023).\n- dm cache: lift common migration preparation code to alloc_migration() (bsc#1093023).\n- dm cache: pass cache structure to mode functions (bsc#1093023).\n- dm cache: remove all obsolete writethrough-specific code (bsc#1093023).\n- dm cache: remove usused deferred_cells member from struct cache (bsc#1093023).\n- dm cache: simplify get_per_bio_data() by removing data_size argument (bsc#1093023).\n- dm cache: submit writethrough writes in parallel to origin and cache (bsc#1093023).\n- dm crypt: allow unaligned bv_offset (bsc#1093023).\n- dm crypt: fix crash by adding missing check for auth key size (bsc#1093023).\n- dm crypt: fix error return code in crypt_ctr() (bsc#1093023).\n- dm crypt: fix memory leak in crypt_ctr_cipher_old() (bsc#1093023).\n- dm crypt: limit the number of allocated pages (bsc#1093023).\n- dm crypt: reject sector_size feature if device length is not aligned to it (bsc#1093023).\n- dm crypt: remove BIOSET_NEED_RESCUER flag (bsc#1093023).\n- dm crypt: wipe kernel key copy after IV initialization (bsc#1093023).\n- dm flakey: check for null arg_name in parse_features() (bsc#1093023).\n- dm integrity: allow unaligned bv_offset (bsc#1093023).\n- dm integrity: count and display checksum failures (bsc#1093023).\n- dm integrity: do not check integrity for failed read operations (bsc#1093023).\n- dm integrity: do not store cipher request on the stack (bsc#1093023).\n- dm integrity: fail early if required HMAC key is not available (bsc#1093023).\n- dm integrity: make blk_integrity_profile structure const (bsc#1093023).\n- dm integrity: optimize writing dm-bufio buffers that are partially changed (bsc#1093023).\n- dm integrity: use init_completion instead of COMPLETION_INITIALIZER_ONSTACK (bsc#1093023).\n- dm integrity: use kvfree for kvmalloc\u0027d memory (bsc#1099918).\n- dm io: remove BIOSET_NEED_RESCUER flag from bios bioset (bsc#1093023).\n- dm ioctl: constify ioctl lookup table (bsc#1093023).\n- dm log writes: add support for DAX (bsc#1093023).\n- dm log writes: add support for inline data buffers (bsc#1093023).\n- dm log writes: do not use all the cpu while waiting to log blocks (bsc#1093023).\n- dm log writes: fix \u003e512b sectorsize support (bsc#1093023).\n- dm log writes: fix max length used for kstrndup (bsc#1093023).\n- dm log writes: record metadata flag for better flags record (bsc#1093023).\n- dm mpath: fix bio-based multipath queue_if_no_path handling (bsc#1099918).\n- dm raid: add component device size checks to avoid runtime failure (bsc#1093023).\n- dm raid: avoid passing array_in_sync variable to raid_status() callees (bsc#1093023).\n- dm raid: bump target version to reflect numerous fixes (bsc#1093023).\n- dm raid: consume sizes after md_finish_reshape() completes changing them (bsc#1093023).\n- dm raid: correct resizing state relative to reshape space in ctr (bsc#1093023).\n- dm raid: display a consistent copy of the MD status via raid_status() (bsc#1093023).\n- dm raid: do not use \u0027const\u0027 in function return (bsc#1099918).\n- dm raid: ensure \u0027a\u0027 chars during reshape (bsc#1093023).\n- dm raid: fix deadlock caused by premature md_stop_writes() (bsc#1093023).\n- dm raid: fix incorrect status output at the end of a \u0027recover\u0027 process (bsc#1093023).\n- dm raid: fix incorrect sync_ratio when degraded (bsc#1093023).\n- dm raid: fix nosync status (bsc#1093023).\n- dm raid: fix panic when attempting to force a raid to sync (bsc#1093023).\n- dm raid: fix parse_raid_params() variable range issue (bsc#1093023).\n- dm raid: fix raid set size revalidation (bsc#1093023).\n- dm raid: fix raid_resume() to keep raid set frozen as needed (bsc#1093023).\n- dm raid: fix rs_get_progress() synchronization state/ratio (bsc#1093023).\n- dm raid: make raid_sets symbol static (bsc#1093023).\n- dm raid: simplify rs_get_progress() (bsc#1093023).\n- dm raid: small cleanup and remove unsed \u0027struct raid_set\u0027 member (bsc#1093023).\n- dm raid: stop keeping raid set frozen altogether (bsc#1093023).\n- dm raid: use rs_is_raid*() (bsc#1093023).\n- dm raid: validate current raid sets redundancy (bsc#1093023).\n- dm rq: do not update rq partially in each ending bio (bsc#1093023).\n- dm rq: make dm-sq requeuing behavior consistent with dm-mq behavior (bsc#1093023).\n- dm space map metadata: use ARRAY_SIZE (bsc#1093023).\n- dm stripe: get rid of a Variable Length Array (VLA) (bsc#1093023).\n- dm table: fix regression from improper dm_dev_internal.count refcount_t conversion (bsc#1093023).\n- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bsc#1093023).\n- dm thin: fix trailing semicolon in __remap_and_issue_shared_cell (bsc#1093023).\n- dm zoned: avoid triggering reclaim from inside dmz_map() (bsc#1099918).\n- dm zoned: ignore last smaller runt zone (bsc#1093023).\n- dm-crypt: do not clear bvec-\u003ebv_page in crypt_free_buffer_pages() (bsc#1093023).\n- dm-crypt: do not mess with BIP_BLOCK_INTEGRITY (bsc#1093023).\n- dm-raid: fix a race condition in request handling (bsc#1093023).\n- dm: backfill missing calls to mutex_destroy() (bsc#1093023).\n- dm: clear all discard attributes in queue_limits when discards are disabled (bsc#1093023).\n- dm: convert DM printk macros to pr level macros (bsc#1099918).\n- dm: convert dm_dev_internal.count from atomic_t to refcount_t (bsc#1093023).\n- dm: convert table_device.count from atomic_t to refcount_t (bsc#1093023).\n- dm: correctly handle chained bios in dec_pending() (bsc#1093023).\n- dm: discard support requires all targets in a table support discards (bsc#1093023).\n- dm: do not set \u0027discards_supported\u0027 in targets that do not need it (bsc#1093023).\n- dm: ensure bio submission follows a depth-first tree walk (bsc#1093023).\n- dm: ensure bio-based DM\u0027s bioset and io_pool support targets\u0027 maximum IOs (bsc#1093023).\n- dm: fix __send_changing_extent_only() to send first bio and chain remainder (bsc#1093023).\n- dm: fix comment above dm_accept_partial_bio (bsc#1093023).\n- dm: fix printk() rate limiting code (bsc#1099918).\n- dm: fix various targets to dm_register_target after module __init resources created (bsc#1093023).\n- dm: limit the max bio size as BIO_MAX_PAGES * PAGE_SIZE (bsc#1093023).\n- dm: move dm_table_destroy() to same header as dm_table_create() (bsc#1093023).\n- dm: remove BIOSET_NEED_RESCUER based dm_offload infrastructure (bsc#1093023).\n- dm: remove stale comment blocks (bsc#1093023).\n- dm: remove unused \u0027num_write_bios\u0027 target interface (bsc#1093023).\n- dm: remove unused macro DM_MOD_NAME_SIZE (bsc#1093023).\n- dm: rename \u0027bio\u0027 member of dm_io structure to \u0027orig_bio\u0027 (bsc#1093023).\n- dm: safely allocate multiple bioset bios (bsc#1093023).\n- dm: set QUEUE_FLAG_DAX accordingly in dm_table_set_restrictions() (bsc#1093023).\n- dm: simplify start of block stats accounting for bio-based (bsc#1093023).\n- dm: small cleanup in dm_get_md() (bsc#1093023).\n- dm: use bio_split() when splitting out the already processed bio (bsc#1099918).\n- dmaengine: at_hdmac: fix potential NULL pointer dereference in atc_prep_dma_interleaved (bsc#1051510).\n- dmaengine: at_xdmac: fix rare residue corruption (bsc#1051510).\n- dmaengine: dmatest: fix container_of member in dmatest_callback (bsc#1051510).\n- dmaengine: dmatest: move callback wait queue to thread context (bsc#1051510).\n- dmaengine: dmatest: warn user when dma test times out (bsc#1051510).\n- dmaengine: edma: Align the memcpy acnt array size with the transfer (bsc#1051510).\n- dmaengine: ioat: Fix error handling path (bsc#1051510).\n- dmaengine: jz4740: disable/unprepare clk if probe fails (bsc#1051510).\n- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bsc#1051510).\n- dmaengine: ti-dma-crossbar: Fix event mapping for TPCC_EVT_MUX_60_63 (bsc#1051510).\n- dmaengine: ti-dma-crossbar: Fix possible race condition with dma_inuse (bsc#1051510).\n- docs: disable KASLR when debugging kernel (bsc#1051510).\n- dpaa_eth: increment the RX dropped counter when needed (networking-stable-18_03_28).\n- dpaa_eth: remove duplicate increment of the tx_errors counter (networking-stable-18_03_28).\n- dpaa_eth: remove duplicate initialization (networking-stable-18_03_28).\n- drbd: Fix drbd_request_prepare() discard handling (bsc#1099918).\n- driver core: Do not ignore class_dir_create_and_add() failure (bsc#1051510).\n- driver core: Move device_links_purge() after bus_remove_device() (bsc#1099918).\n- drivers/infiniband/core/verbs.c: fix build with gcc-4.4.4 (bsc#1046306).\n- drivers/infiniband/ulp/srpt/ib_srpt.c: fix build with gcc-4.4.4 (bsc#1046306).\n- drivers: net: bnx2x: use setup_timer() helper (bsc#1086323).\n- drm/amd/powerplay: Fix enum mismatch (bsc#1051510).\n- drm/amdgpu/sdma: fix mask in emit_pipeline_sync (bsc#1051510).\n- drm/amdgpu/si: implement get/set pcie_lanes asic callback (bsc#1051510).\n- drm/amdgpu: Add APU support in vi_set_uvd_clocks (bsc#1051510).\n- drm/amdgpu: Add APU support in vi_set_vce_clocks (bsc#1051510).\n- drm/amdgpu: Add an ATPX quirk for hybrid laptop (bsc#1051510).\n- drm/amdgpu: Fix PCIe lane width calculation (bsc#1051510).\n- drm/amdgpu: Fix always_valid bos multiple LRU insertions (bsc#1051510).\n- drm/amdgpu: Fix deadlock on runtime suspend (bsc#1051510).\n- drm/amdgpu: Use kvmalloc_array for allocating VRAM manager nodes array (bsc#1051510).\n- drm/amdgpu: adjust timeout for ib_ring_tests(v2) (bsc#1051510).\n- drm/amdgpu: disable GFX ring and disable PQ wptr in hw_fini (bsc#1051510).\n- drm/amdgpu: set COMPUTE_PGM_RSRC1 for SGPR/VGPR clearing shaders (bsc#1051510).\n- drm/amdkfd: fix clock counter retrieval for node without GPU (bsc#1051510).\n- drm/armada: fix leak of crtc structure (bsc#1051510).\n- drm/ast: Fixed 1280x800 Display Issue (bsc#1051510).\n- drm/atmel-hlcdc: check stride values in the first plane (bsc#1051510).\n- drm/atomic: Clean old_state/new_state in drm_atomic_state_default_clear() (bsc#1051510).\n- drm/atomic: Clean private obj old_state/new_state in drm_atomic_state_default_clear() (bsc#1051510).\n- drm/bridge: analogix dp: Fix runtime PM state in get_modes() callback (bsc#1051510).\n- drm/bridge: tc358767: do no fail on hi-res displays (bsc#1051510).\n- drm/bridge: tc358767: filter out too high modes (bsc#1051510).\n- drm/bridge: tc358767: fix 1-lane behavior (bsc#1051510).\n- drm/bridge: tc358767: fix AUXDATAn registers access (bsc#1051510).\n- drm/bridge: tc358767: fix DP0_MISC register set (bsc#1051510).\n- drm/bridge: tc358767: fix timing calculations (bsc#1051510).\n- drm/bridge: vga-dac: Fix edid memory leak (bsc#1051510).\n- drm/dumb-buffers: Integer overflow in drm_mode_create_ioctl() (bsc#1051510).\n- drm/exynos/dsi: mask frame-done interrupt (bsc#1051510).\n- drm/exynos: Allow DRM_EXYNOS on s5pv210 (bsc#1051510).\n- drm/exynos: Fix default value for zpos plane property (bsc#1051510).\n- drm/exynos: fix comparison to bitshift when dealing with a mask (bsc#1051510).\n- drm/exynos: g2d: use monotonic timestamps (bsc#1051510).\n- drm/fsl-dcu: enable IRQ before drm_atomic_helper_resume() (bsc#1051510).\n- drm/hisilicon: Ensure LDI regs are properly configured (bsc#1051510).\n- drm/i915/audio: Fix audio detection issue on GLK (bsc#1051510).\n- drm/i915/audio: set minimum CD clock to twice the BCLK (bsc#1095265).\n- drm/i915/bios: filter out invalid DDC pins from VBT child devices (bsc#1051510).\n- drm/i915/execlists: Use rmb() to order CSB reads (bsc#1051510).\n- drm/i915/gen9: Add WaClearHIZ_WM_CHICKEN3 for bxt and glk (bsc#1051510).\n- drm/i915/glk: Add MODULE_FIRMWARE for Geminilake (bsc#1095265).\n- drm/i915/gvt: fix memory leak of a cmd_entry struct on error exit path (bsc#1051510).\n- drm/i915/gvt: throw error on unhandled vfio ioctls (bsc#1051510).\n- drm/i915/lvds: Move acpi lid notification registration to registration phase (bsc#1051510).\n- drm/i915/psr: Chase psr.enabled only under the psr.lock (bsc#1051510).\n- drm/i915/userptr: reject zero user_size (bsc#1051510).\n- drm/i915: Adjust eDP\u0027s logical vco in a reliable place (bsc#1095265).\n- drm/i915: Apply batch location restrictions before pinning (bsc#1051510).\n- drm/i915: Call i915_perf_fini() on init_hw error unwind (bsc#1051510).\n- drm/i915: Disable LVDS on Radiant P845 (bsc#1051510).\n- drm/i915: Do no use kfree() to free a kmem_cache_alloc() return value (bsc#1051510).\n- drm/i915: Do not request a bug report for unsafe module parameters (bsc#1051510).\n- drm/i915: Enable display WA#1183 from its correct spot (bsc#1051510).\n- drm/i915: Enable provoking vertex fix on Gen9 systems (bsc#1051510).\n- drm/i915: Fix LSPCON TMDS output buffer enabling from low-power state (bsc#1051510).\n- drm/i915: Fix context ban and hang accounting for client (bsc#1051510).\n- drm/i915: Fix drm:intel_enable_lvds ERROR message in kernel log (bsc#1051510).\n- drm/i915: Remove stale asserts from i915_gem_find_active_request() (bsc#1051510).\n- drm/i915: Remove stale asserts from i915_gem_find_active_request() (bsc#1051510).\n- drm/i915: Remove unbannable context spam from reset (bsc#1051510).\n- drm/i915: Restore planes after load detection (bsc#1051510).\n- drm/i915: Restore planes after load detection (bsc#1051510).\n- drm/i915: Try GGTT mmapping whole object as partial (bsc#1051510).\n- drm/imx: move arming of the vblank event to atomic_flush (bsc#1051510).\n- drm/meson: Fix an un-handled error path in \u0027meson_drv_bind_master()\u0027 (bsc#1051510).\n- drm/meson: Fix some error handling paths in \u0027meson_drv_bind_master()\u0027 (bsc#1051510).\n- drm/meson: fix vsync buffer update (bsc#1051510).\n- drm/msm/dsi: use correct enum in dsi_get_cmd_fmt (bsc#1051510).\n- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1051510).\n- drm/msm: do not deref error pointer in the msm_fbdev_create error path (bsc#1100209).\n- drm/msm: fix leak in failed get_pages (bsc#1051510).\n- drm/nouveau/bar/gf100: add config option to limit BAR2 to 16MiB (bsc#1095094).\n- drm/nouveau/bios/iccsense: rails for power sensors have a mask of 0xf8 for version 0x10 (bsc#1095094).\n- drm/nouveau/bios/init: add a new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/bios/init: add or/link args separate from output path (bsc#1095094).\n- drm/nouveau/bios/init: bump script offset to 32-bits (bsc#1095094).\n- drm/nouveau/bios/init: remove internal use of nvbios_init.bios (bsc#1095094).\n- drm/nouveau/bios/init: rename \u0027crtc\u0027 to \u0027head\u0027 (bsc#1095094).\n- drm/nouveau/bios/init: rename nvbios_init() to nvbios_devinit() (bsc#1095094).\n- drm/nouveau/bios/volt: Parse min and max for Version 0x40 (bsc#1095094).\n- drm/nouveau/bios: Demote missing fp table message to NV_DEBUG (bsc#1095094).\n- drm/nouveau/bl: fix backlight regression (bsc#1095094).\n- drm/nouveau/devinit: use new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/disp/dp: determine a failsafe link training rate (bsc#1095094).\n- drm/nouveau/disp/dp: determine link bandwidth requirements from head state (bsc#1095094).\n- drm/nouveau/disp/dp: no need for lt_state except during manual link training (bsc#1095094).\n- drm/nouveau/disp/dp: only check for re-train when the link is active (bsc#1095094).\n- drm/nouveau/disp/dp: remove DP_PWR method (bsc#1095094).\n- drm/nouveau/disp/dp: store current link configuration in nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/dp: train link only when actively displaying an image (bsc#1095094).\n- drm/nouveau/disp/dp: use cached link configuration when checking link status (bsc#1095094).\n- drm/nouveau/disp/dp: use new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/disp/g84-: Extend NVKM HDMI power control method to set InfoFrames (bsc#1095094).\n- drm/nouveau/disp/g84-: port OR HDMI control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g84-gt200: Use supplied HDMI InfoFrames (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP drive setting control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP lane mapping to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP link power control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP link setup to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP training pattern control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/gf119-: avoid creating non-existent heads (bsc#1095094).\n- drm/nouveau/disp/gf119-: port OR DP VCPI control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/gf119: Use supplied HDMI InfoFrames (bsc#1095094).\n- drm/nouveau/disp/gf119: add missing drive vfunc ptr (bsc#1095094).\n- drm/nouveau/disp/gk104-: Use supplied HDMI InfoFrames (bsc#1095094).\n- drm/nouveau/disp/gm200-: allow non-identity mapping of SOR != macro links (bsc#1095094).\n- drm/nouveau/disp/gt215-: port HDA ELD controls to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/gt215: Use supplied HDMI InfoFrames (bsc#1095094).\n- drm/nouveau/disp/nv04: avoid creation of output paths (bsc#1095094).\n- drm/nouveau/disp/nv50-: avoid creating ORs that are not present on HW (bsc#1095094).\n- drm/nouveau/disp/nv50-: execute supervisor on its own workqueue (bsc#1095094).\n- drm/nouveau/disp/nv50-: fetch head/OR state at beginning of supervisor (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 1.0 (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 2.0 (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 2.1 (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 2.2 (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 3.0 (bsc#1095094).\n- drm/nouveau/disp/nv50-: port OR manual sink detection to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/nv50-: port OR power state control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/nv50-gt21x: remove workaround for dp-\u003etmds hotplug issues (bsc#1095094).\n- drm/nouveau/disp: Add mechanism to convert HDMI InfoFrames to hardware format (bsc#1095094).\n- drm/nouveau/disp: Silence DCB warnings (bsc#1095094).\n- drm/nouveau/disp: add tv encoders to output resource mapping (bsc#1095094).\n- drm/nouveau/disp: common implementation of scanoutpos method in nvkm_head (bsc#1095094).\n- drm/nouveau/disp: delay output path / connector construction until oneinit() (bsc#1095094).\n- drm/nouveau/disp: fork off some new hw-specific implementations (bsc#1095094).\n- drm/nouveau/disp: identity-map display paths to output resources (bsc#1095094).\n- drm/nouveau/disp: introduce acquire/release display path methods (bsc#1095094).\n- drm/nouveau/disp: introduce input/output resource abstraction (bsc#1095094).\n- drm/nouveau/disp: introduce object to track per-head functions/state (bsc#1095094).\n- drm/nouveau/disp: move vblank_{get,put} methods into nvkm_head (bsc#1095094).\n- drm/nouveau/disp: remove hw-specific customisation of output paths (bsc#1095094).\n- drm/nouveau/disp: rename nvkm_output to nvkm_outp (bsc#1095094).\n- drm/nouveau/disp: rename nvkm_output_dp to nvkm_dp (bsc#1095094).\n- drm/nouveau/disp: s/nvkm_connector/nvkm_conn/ (bsc#1095094).\n- drm/nouveau/disp: shuffle functions around (bsc#1095094).\n- drm/nouveau/falcon: use a more reasonable msgqueue timeout value (bsc#1095094).\n- drm/nouveau/fb/gf100-: zero mmu debug buffers (bsc#1095094).\n- drm/nouveau/fb/ram/nv40-: use new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/fbcon: fix oops without fbdev emulation (bsc#1094751).\n- drm/nouveau/hwmon: Add config for all sensors and their settings (bsc#1095094).\n- drm/nouveau/hwmon: Add nouveau_hwmon_ops structure with .is_visible/.read_string (bsc#1095094).\n- drm/nouveau/hwmon: Change permissions to numeric (bsc#1095094).\n- drm/nouveau/hwmon: Remove old code, add .write/.read operations (bsc#1095094).\n- drm/nouveau/hwmon: expose the auto_point and pwm_min/max attrs (bsc#1095094).\n- drm/nouveau/kms/nv04-nv40: improve overlay error detection, fix pitch setting (bsc#1095094).\n- drm/nouveau/kms/nv04-nv40: prevent undisplayable framebuffers from creation (bsc#1095094).\n- drm/nouveau/kms/nv04-nv4x: fix exposed format list (bsc#1095094).\n- drm/nouveau/kms/nv04: use new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/kms/nv10-nv40: add NV21 support to overlay (bsc#1095094).\n- drm/nouveau/mc/gf100: add pmu to reset mask (bsc#1095094).\n- drm/nouveau/mpeg: print more debug info when rejecting dma objects (bsc#1095094).\n- drm/nouveau/pmu/fuc: do not use movw directly anymore (bsc#1051510).\n- drm/nouveau/pmu/gt215-: abstract detection of whether reset is needed (bsc#1095094).\n- drm/nouveau/pmu/gt215: fix reset (bsc#1095094).\n- drm/nouveau/tegra: Do not leave GPU in reset (bsc#1095094).\n- drm/nouveau/tegra: Skip manual unpowergating when not necessary (bsc#1095094).\n- drm/nouveau/therm/gm200: Added (bsc#1095094).\n- drm/nouveau/therm: fix spelling mistake on array thresolds (bsc#1095094).\n- drm/nouveau/tmr: remove nvkm_timer_alarm_cancel() (bsc#1095094).\n- drm/nouveau: Clean up nv50_head_atomic_check_mode() and fix blankus calculation (bsc#1095094).\n- drm/nouveau: Convert nouveau to use new iterator macros, v2 (bsc#1095094).\n- drm/nouveau: Drop drm_vblank_cleanup (bsc#1095094).\n- drm/nouveau: Enable stereoscopic 3D output over HDMI (bsc#1095094).\n- drm/nouveau: Fix deadlock in nv50_mstm_register_connector() (bsc#1051510).\n- drm/nouveau: Fix deadlock on runtime suspend (bsc#1051510).\n- drm/nouveau: Fix merge commit (bsc#1095094).\n- drm/nouveau: Handle drm_atomic_helper_swap_state failure (bsc#1095094).\n- drm/nouveau: Handle frame-packing mode geometry and timing effects (bsc#1095094).\n- drm/nouveau: Pass mode-dependent AVI and Vendor HDMI InfoFrames to NVKM (bsc#1095094).\n- drm/nouveau: Skip vga_fini on non-PCI device (bsc#1095094).\n- drm/nouveau: Use the drm_driver.dumb_destroy default (bsc#1095094).\n- drm/nouveau: silence suspend/resume debugging messages (bsc#1095094).\n- drm/nouveau: use drm_for_each_connector_iter() (bsc#1095094).\n- drm/omap: DMM: Check for DMM readiness after successful transaction commit (bsc#1051510).\n- drm/omap: fix possible NULL ref issue in tiler_reserve_2d (bsc#1051510).\n- drm/omap: fix uninitialized ret variable (bsc#1051510).\n- drm/omap: handle alloc failures in omap_connector (bsc#1051510).\n- drm/omap: silence unititialized variable warning (bsc#1051510).\n- drm/panel: simple: Fix the bus format for the Ontat panel (bsc#1051510).\n- drm/psr: Fix missed entry in PSR setup time table (bsc#1051510).\n- drm/qxl: Call qxl_bo_unref outside atomic context (bsc#1051510).\n- drm/radeon: Fix PCIe lane width calculation (bsc#1051510).\n- drm/radeon: Fix deadlock on runtime suspend (bsc#1051510).\n- drm/radeon: add PX quirk for Asus K73TK (bsc#1051510).\n- drm/radeon: make MacBook Pro d3_delay quirk more generic (bsc#1051510).\n- drm/rockchip: Clear all interrupts before requesting the IRQ (bsc#1051510).\n- drm/rockchip: Respect page offset for PRIME mmap calls (bsc#1051510).\n- drm/rockchip: dw-mipi-dsi: fix possible un-balanced runtime PM enable (bsc#1051510).\n- drm/sun4i: Fix dclk_set_phase (bsc#1051510).\n- drm/sun4i: Fix error path handling (bsc#1051510).\n- drm/tegra: Shutdown on driver unbind (bsc#1051510).\n- drm/tilcdc: ensure nonatomic iowrite64 is not used (bsc#1051510).\n- drm/vc4: Fix memory leak during BO teardown (bsc#1051510).\n- drm/vc4: Fix scaling of uni-planar formats (bsc#1051510).\n- drm/virtio: fix vq wait_event condition (bsc#1051510).\n- drm/vmwgfx: Fix 32-bit VMW_PORT_HB_[IN|OUT] macros (bsc#1051510).\n- drm/vmwgfx: Fix a buffer object leak (bsc#1051510).\n- drm/vmwgfx: Set dmabuf_size when vmw_dmabuf_init is successful (bsc#1051510).\n- drm/vmwgfx: Unpin the screen object backup buffer when not used (bsc#1051510).\n- drm: Allow determining if current task is output poll worker (bsc#1051510).\n- drm: Match sysfs name in link removal to link creation (bsc#1051510).\n- drm: bridge: dw-hdmi: Fix overflow workaround for Amlogic Meson GX SoCs (bsc#1051510).\n- drm: nouveau: remove dead code and pointless local lut storage (bsc#1095094).\n- drm: rcar-du: lvds: Fix LVDS startup on R-Car Gen2 (bsc#1051510).\n- drm: rcar-du: lvds: Fix LVDS startup on R-Car Gen3 (bsc#1051510).\n- drm: set FMODE_UNSIGNED_OFFSET for drm files (bsc#1051510).\n- e1000e: Ignore TSYNCRXCTL when getting I219 clock attributes (bsc#1075876).\n- eCryptfs: do not pass up plaintext names when using filename encryption (bsc#1052766).\n- earlycon: Use a pointer table to fix __earlycon_table stride (bsc#1099918).\n- efi/esrt: Use memunmap() instead of kfree() to free the remapping (bsc#1051510).\n- emulex/benet: Constify *be_misconfig_evt_port_state (bsc#1086288).\n- ethernet/broadcom: Use zeroing memory allocator than allocator/memset (bsc#1086282).\n- ethernet: Use octal not symbolic permissions (bsc#1086288).\n- ethtool: do not print warning for applications using legacy API (networking-stable-18_01_12).\n- etnaviv: fix gem object list corruption (bsc#1051510).\n- etnaviv: fix submit error path (bsc#1051510).\n- ext4: add bounds checking to ext4_xattr_find_entry() (bsc#1052766).\n- ext4: do not update checksum of new initialized bitmaps (bsc#1052766).\n- ext4: eliminate sleep from shutdown ioctl (bsc#1052766).\n- ext4: fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).\n- ext4: fix offset overflow on 32-bit archs in ext4_iomap_begin() (bsc#1079747).\n- ext4: fix unsupported feature message formatting (bsc#1098435).\n- ext4: move call to ext4_error() into ext4_xattr_check_block() (bsc#1052766).\n- ext4: pass -ESHUTDOWN code to jbd2 layer (bsc#1052766).\n- ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bsc#1052766).\n- ext4: protect i_disksize update by i_data_sem in direct write path (bsc#1052766).\n- ext4: set h_journal if there is a failure starting a reserved handle (bsc#1052766).\n- ext4: shutdown should not prevent get_write_access (bsc#1052766).\n- extcon: intel-cht-wc: Set direction and drv flags for V5 boost GPIO (bsc#1051510).\n- f2fs: avoid hungtask when GC encrypted block if io_bits is set (bsc#1052766).\n- f2fs: expose some sectors to user in inline data or dentry case (bsc#1052766).\n- f2fs: fix a panic caused by NULL flush_cmd_control (bsc#1086400).\n- f2fs: fix heap mode to reset it back (bsc#1052766).\n- f2fs: fix to clear CP_TRIMMED_FLAG (bsc#1052766).\n- f2fs: fix to wake up all sleeping flusher (bsc#1099918).\n- fanotify: fix logic of events on child (bsc#1052766).\n- fbdev: controlfb: Add missing modes to fix out of bounds access (bsc#1051510).\n- fealnx: Fix building error on MIPS (networking-stable-17_11_20).\n- fib_semantics: Do not match route with mismatching tclassid (networking-stable-18_03_07).\n- firewire-ohci: work around oversized DMA reads on JMicron controllers (bsc#1051510).\n- firmware: add helper to unregister pm ops (bsc#1085937).\n- firmware: always enable the reboot notifier (bsc#1085937).\n- firmware: dmi_scan: Fix UUID length safety check (bsc#1051510).\n- firmware: dmi_scan: Fix handling of empty DMI strings (bsc#1051510).\n- firmware: fix capturing errors on fw_cache_init() on early init (bsc#1085937).\n- firmware: fix checking for return values for fw_add_devm_name() (bsc#1051510).\n- firmware: fix detecting error on register_reboot_notifier() (bsc#1085936).\n- firmware: move kill_requests_without_uevent() up above (bsc#1085937).\n- firmware: provide helpers for registering the syfs loader (bsc#1085937).\n- firmware: share fw fallback killing on reboot/suspend (bsc#1085937).\n- flow_dissector: properly cap thoff field (networking-stable-18_01_28).\n- fs/aio: Add explicit RCU grace period when freeing kioctx (bsc#1088722).\n- fs/aio: Use RCU accessors for kioctx_table-\u003etable[] (bsc#1088722).\n- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099142).\n- fs/fat/inode.c: fix sb_rdonly() change (bsc#1052766).\n- fs/reiserfs/journal.c: add missing resierfs_warning() arg (bsc#1052766).\n- fsnotify: Fix fsnotify_mark_connector race (bsc#1052766).\n- fsnotify: Hide kABI changes in fsnotify_mark_connector (bsc#1052766).\n- ftrace: Fix selftest goto location on error (bsc#1099918).\n- fuse: fix READDIRPLUS skipping an entry (bsc#1088690).\n- geneve: Fix function matching VNI and tunnel ID on big-endian (bsc#1051510).\n- geneve: fix fill_info when link down (bsc#1051510).\n- gfs2: Fix debugfs glocks dump (bsc#1052766).\n- gpio: No NULL owner (bsc#1051510).\n- gpio: ath79: add missing MODULE_DESCRIPTION/LICENSE (bsc#1051510).\n- gpio: davinci: Assign first bank regs for unbanked case (bsc#1051510).\n- gpio: fix \u0027gpio-line-names\u0027 property retrieval (bsc#1051510).\n- gpio: fix aspeed_gpio unmask irq (bsc#1051510).\n- gpio: fix error path in lineevent_create (bsc#1051510).\n- gpio: iop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- gpio: label descriptors using the device name (bsc#1051510).\n- gpio: stmpe: i2c transfer are forbiden in atomic context (bsc#1051510).\n- gpioib: do not free unrequested descriptors (bsc#1051510).\n- gpu: ipu-v3: pre: fix device node leak in ipu_pre_lookup_by_phandle (bsc#1051510).\n- gpu: ipu-v3: prg: avoid possible array underflow (bsc#1051510).\n- gpu: ipu-v3: prg: fix device node leak in ipu_prg_lookup_by_phandle (bsc#1051510).\n- hdlc_ppp: carrier detect ok, do not turn off negotiation (networking-stable-18_03_07).\n- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1094420).\n- hwmon: (ina2xx) Fix access to uninitialized mutex (bsc#1051510).\n- hwmon: (ina2xx) Make calibration register value fixed (bsc#1051510).\n- hwmon: (jc42) optionally try to disable the SMBUS timeout (bsc#1051510).\n- hwmon: (nct6775) Fix writing pwmX_mode (bsc#1051510).\n- hwmon: (pmbus/adm1275) Accept negative page register values (bsc#1051510).\n- hwmon: (pmbus/max8688) Accept negative page register values (bsc#1051510).\n- hwtracing: stm: fix build error on some arches (bsc#1051510).\n- i2c: designware: fix poll-after-enable regression (bsc#1051510).\n- i2c: i801: Restore configuration at shutdown (bsc#1051510).\n- i2c: i801: Save register SMBSLVCMD value only once (bsc#1051510).\n- i2c: ismt: Separate I2C block read from SMBus block read (bsc#1051510).\n- i2c: mv64xxx: Apply errata delay only in standard mode (bsc#1051510).\n- i2c: pmcmsp: fix error return from master_xfer (bsc#1051510).\n- i2c: pmcmsp: return message count on master_xfer success (bsc#1051510).\n- i2c: viperboard: return message count on master_xfer success (bsc#1051510).\n- i40e: Close client on suspend and restore client MSIx on resume (bsc#1088821).\n- i40e: Do not allow use more TC queue pairs than MSI-X vectors exist (bsc#1094978).\n- i40e: Fix attach VF to VM issue (bsc#1056658 bsc#1056662).\n- i40e: Fix the number of queues available to be mapped for use (bsc#1094978).\n- i40e: program fragmented IPv4 filter input set (bsc#1056658 bsc#1056662).\n- i40evf: Do not schedule reset_task when device is being removed (bsc#1056658 bsc#1056662).\n- i40evf: do not rely on netif_running() outside rtnl_lock() (bsc#1056658 bsc#1056662).\n- i40evf: ignore link up if not running (bsc#1056658 bsc#1056662).\n- i40iw: Zero-out consumer key on allocate stag for FMR (bsc#1058659).\n- ibmvnic: Check CRQ command return codes (bsc#1094840).\n- ibmvnic: Create separate initialization routine for resets (bsc#1094840).\n- ibmvnic: Fix non-fatal firmware error reset (bsc#1093990).\n- ibmvnic: Fix partial success login retries (bsc#1094840).\n- ibmvnic: Fix statistics buffers memory leak (bsc#1093990).\n- ibmvnic: Free coherent DMA memory if FW map failed (bsc#1093990).\n- ibmvnic: Handle error case when setting link state (bsc#1094840).\n- ibmvnic: Introduce active CRQ state (bsc#1094840).\n- ibmvnic: Introduce hard reset recovery (bsc#1094840).\n- ibmvnic: Mark NAPI flag as disabled when released (bsc#1094840).\n- ibmvnic: Only do H_EOI for mobility events (bsc#1094356).\n- ibmvnic: Return error code if init interrupted by transport event (bsc#1094840).\n- ibmvnic: Set resetting state at earliest possible point (bsc#1094840).\n- ide: Make ide_cdrom_prep_fs() initialize the sense buffer pointer (bsc#1099918).\n- ide: ide-atapi: fix compile error with defining macro DEBUG (bsc#1099918).\n- ide:ide-cd: fix kernel panic resulting from missing scsi_req_init (bsc#1099918).\n- idr: fix invalid ptr dereference on item delete (bsc#1051510).\n- ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event() (networking-stable-18_03_28).\n- igb: Allow to remove administratively set MAC on VFs (bsc#1056651).\n- igb: Clear TXSTMP when ptp_tx_work() is timeout (bsc#1056651).\n- igb: Fix a test with HWTSTAMP_TX_ON (bsc#1056651 bsc#1056643).\n- iio: ABI: Fix name of timestamp sysfs file (bsc#1051510).\n- iio: ad7793: Fix the serial interface reset (bsc#1051510).\n- iio: ad7793: implement IIO_CHAN_INFO_SAMP_FREQ (bsc#1051510).\n- iio: ad_sigma_delta: Implement a dedicated reset function (bsc#1051510).\n- iio: adc/accel: Fix up module licenses (bsc#1051510).\n- iio: adc: cpcap: fix incorrect validation (bsc#1051510).\n- iio: adc: mcp320x: Fix oops on module unload (bsc#1051510).\n- iio: adc: mcp320x: Fix readout of negative voltages (bsc#1051510).\n- iio: adc: meson-saradc: fix the bit_idx of the adc_en clock (bsc#1051510).\n- iio: adc: stm32: fix scan of multiple channels with DMA (bsc#1051510).\n- iio: adc: ti-ads1015: add 10% to conversion wait time (bsc#1051510).\n- iio: adc: twl4030: Disable the vusb3v1 rugulator in the error handling path of \u0027twl4030_madc_probe()\u0027 (bsc#1051510).\n- iio: adc: twl4030: Fix an error handling path in \u0027twl4030_madc_probe()\u0027 (bsc#1051510).\n- iio: adis_lib: Initialize trigger before requesting interrupt (bsc#1051510).\n- iio: buffer: check if a buffer has been set up when poll is called (bsc#1051510).\n- iio: buffer: fix the function signature to match implementation (bsc#1051510).\n- iio: core: Return error for failed read_reg (bsc#1051510).\n- iio: fix kernel-doc build errors (bsc#1051510).\n- iio: health: max30102: Add power enable parameter to get_temp function (bsc#1051510).\n- iio: health: max30102: Temperature should be in milli Celsius (bsc#1051510).\n- iio: imu: st_lsm6dsx: fix endianness in st_lsm6dsx_read_oneshot() (bsc#1051510).\n- iio: st_pressure: st_accel: Initialise sensor platform data properly (bsc#1051510).\n- iio: st_pressure: st_accel: pass correct platform data to init (bsc#1051510).\n- iio: trigger: stm32-timer: fix get/set down count direction (bsc#1051510).\n- iio: trigger: stm32-timer: fix get/set down count direction (bsc#1051510).\n- iio: trigger: stm32-timer: preset shouldn\u0027t be buffered (bsc#1051510).\n- iio:buffer: make length types match kfifo types (bsc#1051510).\n- iio:kfifo_buf: check for uint overflow (bsc#1051510).\n- ima: Fallback to the builtin hash algorithm (bsc#1091686).\n- infiniband: drop unknown function from core_priv.h (bsc#1046306).\n- init: fix false positives in W+X checking (bsc#1093721).\n- initial support (display-only) for GP108 (bsc#1095094).\n- intel_th: Use correct device when freeing buffers (bsc#1051510).\n- iommu/amd: Take into account that alloc_dev_data() may return NULL (bsc#975772).\n- iommu/vt-d: Clear pasid table entry when memory unbound (bsc#1087214).\n- iommu/vt-d: Fix race condition in add_unmap() (bsc#1096790, bsc#1097034).\n- iov_iter: fix memory leak in pipe_get_pages_alloc() (bsc#1092710).\n- iov_iter: fix return type of __pipe_get_pages() (bsc#1092710).\n- ip6_gre: better validate user provided tunnel names (networking-stable-18_04_10).\n- ip6_gre: fix device features for ioctl setup (networking-stable-17_12_31).\n- ip6_gre: init dev-\u003emtu and dev-\u003ehard_header_len correctly (networking-stable-18_01_28).\n- ip6_gre: ip6gre_tap device should keep dst (networking-stable-17_10_09).\n- ip6_gre: only increase err_count for some certain type icmpv6 in ip6gre_err (networking-stable-17_11_14).\n- ip6_gre: skb_push ipv6hdr before packing the header in ip6gre_header (networking-stable-17_10_09).\n- ip6_tunnel: better validate user provided tunnel names (networking-stable-18_04_10).\n- ip6_tunnel: disable dst caching if tunnel is dual-stack (networking-stable-18_01_12).\n- ip6_tunnel: do not allow loading ip6_tunnel if ipv6 is disabled in cmdline (networking-stable-17_10_09).\n- ip6_vti: adjust vti mtu according to mtu of lower device (bsc#1082869).\n- ip6mr: fix stale iterator (networking-stable-18_02_06).\n- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (git-fixes).\n- ip_gre: fix IFLA_MTU ignored on NEWLINK (bsc#1076830).\n- ip_tunnel: better validate user provided tunnel names (networking-stable-18_04_10).\n- ipip: only increase err_count for some certain type icmp in ipip_err (networking-stable-17_11_14).\n- ipv4: Fix use-after-free when flushing FIB tables (networking-stable-17_12_31).\n- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (networking-stable-18_01_28).\n- ipv4: fix fnhe usage by non-cached routes (networking-stable-18_05_15).\n- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (networking-stable-18_05_15).\n- ipv4: igmp: guard against silly MTU values (bsc#1082869).\n- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (networking-stable-18_03_07).\n- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (git-fixes).\n- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (networking-stable-18_04_26).\n- ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option() (networking-stable-18_03_28).\n- ipv6: fix udpv6 sendmsg crash caused by too small MTU (networking-stable-18_01_28).\n- ipv6: flowlabel: do not leave opt-\u003etot_len with garbage (networking-stable-17_11_14).\n- ipv6: mcast: better catch silly mtu values (networking-stable-17_12_31).\n- ipv6: old_dport should be a __be16 in __ip6_datagram_connect() (networking-stable-18_03_28).\n- ipv6: omit traffic class when calculating flow hash (bsc#1095042).\n- ipv6: sit: better validate user provided tunnel names (networking-stable-18_04_10).\n- ipv6: sr: fix NULL pointer dereference in seg6_do_srh_encap()- v4 pkts (git-fixes).\n- ipv6: sr: fix NULL pointer dereference when setting encap source address (networking-stable-18_03_28).\n- ipv6: sr: fix TLVs not being copied using setsockopt (networking-stable-18_01_12).\n- ipv6: sr: fix scheduling in RCU when creating seg6 lwtunnel state (networking-stable-18_03_28).\n- ipv6: sr: fix seg6 encap performances with TSO enabled (networking-stable-18_04_10).\n- ipv6: the entire IPv6 header chain must fit the first fragment (networking-stable-18_04_10).\n- irqchip/gic-v3-its: Ensure nr_ites \u003e= nr_lpis (bsc#1098401).\n- isdn: eicon: fix a missing-check bug (bsc#1051510).\n- iw_cxgb4: Atomically flush per QP HW CQEs (bsc#1046543).\n- iw_cxgb4: Fix an error handling path in \u0027c4iw_get_dma_mr()\u0027 (bsc#1064802 bsc#1066129).\n- iw_cxgb4: print mapped ports correctly (bsc#1046543).\n- iwlmvm: tdls: Check TDLS channel switch support (bsc#1051510).\n- iwlwifi: add a bunch of new 9000 PCI IDs (1051510).\n- iwlwifi: add shared clock PHY config flag for some devices (bsc#1051510).\n- iwlwifi: avoid collecting firmware dump if not loaded (bsc#1051510).\n- iwlwifi: fix non_shared_ant for 9000 devices (bsc#1051510).\n- iwlwifi: fw: harden page loading code (bsc#1051510).\n- iwlwifi: mvm: Correctly set IGTK for AP (bsc#1051510).\n- iwlwifi: mvm: Correctly set the tid for mcast queue (bsc#1051510).\n- iwlwifi: mvm: Direct multicast frames to the correct station (bsc#1051510).\n- iwlwifi: mvm: Fix channel switch for count 0 and 1 (bsc#1051510).\n- iwlwifi: mvm: Increase session protection time after CS (bsc#1051510).\n- iwlwifi: mvm: always init rs with 20mhz bandwidth rates (bsc#1051510).\n- iwlwifi: mvm: clear tx queue id when unreserving aggregation queue (bsc#1051510).\n- iwlwifi: mvm: do not warn in queue sync on RF-kill (bsc#1051510).\n- iwlwifi: mvm: fix \u0027failed to remove key\u0027 message (bsc#1051510).\n- iwlwifi: mvm: fix IBSS for devices that support station type API (bsc#1051510).\n- iwlwifi: mvm: fix TSO with highly fragmented SKBs (bsc#1051510).\n- iwlwifi: mvm: fix TX of CCMP 256 (bsc#1051510).\n- iwlwifi: mvm: fix array out of bounds reference (bsc#1051510).\n- iwlwifi: mvm: fix assert 0x2B00 on older FWs (bsc#1051510).\n- iwlwifi: mvm: fix error checking for multi/broadcast sta (bsc#1051510).\n- iwlwifi: mvm: fix race in queue notification wait (bsc#1051510).\n- iwlwifi: mvm: fix security bug in PN checking (bsc#1051510).\n- iwlwifi: mvm: honor the max_amsdu_subframes limit (bsc#1051510).\n- iwlwifi: mvm: make sure internal station has a valid id (bsc#1051510).\n- iwlwifi: mvm: remove DQA non-STA client mode special case (bsc#1051510).\n- iwlwifi: mvm: set the correct tid when we flush the MCAST sta (bsc#1051510).\n- iwlwifi: pcie: compare with number of IRQs requested for, not number of CPUs (bsc#1051510).\n- ixgbe: do not set RXDCTL.RLPML for 82599 (bsc#1056657).\n- ixgbe: prevent ptp_rx_hang from running when in FILTER_ALL mode (bsc#1056657 bsc#1056653).\n- jbd2: if the journal is aborted then do not allow update of the log tail (bsc#1052766).\n- jffs2_kill_sb(): deal with failed allocations (bsc#1052766).\n- kABI: protect ife_tlv_meta_decode (kabi).\n- kABI: protect struct cstate (kabi).\n- kABI: protect struct ipv6_pinfo (kabi).\n- kABI: protect tap_create_cdev (kabi).\n- kabi protect struct acpi_nfit_desc (bsc#1091424).\n- kabi/severities: Ignore kABI incompatibility for meson drm The symbols are used only between meson modules, so mostly internal.\n- kabi/severities: Ignore removed bugs.c symbols The second wave of SSBD patches drops those symbols and we can ignore them from kABI because nothing external should use them - they were exported only for kvm.\n- kabi/severities: add \u0027drivers/md/bcache/* PASS\u0027 for above change.\n- kabi/severities: add nvdimm internal symbols to kabi ignore list\n- kabi: add struct bpf_map back (References: bsc#1098425).\n- kcm: lock lower socket in kcm_attach (networking-stable-18_03_28).\n- kconfig: Avoid format overflow warning from GCC 8.1 (bsc#1051510).\n- kconfig: Do not leak main menus during parsing (bsc#1051510).\n- kconfig: Fix automatic menu creation mem leak (bsc#1051510).\n- kconfig: Fix expr_free() E_NOT leak (bsc#1051510).\n- kernel-binary: also default klp_symbols to 0 here.\n- kernel-binary: pass ARCH= to kernel build Recent kernel does not save CONFIG_64BIT so it has to be specified by arch.\n- kernel-binary: pass MAKE_ARGS to install script as well.\n- kernel-{binary,docs}.spec sort dependencies.\n- kernel/acct.c: fix the acct-\u003eneedcheck check in check_free_space() (Git-fixes).\n- kernel/async.c: revert \u0027async: simplify lowest_in_progress()\u0027 (Git-fixes).\n- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bsc#1051510).\n- kernel/relay.c: revert \u0027kernel/relay.c: fix potential memory leak\u0027 (Git-fixes).\n- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals (Git-fixes).\n- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL (Git-fixes).\n- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() (Git-fixes).\n- kexec: export PG_swapbacked to VMCOREINFO (bsc#1088354).\n- kexec_file: do not add extra alignment to efi memmap (bsc#1089268).\n- klp_symbols: make --klp-symbols argument semantic sane It selects build of klp symbols and defaults to off\n- kmod: fix wait on recursive loop (bsc#1099792).\n- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).\n- kmod: throttle kmod thread limit (bsc#1099792).\n- kobject: do not use WARN for registration failures (bsc#1051510).\n- kvm: Introduce nopvspin kernel parameter (bsc#1056427).\n- kvm: nVMX: Enforce cpl=0 for VMX instructions (bsc#1099183).\n- l2tp: check sockaddr length in pppol2tp_connect() (networking-stable-18_04_26).\n- l2tp: do not accept arbitrary sockets (bsc#1076830).\n- lan78xx: Crash in lan78xx_writ_reg (Workqueue: events lan78xx_deferred_multicast_write) (networking-stable-18_04_10).\n- leds: pm8058: Silence pointer to integer size warning (bsc#1051510).\n- lib/kobject: Join string literals back (bsc#1051510).\n- lib/string_helpers: Add missed declaration of struct task_struct (bsc#1099918).\n- lib/test_bitmap.c: fix bitmap optimisation tests to report errors correctly (bsc#1051510).\n- libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs (bsc#1051510).\n- libata: Blacklist some Sandisk SSDs for NCQ (bsc#1051510).\n- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bsc#1051510).\n- libata: blacklist Micron 500IT SSD with MU01 firmware (bsc#1051510).\n- libata: zpodd: make arrays cdb static, reduces object code size (bsc#1051510).\n- libata: zpodd: small read overflow in eject_tray() (bsc#1051510).\n- libceph, ceph: change permission for readonly debugfs entries (bsc#1089115).\n- libceph: adding missing message types to ceph_msg_type_name() (bsc#1089115).\n- libceph: fix misjudgement of maximum monitor number (bsc#1089115).\n- libceph: reschedule a tick in finish_hunting() (bsc#1089115).\n- libceph: un-backoff on tick when we have a authenticated session (bsc#1089115).\n- libceph: validate con-\u003estate at the top of try_write() (bsc#1089115).\n- libnvdimm, btt: add a couple of missing kernel-doc lines (bsc#1087210).\n- libnvdimm, btt: clean up warning and error messages (bsc#1087205).\n- libnvdimm, btt: fix format string warnings (bsc#1087205).\n- libnvdimm, dimm: handle EACCES failures from label reads ().\n- libnvdimm, label: change min label storage size per UEFI 2.7 (bsc#1091666).\n- libnvdimm, namespace: use a safe lookup for dimm device name (bsc#1095321).\n- libnvdimm, nfit: fix persistence domain reporting (bsc#1091424).\n- libnvdimm, pmem: Add sysfs notifications to badblocks ().\n- libnvdimm, pmem: Do not flush power-fail protected CPU caches (bsc#1091424).\n- libnvdimm, pmem: Unconditionally deep flush on *sync (bsc#1091424).\n- libnvdimm, region, pmem: fix \u0027badblocks\u0027 sysfs_get_dirent() reference lifetime ().\n- libnvdimm, region: hide persistence_domain when unknown (bsc#1091424).\n- libnvdimm: expose platform persistence attribute for nd_region (bsc#1091424).\n- libnvdimm: re-enable deep flush for pmem devices via fsync() (bsc#1091424).\n- llc: better deal with too small mtu (networking-stable-18_05_15).\n- llc: fix NULL pointer deref for SOCK_ZAPPED (networking-stable-18_04_26).\n- llc: hold llc_sap before release_sock() (networking-stable-18_04_26).\n- lock_parent() needs to recheck if dentry got __dentry_kill\u0027ed under it (bsc#1052766).\n- locking/atomics, dm-integrity: Convert ACCESS_ONCE() to READ_ONCE()/WRITE_ONCE() (bsc#1093023).\n- locking/atomics: COCCINELLE/treewide: Convert trivial ACCESS_ONCE() patterns to READ_ONCE()/WRITE_ONCE() (bsc#1093023).\n- locking/qspinlock: Ensure node is initialised before updating prev-\u003enext (bsc#1050549).\n- locking/qspinlock: Ensure node-\u003ecount is updated before initialising node (bsc#1050549).\n- locking: Remove smp_read_barrier_depends() from queued_spin_lock_slowpath() (bsc#1050549).\n- loop: handle short DIO reads (bsc#1052766).\n- lsm: fix smack_inode_removexattr and xattr_getsecurity memleak (bsc#1051510).\n- mac80211: Adjust SAE authentication timeout (bsc#1051510).\n- mac80211: Do not disconnect on invalid operating class (bsc#1051510).\n- mac80211: Fix condition validating WMM IE (bsc#1051510).\n- mac80211: Fix sending ADDBA response for an ongoing session (bsc#1051510).\n- mac80211: Fix setting TX power on monitor interfaces (bsc#1051510).\n- mac80211: drop frames with unexpected DS bits from fast-rx to slow path (bsc#1051510).\n- mac80211: mesh: fix wrong mesh TTL offset calculation (bsc#1051510).\n- mac80211: round IEEE80211_TX_STATUS_HEADROOM up to multiple of 4 (bsc#1051510).\n- mac80211: use timeout from the AddBA response instead of the request (bsc#1051510).\n- macros.kernel-source: Fix building non-x86 KMPs\n- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.\n- macros.kernel-source: ignore errors when using make to print kernel release There is no way to handle the errors anyway and including the error into package version does not give good results.\n- macvlan: filter out unsupported feature flags (networking-stable-18_03_28).\n- macvlan: fix memory hole in macvlan_dev (bsc#1099918).\n- macvlan: remove unused fields in struct macvlan_dev (bsc#1099918).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush sequence (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix mask used in CMPL_START_ADDR_VALUE() (bsc#1051510).\n- mailbox: mailbox-test: do not rely on rx_buffer content to signal data ready (bsc#1051510).\n- mbcache: initialize entry-\u003ee_referenced in mb_cache_entry_create() (bsc#1052766).\n- md-cluster: choose correct label when clustered layout is not supported (bsc#1093023).\n- md-cluster: do not update recovery_offset for faulty device (bsc#1093023).\n- md-cluster: make function cluster_check_sync_size static (bsc#1093023).\n- md-multipath: Use seq_putc() in multipath_status() (bsc#1093023).\n- md/bitmap: clear BITMAP_WRITE_ERROR bit before writing it to sb (bsc#1093023).\n- md/bitmap: copy correct data for bitmap super (bsc#1093023).\n- md/bitmap: revert a patch (bsc#1093023).\n- md/r5cache: call mddev_lock/unlock() in r5c_journal_mode_show (bsc#1093023).\n- md/r5cache: fix io_unit handling in r5l_log_endio() (bsc#1093023).\n- md/r5cache: move mddev_lock() out of r5c_journal_mode_set() (bsc#1093023).\n- md/r5cache: print more info of log recovery (bsc#1093023).\n- md/raid0: attach correct cgroup info in bio (bsc#1093023).\n- md/raid1,raid10: silence warning about wait-within-wait (bsc#1093023).\n- md/raid1/10: add missed blk plug (bsc#1093023).\n- md/raid1: Fix trailing semicolon (bsc#1093023).\n- md/raid1: exit sync request if MD_RECOVERY_INTR is set (bsc#1093023).\n- md/raid1: fix NULL pointer dereference (bsc#1093023).\n- md/raid5: cap worker count (bsc#1093023).\n- md/raid5: correct degraded calculation in raid5_error (bsc#1093023).\n- md/raid5: simplify uninitialization of shrinker (bsc#1093023).\n- md: Delete gendisk before cleaning up the request queue (bsc#1093023).\n- md: allow metadata update while suspending (bsc#1093023).\n- md: always hold reconfig_mutex when calling mddev_suspend() (bsc#1093023).\n- md: be cautious about using -\u003ecurr_resync_completed for -\u003erecovery_offset (bsc#1093023).\n- md: do not call bitmap_create() while array is quiesced (bsc#1093023).\n- md: do not check MD_SB_CHANGE_CLEAN in md_allow_write (bsc#1093023).\n- md: document lifetime of internal rdev pointer (bsc#1093023).\n- md: fix a potential deadlock of raid5/raid10 reshape (bsc#1093023).\n- md: fix a race condition for flush request handling (bsc#1093023).\n- md: fix deadlock error in recent patch (bsc#1093023).\n- md: fix two problems with setting the \u0027re-add\u0027 device state (bsc#1098176).\n- md: forbid a RAID5 from having both a bitmap and a journal (bsc#1093023).\n- md: free unused memory after bitmap resize (bsc#1093023).\n- md: limit mdstat resync progress to max_sectors (bsc#1093023).\n- md: move suspend_hi/lo handling into core md code (bsc#1093023).\n- md: only allow remove_and_add_spares when no sync_thread running (bsc#1093023).\n- md: raid10: remove VLAIS (bsc#1093023).\n- md: raid10: remove a couple of redundant variables and initializations (bsc#1093023).\n- md: raid5: avoid string overflow warning (bsc#1093023).\n- md: release allocated bitset sync_set (bsc#1093023).\n- md: remove redundant variable q (bsc#1093023).\n- md: remove special meaning of -\u003equiesce(.., 2) (bsc#1093023).\n- md: rename some drivers/md/ files to have an \u0027md-\u0027 prefix (bsc#1093023).\n- md: replace seq_release_private with seq_release (bsc#1093023).\n- md: separate request handling (bsc#1093023).\n- md: use TASK_IDLE instead of blocking signals (bsc#1093023).\n- md: use lockdep_assert_held (bsc#1093023).\n- md: use mddev_suspend/resume instead of -\u003equiesce() (bsc#1093023).\n- media: atomisp_fops.c: disable atomisp_compat_ioctl32 (bsc#1051510).\n- media: au0828: add VIDEO_V4L2 dependency (bsc#1051510).\n- media: cx231xx: Add support for AverMedia DVD EZMaker 7 (bsc#1051510).\n- media: cx23885: Override 888 ImpactVCBe crystal frequency (bsc#1051510).\n- media: cx23885: Set subdev host data to clk_freq pointer (bsc#1051510).\n- media: dmxdev: fix error code for invalid ioctls (bsc#1051510).\n- media: dvb_frontend: fix locking issues at dvb_frontend_get_event() (bsc#1051510).\n- media: em28xx: Add Hauppauge SoloHD/DualHD bulk models (bsc#1051510).\n- media: em28xx: USB bulk packet size fix (bsc#1051510).\n- media: lgdt3306a: Fix a double kfree on i2c device remove (bsc#1051510).\n- media: lgdt3306a: Fix module count mismatch on usb unplug (bsc#1051510).\n- media: smiapp: fix timeout checking in smiapp_read_nvm (bsc#1099918).\n- media: uvcvideo: Support realtek\u0027s UVC 1.5 device (bsc#1099109).\n- media: v4l2-compat-ioctl32: do not oops on overlay (bsc#1051510).\n- media: v4l2-compat-ioctl32: prevent go past max size (bsc#1051510).\n- media: videobuf2-core: do not go out of the buffer range (bsc#1051510).\n- media: vivid: check if the cec_adapter is valid (bsc#1051510).\n- mei: me: add cannon point device ids ().\n- mei: me: add cannon point device ids for 4th device ().\n- mei: remove dev_err message on an unsupported ioctl (bsc#1051510).\n- mfd: cros ec: spi: Do not send first message too soon (bsc#1051510).\n- mfd: intel-lpss: Fix Intel Cannon Lake LPSS I2C input clock (bsc#1051510).\n- mfd: intel-lpss: Program REMAP register in PIO mode (bsc#1051510).\n- mkspec: only build docs for default variant kernel.\n- mlxsw: spectrum: Disable MAC learning for ovs port (networking-stable-17_12_31).\n- mlxsw: spectrum: Forbid linking to devices that have uppers FIX (stable-fixes).\n- mlxsw: spectrum: Prevent mirred-related crash on removal (networking-stable-17_10_09).\n- mlxsw: spectrum: Relax sanity checks during enslavement (networking-stable-18_01_12).\n- mlxsw: spectrum_buffers: Set a minimum quota for CPU port traffic (networking-stable-18_03_28).\n- mlxsw: spectrum_router: Do not log an error on missing neighbor (networking-stable-18_01_28).\n- mlxsw: spectrum_router: Fix NULL pointer deref (networking-stable-18_01_12).\n- mlxsw: spectrum_router: Fix error path in mlxsw_sp_vr_create (networking-stable-18_03_07).\n- mlxsw: spectrum_router: Simplify a piece of code (networking-stable-18_01_12).\n- mlxsw: spectrum_switchdev: Check success of FDB add operation (networking-stable-18_03_07).\n- mm, oom_reaper: skip mm structs with mmu notifiers (bsc#1099918).\n- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).\n- mm, percpu: add support for __GFP_NOWARN flag (bsc#1089753).\n- mm, slab: reschedule cache_reap() on the same CPU (VM Functionality, bsc#1097796).\n- mm, swap: fix false error message in __swp_swapcount() (VM Functionality, bsc#1098043).\n- mm, swap: fix race between swap count continuation operations (VM Functionality, bsc#1097373). mm, swap: fix race between swap count continuation operations - KABI fix (VM Functionality, bsc#1097373).\n- mm, thp: do not cause memcg oom for thp (bnc#1089663).\n- mm/fadvise: discard partial page if endbyte is also EOF (bsc#1052766).\n- mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (bsc#1052766).\n- mm/huge_memory.c: __split_huge_page() use atomic ClearPageDirty() (VM Functionality, bsc#1097800).\n- mm/khugepaged.c: convert VM_BUG_ON() to collapse fail (VM Functionality, bsc#1097468).\n- mm/ksm.c: fix inconsistent accounting of zero pages (VM Functionality, bsc#1097780).\n- mm/mempolicy.c: avoid use uninitialized preferred_node (VM Functionality, bsc#1097465).\n- mm/page_owner: fix recursion bug after changing skip entries (VM Functionality, bsc#1097472).\n- mm/pkeys, powerpc, x86: Provide an empty vma_pkey() in linux/pkeys.h (bsc#1078248).\n- mm/pkeys, x86, powerpc: Display pkey in smaps if arch supports pkeys (bsc#1078248).\n- mm/pkeys: Add an empty arch_pkeys_enabled() (bsc#1078248).\n- mm/pkeys: Remove include of asm/mmu_context.h from pkeys.h (bsc#1078248).\n- mm/shmem: do not wait for lock_page() in shmem_unused_huge_shrink() (bnc#1089667).\n- mm/thp: do not wait for lock_page() in deferred_split_scan() (VM Functionality, bsc#1097470).\n- mm: Fix memory size alignment in devm_memremap_pages_release() (VM Functionality, bsc#1097439).\n- mm: fix device-dax pud write-faults triggered by get_user_pages() (bsc#1052766).\n- mm: fix the NULL mapping case in __isolate_lru_page() (bnc#971975 VM -- git fixes).\n- mmc: dw_mmc: exynos: fix the suspend/resume issue for exynos5433 (bsc#1051510).\n- mmc: jz4740: Fix race condition in IRQ mask update (bsc#1051510).\n- mmc: sdhci-iproc: add SDHCI_QUIRK2_HOST_OFF_CARD_ON for cygnus (bsc#1051510).\n- mmc: sdhci-iproc: fix 32bit writes for TRANSFER_MODE register (bsc#1051510).\n- mmc: sdhci-iproc: remove hard coded mmc cap 1.8v (bsc#1051510).\n- mmc: sdhci-pci: Fix voltage switch for some Intel host controllers (bsc#1051510).\n- mmc: sdhci-pci: Only do AMD tuning for HS200 (bsc#1051510).\n- mq-deadline: Enable auto-loading when built as module (bsc#1099918).\n- mremap: Remove LATENCY_LIMIT from mremap to reduce the number of TLB shootdowns (bnc#1095115).\n- mtd: cmdlinepart: Update comment for introduction of OFFSET_CONTINUOUS (bsc#1099918).\n- mtd: jedec_probe: Fix crash in jedec_read_mfr() (bsc#1099918).\n- mtd: nand: fsl_ifc: Fix eccstat array overflow for IFC ver \u003e= 2.0.0 (bsc#1099918).\n- mtd: partitions: add helper for deleting partition (bsc#1099918).\n- mtd: partitions: remove sysfs files when deleting all master\u0027s partitions (bsc#1099918).\n- mtd: ubi: wl: Fix error return code in ubi_wl_init() (bsc#1051510).\n- mwifiex: pcie: tighten a check in mwifiex_pcie_process_event_ready() (bsc#1051510).\n- n_tty: Access echo_* variables carefully (bsc#1051510).\n- n_tty: Fix stall at n_tty_receive_char_special() (bsc#1051510).\n- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) (bnc#1094825).\n- nbd: do not start req until after the dead connection logic (bsc#1099918).\n- nbd: fix -ERESTARTSYS handling (bsc#1099918).\n- nbd: fix nbd device deletion (bsc#1099918).\n- nbd: fix return value in error handling path (bsc#1099918).\n- nbd: wait uninterruptible for the dead timeout (bsc#1099918).\n- net sched actions: fix refcnt leak in skbmod (networking-stable-18_05_15).\n- net sched actions: return explicit error when tunnel_key mode is not specified (bsc#1056787).\n- net/ipv6: Fix route leaking between VRFs (networking-stable-18_04_10).\n- net/ipv6: Increment OUTxxx counters after netfilter hook (networking-stable-18_04_10).\n- net/iucv: Free memory obtained by kzalloc (networking-stable-18_03_28).\n- net/mlx4_en: Fix an error handling path in \u0027mlx4_en_init_netdev()\u0027 (networking-stable-18_05_15).\n- net/mlx4_en: Verify coalescing parameters are in range (networking-stable-18_05_15).\n- net/mlx5: E-Switch, Include VF RDMA stats in vport statistics (networking-stable-18_05_15).\n- net/mlx5: Eliminate query xsrq dead code (bsc#1046303).\n- net/mlx5: Fix build break when CONFIG_SMP=n (bsc#1046303).\n- net/mlx5: Fix mlx5_get_vector_affinity function (bsc#1046303).\n- net/mlx5e: Allow offloading ipv4 header re-write for icmp (bsc#1046303).\n- net/mlx5e: Do not reset Receive Queue params on every type change (bsc#1046303).\n- net/mlx5e: Err if asked to offload TC match on frag being first (networking-stable-18_05_15).\n- net/mlx5e: Fixed sleeping inside atomic context (bsc#1046303).\n- net/mlx5e: Remove unused define MLX5_MPWRQ_STRIDES_PER_PAGE (bsc#1046303).\n- net/mlx5e: TX, Use correct counter in dma_map error flow (networking-stable-18_05_15).\n- net/sched: cls_u32: fix cls_u32 on filter replace (networking-stable-18_03_07).\n- net/sched: fix NULL dereference in the error path of tcf_bpf_init() (bsc#1056787).\n- net/sched: fix NULL dereference in the error path of tunnel_key_init() (bsc#1056787).\n- net/sched: fix NULL dereference on the error path of tcf_skbmod_init() (bsc#1056787).\n- net/sctp: Always set scope_id in sctp_inet6_skb_msgname (networking-stable-17_11_20).\n- net/unix: do not show information about sockets from other namespaces (networking-stable-17_11_14).\n- net/usb/qmi_wwan.c: Add USB id for lt4120 modem (bsc#1087092).\n- net: Allow neigh contructor functions ability to modify the primary_key (networking-stable-18_01_28).\n- net: Fix hlist corruptions in inet_evict_bucket() (networking-stable-18_03_28).\n- net: Only honor ifindex in IP_PKTINFO if non-0 (networking-stable-18_03_28).\n- net: Set sk_prot_creator when cloning sockets to the right proto (networking-stable-17_10_09).\n- net: af_packet: fix race in PACKET_{R|T}X_RING (networking-stable-18_04_26).\n- net: bonding: Fix transmit load balancing in balance-alb mode if specified by sysfs (networking-stable-17_10_09).\n- net: bonding: fix tlb_dynamic_lb default value (networking-stable-17_10_09).\n- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks (networking-stable-17_12_31).\n- net: bridge: fix returning of vlan range op errors (networking-stable-17_11_14).\n- net: core: fix module type in sock_diag_bind (networking-stable-18_01_12).\n- net: dsa: bcm_sf2: Clear IDDQ_GLOBAL_PWR bit for PHY (networking-stable-17_12_31).\n- net: dsa: check master device before put (networking-stable-17_11_14).\n- net: dsa: mv88e6xxx: lock mutex when freeing IRQs (networking-stable-17_10_09).\n- net: emac: Fix napi poll list corruption (networking-stable-17_10_09).\n- net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred (networking-stable-18_03_28).\n- net: ethernet: sun: niu set correct packet size in skb (networking-stable-18_05_15).\n- net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY interface (networking-stable-18_03_28).\n- net: ethernet: ti: cpsw: fix net watchdog timeout (networking-stable-18_03_07).\n- net: ethernet: ti: cpsw: fix packet leaking in dual_mac mode (networking-stable-18_05_15).\n- net: ethernet: ti: cpsw: fix tx vlan priority mapping (networking-stable-18_04_26).\n- net: ethtool: Add missing kernel doc for FEC parameters (bsc#1046540).\n- net: fec: Fix unbalanced PM runtime calls (networking-stable-18_03_28).\n- net: fec: defer probe if regulator is not ready (networking-stable-18_01_12).\n- net: fec: free/restore resource in related probe error pathes (networking-stable-18_01_12).\n- net: fec: restore dev_id in the cases of probe error (networking-stable-18_01_12).\n- net: fec: unmap the xmit buffer that are not transferred by DMA (networking-stable-17_12_31).\n- net: fix deadlock while clearing neighbor proxy table (networking-stable-18_04_26).\n- net: fix possible out-of-bound read in skb_network_protocol() (networking-stable-18_04_10).\n- net: fool proof dev_valid_name() (networking-stable-18_04_10).\n- net: igmp: Use correct source address on IGMPv3 reports (networking-stable-17_12_31).\n- net: igmp: add a missing rcu locking section (git-fixes).\n- net: igmp: fix source address check for IGMPv3 reports (git-fixes).\n- net: ipv4: avoid unused variable warning for sysctl (git-fixes).\n- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (networking-stable-18_03_07).\n- net: ipv6: keep sk status consistent after datagram connect failure (networking-stable-18_03_28).\n- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (networking-stable-17_12_31).\n- net: phy: Fix mask value write on gmii2rgmii converter speed register (networking-stable-17_10_09).\n- net: phy: Tell caller result of phy_change() (networking-stable-18_03_28).\n- net: phy: fix phy_start to consider PHY_IGNORE_INTERRUPT (networking-stable-18_03_07).\n- net: phy: marvell: Limit 88m1101 autoneg errata to 88E1145 as well (networking-stable-17_12_31).\n- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround (networking-stable-17_12_31).\n- net: qcom/emac: specify the correct size when mapping a DMA buffer (networking-stable-17_10_09).\n- net: qdisc_pkt_len_init() should be more robust (networking-stable-18_01_28).\n- net: qlge: use memmove instead of skb_copy_to_linear_data (bsc#1050529 bsc#1086319).\n- net: realtek: r8169: implement set_link_ksettings() (networking-stable-17_12_12).\n- net: reevalulate autoflowlabel setting after sysctl setting (networking-stable-17_12_31).\n- net: remove hlist_nulls_add_tail_rcu() (networking-stable-17_12_12).\n- net: sched: fix error path in tcf_proto_create() when modules are not configured (networking-stable-18_05_15).\n- net: sched: ife: check on metadata length (networking-stable-18_04_26).\n- net: sched: ife: handle malformed tlv length (networking-stable-18_04_26).\n- net: sched: ife: signal not finding metaid (networking-stable-18_04_26).\n- net: sched: report if filter is too large to dump (networking-stable-18_03_07).\n- net: stmmac: enable EEE in MII, GMII or RGMII only (networking-stable-18_01_12).\n- net: support compat 64-bit time in {s,g}etsockopt (networking-stable-18_05_15).\n- net: systemport: Correct IPG length settings (networking-stable-17_11_20).\n- net: systemport: Rewrite __bcm_sysport_tx_reclaim() (networking-stable-18_03_28).\n- net: tcp: close sock if net namespace is exiting (networking-stable-18_01_28).\n- net: validate attribute sizes in neigh_dump_table() (networking-stable-18_04_26).\n- net: vrf: Add support for sends to local broadcast address (networking-stable-18_01_28).\n- net_sched: fq: take care of throttled flows before reuse (networking-stable-18_05_15).\n- netfilter/ipvs: clear ipvs_property flag when SKB net namespace changed (networking-stable-17_11_20).\n- netfilter: use skb_to_full_sk in ip6_route_me_harder (bsc#1076830).\n- netlink: avoid a double skb free in genlmsg_mcast() (git-fixes).\n- netlink: do not proceed if dump\u0027s start() errs (networking-stable-17_10_09).\n- netlink: do not set cb_running if dump\u0027s start() errs (networking-stable-17_11_14).\n- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (networking-stable-18_03_07).\n- netlink: extack needs to be reset each time through loop (networking-stable-18_01_28).\n- netlink: make sure nladdr has correct size in netlink_connect() (networking-stable-18_04_10).\n- netlink: put module reference if dump start fails (git-fixes).\n- netlink: reset extack earlier in netlink_rcv_skb (networking-stable-18_01_28).\n- nfit-test: Add platform cap support from ACPI 6.2a to test (bsc#1091424).\n- nfit: skip region registration for incomplete control regions (bsc#1091666).\n- nfp: use full 40 bits of the NSP buffer address (bsc#1055968).\n- nl80211: relax ht operation checks for mesh (bsc#1051510).\n- nubus: Avoid array underflow and overflow (bsc#1099918).\n- nubus: Fix up header split (bsc#1099918).\n- nvme-fabrics: allow duplicate connections to the discovery controller (bsc#1098706).\n- nvme-fabrics: allow internal passthrough command on deleting controllers (bsc#1098706).\n- nvme-fabrics: centralize discovery controller defaults (bsc#1098706).\n- nvme-fabrics: fix and refine state checks in __nvmf_check_ready (bsc#1098706).\n- nvme-fabrics: handle the admin-only case properly in nvmf_check_ready (bsc#1098706).\n- nvme-fabrics: refactor queue ready check (bsc#1098706).\n- nvme-fabrics: remove unnecessary controller subnqn validation (bsc#1098706).\n- nvme-fc: change controllers first connect to use reconnect path (bsc#1098706).\n- nvme-fc: fix nulling of queue data on reconnect (bsc#1098706).\n- nvme-fc: release io queues to allow fast fail (bsc#1098706).\n- nvme-fc: remove reinit_request routine (bsc#1098706).\n- nvme-fc: remove setting DNR on exception conditions (bsc#1098706).\n- nvme-multipath: fix sysfs dangerously created links (bsc#1096529).\n- nvme-rdma: Fix command completion race at error recovery (bsc#1099041).\n- nvme-rdma: correctly check for target keyed sgl support (bsc#1099041).\n- nvme-rdma: do not override opts-\u003equeue_size (bsc#1099041).\n- nvme-rdma: fix error flow during mapping request data (bsc#1099041).\n- nvme-rdma: fix possible double free condition when failing to create a controller (bsc#1099041).\n- nvme/multipath: Fix multipath disabled naming collisions (bsc#1098706).\n- nvme: Set integrity flag for user passthrough commands (bsc#1098706).\n- nvme: Skip checking heads without namespaces (bsc#1098706).\n- nvme: Use admin command effects for admin commands (bsc#1098706).\n- nvme: add quirk to force medium priority for SQ creation ().\n- nvme: allow duplicate controller if prior controller being deleted (bsc#1098706).\n- nvme: check return value of init_srcu_struct function (bsc#1098706).\n- nvme: do not send keep-alives to the discovery controller ().\n- nvme: expand nvmf_check_if_ready checks (bsc#1098706).\n- nvme: fix NULL pointer dereference in nvme_init_subsystem (bsc#1098706).\n- nvme: fix extended data LBA supported setting ().\n- nvme: fix lockdep warning in nvme_mpath_clear_current_path ().\n- nvme: fix potential memory leak in option parsing (bsc#1098706).\n- nvme: move init of keep_alive work item to controller initialization (bsc#1098706).\n- nvme: target: fix buffer overflow ().\n- nvmet-fc: increase LS buffer count per fc port (bsc#1098706).\n- nvmet: fix space padding in serial number ().\n- nvmet: switch loopback target state to connecting when resetting (bsc#1098706).\n- objtool, perf: Fix GCC 8 -Wrestrict error (Fix gcc 8 restrict error).\n- ocfs2/acl: use \u0027ip_xattr_sem\u0027 to protect getting extended attribute (bsc#1052766).\n- ocfs2/dlm: Fix up kABI in dlm_ctxt (bsc#1052766).\n- ocfs2/dlm: wait for dlm recovery done when migrating all lock resources (bsc#1052766).\n- ocfs2: return -EROFS to mount.ocfs2 if inode block is invalid (bsc#1052766).\n- of: overlay: validate offset from property fixups (bsc#1051510).\n- of: platform: stop accessing invalid dev in of_platform_device_destroy (bsc#1051510).\n- of: unittest: for strings, account for trailing \\0 in property length field (bsc#1051510).\n- omapdrm: panel: fix compatible vendor string for td028ttec1 (bsc#1051510).\n- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (networking-stable-18_05_15).\n- ovl: Put upperdentry if ovl_check_origin() fails (bsc#1088704).\n- ovl: Return -ENOMEM if an allocation fails ovl_lookup() (bsc#1096065).\n- ovl: fix failure to fsync lower dir (bsc#108871).\n- ovl: fix lookup with middle layer opaque dir and absolute path redirects (bsc#1090605).\n- p54: do not unregister leds when they are not initialized (bsc#1051510).\n- parport_pc: Add support for WCH CH382L PCI-E single parallel port card (bsc#1051510).\n- partitions/msdos: Unable to mount UFS 44bsd partitions (bsc#1051510).\n- pinctrl/amd: Fix build dependency on pinmux code (bsc#1051510).\n- pinctrl/amd: save pin registers over suspend/resume (bsc#1051510).\n- pinctrl: adi2: Fix Kconfig build problem (bsc#1051510).\n- pinctrl: armada-37xx: Fix direction_output() callback behavior (bsc#1051510).\n- pinctrl: artpec6: dt: add missing pin group uart5nocts (bsc#1051510).\n- pinctrl: baytrail: Enable glitch filter for GPIOs used as interrupts (bsc#1051510).\n- pinctrl: denverton: Fix UART2 RTS pin mode (bsc#1051510).\n- pinctrl: pxa: pxa2xx: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- pinctrl: rockchip: enable clock when reading pin direction register (bsc#1051510).\n- pinctrl: samsung: Fix NULL pointer exception on external interrupts on S3C24xx (bsc#1051510).\n- pinctrl: samsung: Fix invalid register offset used for Exynos5433 external interrupts (bsc#1051510).\n- pinctrl: sh-pfc: r8a7795-es1: Fix MOD_SEL1 bit[25:24] to 0x3 when using STP_ISEN_1_D (bsc#1051510).\n- pinctrl: sh-pfc: r8a7796: Fix MOD_SEL register pin assignment for SSI pins group (bsc#1051510).\n- pinctrl: sunxi: Fix A64 UART mux value (bsc#1051510).\n- pinctrl: sunxi: Fix A80 interrupt pin bank (bsc#1051510).\n- pinctrl: sx150x: Add a static gpio/pinctrl pin range mapping (bsc#1051510).\n- pinctrl: sx150x: Register pinctrl before adding the gpiochip (bsc#1051510).\n- pinctrl: sx150x: Unregister the pinctrl on release (bsc#1051510).\n- pipe: fix off-by-one error when checking buffer limits (bsc#1051510).\n- pktcdvd: Fix a recently introduced NULL pointer dereference (bsc#1099918).\n- pktcdvd: Fix pkt_setup_dev() error path (bsc#1099918).\n- platform/chrome: Use proper protocol transfer function (bsc#1051510).\n- platform/chrome: cros_ec_lpc: remove redundant pointer request (bsc#1051510).\n- platform/x86: asus-wireless: Fix NULL pointer dereference (bsc#1051510).\n- platform/x86: asus-wmi: Fix NULL pointer dereference (bsc#1051510).\n- platform/x86: fujitsu-laptop: Support Lifebook U7x7 hotkeys (bsc#1087284).\n- platform/x86: ideapad-laptop: Add MIIX 720-12IKB to no_hw_rfkill (bsc#1093035).\n- platform/x86: ideapad-laptop: Apply no_hw_rfkill to Y20-15IKBM, too (bsc#1098626).\n- platform/x86: thinkpad_acpi: suppress warning about palm detection (bsc#1051510).\n- power: supply: ab8500_charger: Bail out in case of error in \u0027ab8500_charger_init_hw_registers()\u0027 (bsc#1051510).\n- power: supply: ab8500_charger: Fix an error handling path (bsc#1051510).\n- power: supply: axp288_charger: Properly stop work on probe-error / remove (bsc#1051510).\n- powerpc/64s/idle: avoid sync for KVM state when waking from idle (bsc#1061840).\n- powerpc/64s: Fix mce accounting for powernv (bsc#1094244).\n- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772).\n- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772).\n- powerpc/kvm: Fix guest boot failure on Power9 since DAWR changes (bsc#1061840).\n- powerpc/kvm: Fix lockups when running KVM guests on Power8 (bsc#1061840).\n- powerpc/livepatch: Fix KABI breaker in stacktrace.c (bsc#1071995 bsc#1072856 bsc#1087458 bsc#1089664 bsc#1089669).\n- powerpc/livepatch: Fix build error with kprobes disabled (bsc#1071995).\n- powerpc/mm: Fix thread_pkey_regs_init() (bsc#1078248, git-fixes).\n- powerpc/perf: Add blacklisted events for Power9 DD2.1 (bsc1056686).\n- powerpc/perf: Add blacklisted events for Power9 DD2.2 (bsc1056686).\n- powerpc/perf: Fix kernel address leak via sampling registers (bsc1056686).\n- powerpc/perf: Infrastructure to support addition of blacklisted events (bsc1056686).\n- powerpc/perf: Prevent kernel address leak to userspace via BHRB buffer (bsc1056686).\n- powerpc/perf: Prevent kernel address leak via perf_get_data_addr() (bsc1056686).\n- powerpc/perf: fix bug references.\n- powerpc/pkeys: Detach execute_only key on !PROT_EXEC (bsc#1078248, git-fixes).\n- powerpc/pkeys: Drop private VM_PKEY definitions (bsc#1078248).\n- powerpc/ptrace: Fix enforcement of DAWR constraints (bsc#1099918).\n- powerpc/xmon: Also setup debugger hooks when single-stepping (bsc#1072829).\n- powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths (bsc#1088804).\n- powerpc64/ftrace: Add helpers to hard disable ftrace (bsc#1088804).\n- powerpc64/ftrace: Delay enabling ftrace on secondary cpus (bsc#1088804).\n- powerpc64/ftrace: Disable ftrace during hotplug (bsc#1088804).\n- powerpc64/ftrace: Disable ftrace during kvm guest entry/exit (bsc#1088804).\n- powerpc64/ftrace: Rearrange #ifdef sections in ftrace.h (bsc#1088804).\n- powerpc64/ftrace: Use the generic version of ftrace_replace_code() (bsc#1088804).\n- powerpc64/kexec: Hard disable ftrace before switching to the new kernel (bsc#1088804).\n- powerpc64/module: Tighten detection of mcount call sites with -mprofile-kernel (bsc#1088804).\n- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).\n- ppp: avoid loop in xmit recursion detection code (networking-stable-18_03_28).\n- ppp: fix race in ppp device destruction (networking-stable-17_11_14).\n- ppp: prevent unregistered channels from connecting to PPP units (networking-stable-18_03_07).\n- ppp: unlock all_ppp_mutex before registering device (networking-stable-18_01_28).\n- pppoe: check sockaddr length in pppoe_connect() (networking-stable-18_04_26).\n- pppoe: take -\u003eneeded_headroom of lower device into account on xmit (networking-stable-18_01_28).\n- pptp: remove a buggy dst release in pptp_connect() (networking-stable-18_04_10).\n- printk: fix possible reuse of va_list variable (bsc#1100602).\n- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).\n- ptr_ring: add barriers (networking-stable-17_12_31).\n- pty: cancel pty slave port buf\u0027s work in tty_release (bsc#1051510).\n- pwm: lpss: platform: Save/restore the ctrl register over a suspend/resume (bsc#1051510).\n- pwm: rcar: Fix a condition to prevent mismatch value setting to duty (bsc#1051510).\n- pwm: stmpe: Fix wrong register offset for hwpwm=2 case (bsc#1051510).\n- qed: Fix l2 initializations over iWARP personality (bsc#1050536 bsc#1050545).\n- qed: Fix non TCP packets should be dropped on iWARP ll2 connection (bsc#1050545).\n- qed: Free RoCE ILT Memory on rmmod qedr (bsc#1050536 bsc#1050545).\n- qed: Use after free in qed_rdma_free() (bsc#1050536 bsc#1050545).\n- qede: Fix gfp flags sent to rdma event node allocation (bsc#1050538 bsc#1050545).\n- qede: Fix qedr link update (bsc#1050538 bsc#1050545).\n- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).\n- qmi_wwan: Add missing skb_reset_mac_header-call (networking-stable-17_11_20).\n- qmi_wwan: Add support for Quectel EP06 (networking-stable-18_02_06).\n- qmi_wwan: do not steal interfaces from class drivers (bsc#1092888).\n- r8169: fix powering up RTL8168h (bsc#1051510).\n- r8169: fix setting driver_data after register_netdev (bsc#1051510).\n- radeon: hide pointless #warning when compile testing (bsc#1051510).\n- radix tree test suite: add item_delete_rcu() (bsc#1095467).\n- radix tree test suite: fix compilation issue (bsc#1095467).\n- radix tree test suite: fix mapshift build target (bsc#1095467).\n- radix tree test suite: multi-order iteration race (bsc#1095467).\n- radix tree: fix multi-order iteration race (bsc#1095467).\n- raid10: check bio in r10buf_pool_free to void NULL pointer dereference (bsc#1098174).\n- raid1: copy write hint from master bio to behind bio (bsc#1093023).\n- raid1: prevent freeze_array/wait_all_barriers deadlock (bsc#1093023).\n- raid1: remove obsolete code in raid1_write_request (bsc#1093023).\n- raid5-ppl: PPL support for disks with write-back cache enabled (bsc#1093023).\n- raid5-ppl: fix handling flush requests (bsc#1093023).\n- raid5: Set R5_Expanded on parity devices as well as data (bsc#1093023).\n- raid5: remove raid5_build_block (bsc#1093023).\n- raid: remove tile specific raid6 implementation (bsc#1093023).\n- random: crng_reseed() should lock the crng instance that it is modifying (bsc#1051510).\n- random: use a different mixing algorithm for add_device_randomness() (bsc#1051510).\n- random: use a tighter cap in credit_entropy_bits_safe() (bsc#1051510).\n- rbd: use GFP_NOIO for parent stat and data requests (bsc#1093728).\n- rds: Incorrect reference counting in TCP socket creation (bsc#1076830).\n- rds: MP-RDS may use an invalid c_path (networking-stable-18_04_13).\n- rds: do not leak kernel memory to user land (networking-stable-18_05_15).\n- regulator: Do not return or expect -errno from of_map_mode() (bsc#1099029).\n- regulator: cpcap: Fix standby mode (bsc#1051510).\n- regulator: gpio: Fix some error handling paths in \u0027gpio_regulator_probe()\u0027 (bsc#1091960).\n- regulator: of: Add a missing \u0027of_node_put()\u0027 in an error handling path of \u0027of_regulator_match()\u0027 (bsc#1051510).\n- resource: fix integer overflow at reallocation (bsc#1086739).\n- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).\n- rfkill: gpio: fix memory leak in probe error path (bsc#1051510).\n- rhashtable: Fix rhlist duplicates insertion (bsc#1051510).\n- rmdir(),rename(): do shrink_dcache_parent() only on success (bsc#1100340).\n- rocker: fix possible null pointer dereference in rocker_router_fib_event_work (networking-stable-18_02_06).\n- route: check sysctl_fib_multipath_use_neigh earlier than hash (networking-stable-18_04_10).\n- rpm/config.sh: Fixup BUGZILLA_PRODUCT variable\n- rpm/kernel-docs.spec.in: Fix and cleanup for 4.13 doc build (bsc#1048129) The whole DocBook stuff has been deleted. The PDF build still non-working thus the sub-packaging disabled so far.\n- rpm/kernel-source.changes.old: Add pre-SLE15 history (bsc#1098995).\n- rpm/modules.fips include module list from dracut\n- rt2x00: do not pause queue unconditionally on error path (bsc#1051510).\n- rtc-opal: Fix handling of firmware error codes, prevent busy loops (bsc#1051510).\n- rtc: hctosys: Ensure system time does not overflow time_t (bsc#1051510).\n- rtc: pcf8563: fix output clock rate (bsc#1051510).\n- rtc: pl031: make interrupt optional (bsc#1051510).\n- rtc: snvs: Fix usage of snvs_rtc_enable (bsc#1051510).\n- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bsc#1051510).\n- rtl8187: Fix NULL pointer dereference in priv-\u003econf_mutex (bsc#1051510).\n- rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c (bsc#1051510).\n- rxrpc: Fix send in rxrpc_send_data_packet() (networking-stable-18_03_07).\n- s390/archrandom: Reconsider s390 arch random implementation (bnc#1096753, LTC#168037).\n- s390/archrandom: Rework arch random implementation (bnc#1096753, LTC#168037).\n- s390/cio: update chpid descriptor after resource accessibility event (bnc#1093148, LTC#167307).\n- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (bnc#1096753, LTC#168037).\n- s390/dasd: fix IO error for newly defined devices (bnc#1093148, LTC#167307).\n- s390/qdio: do not merge ERROR output buffers (bsc#1099715).\n- s390/qdio: fix access to uninitialized qdio_q fields (bnc#1096753, LTC#168037).\n- s390/qeth: do not dump control cmd twice (bsc#1099715).\n- s390/qeth: fix IPA command submission race (networking-stable-18_03_07).\n- s390/qeth: fix IPA command submission race (bsc#1099715).\n- s390/qeth: fix MAC address update sequence (bnc#1093148, LTC#167307).\n- s390/qeth: fix overestimated count of buffer elements (bsc#1099715).\n- s390/qeth: fix overestimated count of buffer elements (networking-stable-18_03_07).\n- s390/qeth: free netdevice when removing a card (networking-stable-18_03_28).\n- s390/qeth: free netdevice when removing a card (bsc#1099715).\n- s390/qeth: lock read device while queueing next buffer (bsc#1099715).\n- s390/qeth: lock read device while queueing next buffer (networking-stable-18_03_28).\n- s390/qeth: translate SETVLAN/DELVLAN errors (bnc#1093148, LTC#167307).\n- s390/qeth: use Read device to query hypervisor for MAC (bsc#1061024).\n- s390/qeth: when thread completes, wake up all waiters (bsc#1099715).\n- s390/qeth: when thread completes, wake up all waiters (networking-stable-18_03_28).\n- s390/uprobes: implement arch_uretprobe_is_alive() (bnc#1093148, LTC#167307).\n- s390/zcrypt: Fix CCA and EP11 CPRB processing failure memory leak (bnc#1096753, LTC#168037).\n- sch_netem: fix skb leak in netem_enqueue() (networking-stable-18_03_28).\n- sched/numa: Stagger NUMA balancing scan periods for new threads (Automatic NUMA Balancing ()).\n- sched: Make resched_cpu() unconditional (Git-fixes).\n- sched: Stop resched_cpu() from sending IPIs to offline CPUs (Git-fixes).\n- sched: Stop switched_to_rt() from sending IPIs to offline CPUs (Git-fixes).\n- scripts/git_sort/git_sort.py:\n- scripts/git_sort/git_sort.py: add Viro\u0027s vfs git\n- scsi: core: return BLK_STS_OK for DID_OK in __scsi_error_from_host_byte() (bsc#1099918).\n- scsi: ipr: Format HCAM overlay ID 0x41 (bsc#1097961).\n- scsi: ipr: new IOASC update (bsc#1097961).\n- scsi: lpfc: Add per io channel NVME IO statistics (bsc#1088866).\n- scsi: lpfc: Change IO submit return to EBUSY if remote port is recovering (bsc#1088866).\n- scsi: lpfc: Comment cleanup regarding Broadcom copyright header (bsc#1088866).\n- scsi: lpfc: Correct fw download error message (bsc#1088866).\n- scsi: lpfc: Correct missing remoteport registration during link bounces (bsc#1088866).\n- scsi: lpfc: Correct target queue depth application changes (bsc#1088866).\n- scsi: lpfc: Driver NVME load fails when CPU cnt \u003e WQ resource cnt (bsc#1088866).\n- scsi: lpfc: Enhance log messages when reporting CQE errors (bsc#1088866).\n- scsi: lpfc: Enlarge nvmet asynchronous receive buffer counts (bsc#1088866).\n- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1093290).\n- scsi: lpfc: Fix Abort request WQ selection (bsc#1088866).\n- scsi: lpfc: Fix MDS diagnostics failure (Rx andlt; Tx) (bsc#1088866).\n- scsi: lpfc: Fix NULL pointer access in lpfc_nvme_info_show (bsc#1088866).\n- scsi: lpfc: Fix NULL pointer reference when resetting adapter (bsc#1088866).\n- scsi: lpfc: Fix crash in blk_mq layer when executing modprobe -r lpfc (bsc#1088866).\n- scsi: lpfc: Fix driver not recovering NVME rports during target link faults (bsc#1088866).\n- scsi: lpfc: Fix lingering lpfc_wq resource after driver unload (bsc#1088866).\n- scsi: lpfc: Fix multiple PRLI completion error path (bsc#1088866).\n- scsi: lpfc: Fix nvme remoteport registration race conditions (bsc#1088866).\n- scsi: lpfc: Fix port initialization failure (bsc#1093290).\n- scsi: lpfc: Fix up log messages and stats counters in IO submit code path (bsc#1088866).\n- scsi: lpfc: Handle new link fault code returned by adapter firmware (bsc#1088866).\n- scsi: lpfc: correct oversubscription of nvme io requests for an adapter (bsc#1088866).\n- scsi: lpfc: enhance LE data structure copies to hardware (bsc#1088866).\n- scsi: lpfc: fix spelling mistakes: \u0027mabilbox\u0027 and \u0027maibox\u0027 (bsc#1088866).\n- scsi: lpfc: update driver version to 12.0.0.2 (bsc#1088866).\n- scsi: lpfc: update driver version to 12.0.0.3 (bsc#1088866).\n- scsi: lpfc: update driver version to 12.0.0.4 (bsc#1088866).\n- scsi: qla2xxx: Add FC-NVMe abort processing (bsc#1084570).\n- scsi: qla2xxx: Add changes for devloss timeout in driver (bsc#1084570).\n- scsi: qla2xxx: Cleanup code to improve FC-NVMe error handling (bsc#1084570).\n- scsi: qla2xxx: Delete session for nport id change (bsc#1077338).\n- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan (bsc#1084570).\n- scsi: qla2xxx: Fix FC-NVMe IO abort during driver reset (bsc#1084570).\n- scsi: qla2xxx: Fix n2n_ae flag to prevent dev_loss on PDB change (bsc#1084570).\n- scsi: qla2xxx: Fix retry for PRLI RJT with reason of BUSY (bsc#1084570).\n- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure (bsc#1077338).\n- scsi: qla2xxx: Remove nvme_done_list (bsc#1084570).\n- scsi: qla2xxx: Remove unneeded message and minor cleanup for FC-NVMe (bsc#1084570).\n- scsi: qla2xxx: Restore ZIO threshold setting (bsc#1084570).\n- scsi: qla2xxx: Return busy if rport going away (bsc#1084570).\n- scsi: qla2xxx: Set IIDMA and fcport state before qla_nvme_register_remote() (bsc#1084570).\n- scsi: qla2xxx: Update driver version to 10.00.00.06-k (bsc#1084570).\n- scsi: raid_class: Add \u0027JBOD\u0027 RAID level (bsc#1093023).\n- scsi: sg: mitigate read/write abuse (bsc#1101296).\n- scsi: target: fix crash with iscsi target and dvd (bsc#1099918).\n- sctp: delay the authentication for the duplicated cookie-echo chunk (networking-stable-18_05_15).\n- sctp: do not check port in sctp_inet6_cmp_addr (networking-stable-18_04_26).\n- sctp: do not leak kernel memory to user space (networking-stable-18_04_10).\n- sctp: do not retransmit upon FragNeeded if PMTU discovery is disabled (networking-stable-18_01_12).\n- sctp: fix dst refcnt leak in sctp_v6_get_dst() (networking-stable-18_03_07).\n- sctp: fix the handling of ICMP Frag Needed for too small MTUs (networking-stable-18_01_12).\n- sctp: fix the issue that the cookie-ack with auth can\u0027t get processed (networking-stable-18_05_15).\n- sctp: full support for ipv6 ip_nonlocal_bind and IP_FREEBIND (networking-stable-17_11_14).\n- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (git-fixes).\n- sctp: potential read out of bounds in sctp_ulpevent_type_enabled() (networking-stable-17_10_09).\n- sctp: remove sctp_chunk_put from fail_mark err path in sctp_ulpevent_make_rcvmsg (networking-stable-18_05_15).\n- sctp: reset owner sk for data chunks on out queues when migrating a sock (networking-stable-17_11_14).\n- sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6 (networking-stable-18_04_10).\n- sctp: use right member as the param of list_for_each_entry (git-fixes).\n- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (networking-stable-18_05_15).\n- sdhci: Advertise 2.0v supply on SDIO host controller (bsc#1051510).\n- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bsc#1051510).\n- selinux: ensure the context is NUL terminated in security_context_to_sid_core() (bsc#1051510).\n- selinux: skip bounded transition processing if the policy isn\u0027t loaded (bsc#1051510).\n- serdev: fix memleak on module unload (bsc#1051510).\n- serdev: fix receive_buf return value when no callback (bsc#1051510).\n- serdev: fix registration of second slave (bsc#1051510).\n- serdev: ttyport: add missing open() error handling (bsc#1051510).\n- serdev: ttyport: add missing receive_buf sanity checks (bsc#1051510).\n- serdev: ttyport: enforce tty-driver open() requirement (bsc#1051510).\n- serdev: ttyport: fix NULL-deref on hangup (bsc#1051510).\n- serdev: ttyport: fix tty locking in close (bsc#1051510).\n- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bsc#1051510).\n- serial: 8250: omap: Fix idling of clocks for unused uarts (bsc#1051510).\n- serial: 8250_dw: Disable clock on error (bsc#1051510).\n- serial: 8250_fintek: Fix finding base_port with activated SuperIO (bsc#1051510).\n- serial: 8250_pci: Add Brainboxes UC-260 4 port serial device (bsc#1051510).\n- serial: altera: ensure port-\u003eregshift is honored consistently (bsc#1051510).\n- serial: arc_uart: Fix out-of-bounds access through DT alias (bsc#1051510).\n- serial: core: mark port as initialized in autoconfig (bsc#1051510).\n- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bsc#1051510).\n- serial: imx: Fix out-of-bounds access through serial port index (bsc#1051510).\n- serial: imx: Only wakeup via RTSDEN bit if the system has RTS/CTS (bsc#1051510).\n- serial: mxs-auart: Fix out-of-bounds access through serial port index (bsc#1051510).\n- serial: omap: Fix EFR write on RTS deassertion (bsc#1051510).\n- serial: samsung: Fix out-of-bounds access through serial port index (bsc#1051510).\n- serial: samsung: fix maxburst parameter for DMA transactions (bsc#1051510).\n- serial: sh-sci: Fix out-of-bounds access through DT alias (bsc#1051510).\n- serial: sh-sci: Stop using printk format %pCr (bsc#1051510).\n- serial: sh-sci: prevent lockup on full TTY buffers (bsc#1051510).\n- serial: xuartps: Fix out-of-bounds access through DT alias (bsc#1051510).\n- sget(): handle failures of register_shrinker() (bsc#1052766).\n- sh_eth: fix SH7757 GEther initialization (networking-stable-18_01_12).\n- sh_eth: fix TSU resource handling (networking-stable-18_01_12).\n- skbuff: Fix not waking applications when errors are enqueued (networking-stable-18_03_28).\n- sky2: Increase D3 delay to sky2 stops working after suspend (bsc#1051510).\n- slip: Check if rstate is initialized before uncompressing (networking-stable-18_04_13).\n- sock: free skb in skb_complete_tx_timestamp on error (networking-stable-17_12_31).\n- soreuseport: fix mem leak in reuseport_add_sock() (networking-stable-18_02_06).\n- spi: Fix scatterlist elements size in spi_map_buf (bsc#1051510).\n- spi: a3700: Fix clk prescaling for coefficient over 15 (bsc#1051510).\n- spi: a3700: Return correct value on timeout detection (bsc#1051510).\n- spi: armada-3700: Fix failing commands with quad-SPI (bsc#1051510).\n- spi: atmel: fixed spin_lock usage inside atmel_spi_remove (bsc#1051510).\n- spi: atmel: init FIFOs before spi enable (bsc#1051510).\n- spi: bcm-qspi: Fix use after free in bcm_qspi_probe() in error path (bsc#1051510).\n- spi: imx: do not access registers while clocks disabled (bsc#1051510).\n- spi: sh-msiof: Fix DMA transfer size check (bsc#1051510).\n- spi: spi-axi: fix potential use-after-free after deregistration (bsc#1051510).\n- spi: sun4i: disable clocks in the remove function (bsc#1051510).\n- spi: sun6i: disable/unprepare clocks on remove (bsc#1051510).\n- spi: xilinx: Detect stall with Unknown commands (bsc#1051510).\n- srcu: Provide ordering for CPU not involved in grace period (bsc#1052766).\n- staging: bcm2835-audio: Release resources on module_exit() (bsc#1051510).\n- staging: comedi: fix comedi_nsamples_left (bsc#1051510).\n- staging: comedi: ni_mio_common: ack ai fifo error interrupts (bsc#1051510).\n- staging: iio: ad5933: switch buffer mode to software (bsc#1051510).\n- staging: iio: ad7192: Fix - use the dedicated reset function avoiding dma from stack (bsc#1051510).\n- staging: iio: adc: ad7192: fix external frequency setting (bsc#1051510).\n- staging: rtl8192u: return -ENOMEM on failed allocation of priv-\u003eoldaddr (bsc#1051510).\n- staging: vchiq_2835_arm: Fix NULL ptr dereference in free_pagelist (bsc#1051510).\n- staging: wilc1000: Fix bssid buffer offset in Txq (bsc#1051510).\n- stm class: Fix a use-after-free (bsc#1051510).\n- stm class: Use vmalloc for the master map (bsc#1051510).\n- stmmac: reset last TSO segment size after device open (networking-stable-17_12_12).\n- strparser: Do not call mod_delayed_work with a timeout of LONG_MAX (networking-stable-18_04_26).\n- strparser: Fix incorrect strp-\u003eneed_bytes value (networking-stable-18_04_26).\n- strparser: Fix sign of err codes (networking-stable-18_04_10).\n- sunrpc: remove incorrect HMAC request initialization (bsc#1051510).\n- supported.conf: Remove external flag from iwlwifi modules (bsc#1093273)\n- supported.conf: fix folder of the driver module\n- swap: divide-by-zero when zero length swap file on ssd (bsc#1051510).\n- swiotlb: suppress warning when __GFP_NOWARN is set (bsc#1051510).\n- tap: reference to KVA of an unloaded module causes kernel panic (networking-stable-17_11_14).\n- target: transport should handle st FM/EOM/ILI reads (bsc#1081599).\n- tcp: do not read out-of-bounds opsize (networking-stable-18_04_26).\n- tcp: fix data delivery rate (networking-stable-17_10_09).\n- tcp: ignore Fast Open on repair mode (networking-stable-18_05_15).\n- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (networking-stable-18_04_26).\n- tcp: release sk_frag.page in tcp_disconnect (networking-stable-18_02_06).\n- tcp: revert F-RTO extension to detect more spurious timeouts (networking-stable-18_03_07).\n- tcp: revert F-RTO middle-box workaround (bsc#1076830).\n- tcp_bbr: fix to zero idle_restart only upon S/ACKed data (networking-stable-18_05_15).\n- tcp_bbr: record \u0027full bw reached\u0027 decision in new full_bw_reached bit (networking-stable-17_12_31).\n- tcp_bbr: reset full pipe detection on loss recovery undo (networking-stable-17_12_31).\n- tcp_bbr: reset long-term bandwidth sampling on loss recovery undo (networking-stable-17_12_31).\n- tcp_nv: fix division by zero in tcpnv_acked() (networking-stable-17_11_20).\n- team: Fix double free in error path (networking-stable-18_03_28).\n- team: avoid adding twice the same option to the event list (networking-stable-18_04_26).\n- team: fix netconsole setup over team (networking-stable-18_04_26).\n- team: move dev_mc_sync after master_upper_dev_link in team_port_add (networking-stable-18_04_10).\n- tee: check shm references are consistent in offset/size (bsc#1051510).\n- tee: shm: fix use-after-free via temporarily dropped reference (bsc#1051510).\n- test_firmware: fix missing unlock on error in config_num_requests_store() (bsc#1051510).\n- test_firmware: fix setting old custom fw path back on exit (bsc#1051510).\n- test_firmware: fix setting old custom fw path back on exit, second try (bsc#1051510).\n- tg3: APE heartbeat changes (bsc#1086286).\n- tg3: Add Macronix NVRAM support (bsc#1086286).\n- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bsc#1086286).\n- tg3: prevent scheduling while atomic splat (bsc#1086286).\n- thermal/drivers/step_wise: Fix temperature regulation misbehavior (bsc#1051510).\n- thermal: bcm2835: Stop using printk format %pCr (bsc#1051510).\n- thermal: enable broadcom menu for arm64 bcm2835 (bsc#1095573).\n- thermal: exynos: Propagate error value from tmu_read() (bsc#1051510).\n- thermal: exynos: Reading temperature makes sense only when TMU is turned on (bsc#1051510).\n- thermal: imx: Fix race condition in imx_thermal_probe() (bsc#1051510).\n- thermal: int3400_thermal: fix error handling in int3400_thermal_probe() (bsc#1051510).\n- thermal: int3403_thermal: Fix NULL pointer deref on module load / probe (bsc#1051510).\n- thermal: power_allocator: fix one race condition issue for thermal_instances list (bsc#1051510).\n- thunderbolt: Prevent crash when ICM firmware is not running (bsc#1090888).\n- thunderbolt: Resume control channel after hibernation image is created (bsc#1051510).\n- thunderbolt: Serialize PCIe tunnel creation with PCI rescan (bsc#1090888).\n- thunderbolt: Wait a bit longer for ICM to authenticate the active NVM (bsc#1090888).\n- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#1099918).\n- timers: Invoke timer_start_debug() where it makes sense (Git-fixes).\n- timers: Reinitialize per cpu bases on hotplug (Git-fixes).\n- timers: Unconditionally check deferrable base (Git-fixes).\n- timers: Use deferrable base independent of base::nohz_active (Git-fixes).\n- tipc: add policy for TIPC_NLA_NET_ADDR (networking-stable-18_04_26).\n- tipc: fix a memory leak in tipc_nl_node_get_link() (networking-stable-18_01_28).\n- tipc: fix hanging poll() for stream sockets (networking-stable-17_12_31).\n- tipc: fix memory leak in tipc_accept_from_sock() (networking-stable-17_12_12).\n- tools headers: Restore READ_ONCE() C++ compatibility (bsc#1093023).\n- tools/lib/subcmd/pager.c: do not alias select() params (Fix gcc 8 restrict error).\n- tracing/uprobe_event: Fix strncpy corner case (bsc#1099918).\n- tracing: Fix converting enum\u0027s from the map in trace_event_eval_update() (bsc#1099918).\n- tracing: Fix missing tab for hwlat_detector print format (bsc#1099918).\n- tracing: Kconfig text fixes for CONFIG_HWLAT_TRACER (bsc#1099918).\n- tracing: Make the snapshot trigger work with instances (bsc#1099918).\n- tracing: probeevent: Fix to support minus offset from symbol (bsc#1099918).\n- tty fix oops when rmmod 8250 (bsc#1051510).\n- tty/serial: atmel: add new version check for usart (bsc#1051510).\n- tty/serial: atmel: use port-\u003ename as name in request_irq() (bsc#1051510).\n- tty: Avoid possible error pointer dereference at tty_ldisc_restore() (bsc#1051510).\n- tty: Do not call panic() at tty_ldisc_init() (bsc#1051510).\n- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bsc#1051510).\n- tty: fix __tty_insert_flip_char regression (bsc#1051510).\n- tty: fix tty_ldisc_receive_buf() documentation (bsc#1051510).\n- tty: improve tty_insert_flip_char() fast path (bsc#1051510).\n- tty: improve tty_insert_flip_char() slow path (bsc#1051510).\n- tty: make n_tty_read() always abort if hangup is in progress (bsc#1051510).\n- tty: n_gsm: Allow ADM response in addition to UA for control dlci (bsc#1051510).\n- tty: n_gsm: Fix DLCI handling for ADM mode if debug and 2 is not set (bsc#1051510).\n- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bsc#1051510).\n- tty: pl011: Avoid spuriously stuck-off interrupts (bsc#1051510).\n- tty: vt: fix up tabstops properly (bsc#1051510).\n- tun/tap: sanitize TUNSETSNDBUF input (networking-stable-17_11_14).\n- tun: allow positive return values on dev_get_valid_name() call (networking-stable-17_11_14).\n- tun: bail out from tun_get_user() if the skb is empty (networking-stable-17_10_09).\n- tun: call dev_get_valid_name() before register_netdevice() (networking-stable-17_11_14).\n- ubi: Fix error for write access (bsc#1051510).\n- ubi: Fix race condition between ubi volume creation and udev (bsc#1051510).\n- ubi: Reject MLC NAND (bsc#1051510).\n- ubi: block: Fix locking for idr_alloc/idr_remove (bsc#1051510).\n- ubi: fastmap: Cancel work upon detach (bsc#1051510).\n- ubi: fastmap: Cancel work upon detach (bsc#1051510).\n- ubi: fastmap: Do not flush fastmap work on detach (bsc#1051510).\n- ubi: fastmap: Erase outdated anchor PEBs during attach (bsc#1051510).\n- ubifs: Check ubifs_wbuf_sync() return code (bsc#1052766).\n- ubifs: free the encrypted symlink target (bsc#1052766).\n- udf: Avoid overflow when session starts at large offset (bsc#1052766).\n- udf: Fix leak of UTF-16 surrogates into encoded strings (bsc#1052766).\n- usb: core: Add quirk for HP v222w 16GB Mini (bsc#1090888).\n- usb: quirks: add control message delay for 1b1c:1b20 (bsc#1087092).\n- usb: typec: ucsi: Fix for incorrect status data issue (bsc#1100132).\n- usb: typec: ucsi: Increase command completion timeout value (bsc#1090888).\n- usb: typec: ucsi: acpi: Workaround for cache mode issue (bsc#1100132).\n- usb: xhci: Disable slot even when virt-dev is null (bsc#1085539).\n- usb: xhci: Fix potential memory leak in xhci_disable_slot() (bsc#1085539).\n- usb: xhci: Make some static functions global ().\n- usbip: usbip_host: delete device from busid_table after rebind (bsc#1096480).\n- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bsc#1096480).\n- usbip: usbip_host: fix bad unlock balance during stub_probe() (bsc#1096480).\n- usbip: usbip_host: fix to hold parent lock for device_attach() calls (bsc#1096480).\n- usbip: usbip_host: run rebind from exit when module is removed (bsc#1096480).\n- usbip: vudc: fix null pointer dereference on udc-\u003elock (bsc#1087092).\n- userns: Do not fail follow_automount based on s_user_ns (bsc#1099918).\n- vfb: fix video mode and line_length being set when loaded (bsc#1100362).\n- vfio: Use get_user_pages_longterm correctly (bsc#1095337).\n- vfio: disable filesystem-dax page pinning (bsc#1095337).\n- vfio: platform: Fix reset module leak in error path (bsc#1099918).\n- vhost: Fix vhost_copy_to_user() (networking-stable-18_04_13).\n- vhost: correctly remove wait queue during poll failure (networking-stable-18_04_10).\n- vhost: fix vhost_vq_access_ok() log check (networking-stable-18_04_13).\n- vhost: validate log when IOTLB is enabled (networking-stable-18_04_10).\n- vhost_net: add missing lock nesting notation (networking-stable-18_04_10).\n- vhost_net: stop device during reset owner (networking-stable-18_02_06).\n- video/fbdev/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bsc#1090888 bsc#1099966).\n- video/hdmi: Allow \u0027empty\u0027 HDMI infoframes (bsc#1051510).\n- video: fbdev/mmp: add MODULE_LICENSE (bsc#1051510).\n- video: fbdev: atmel_lcdfb: fix display-timings lookup (bsc#1051510).\n- video: fbdev: aty: do not leak uninitialized padding in clk to userspace (bsc#1051510).\n- video: fbdev: au1200fb: Release some resources if a memory allocation fails (bsc#1051510).\n- video: fbdev: au1200fb: Return an error code if a memory allocation fails (bsc#1051510).\n- virtio-gpu: fix ioctl and expose the fixed status to userspace (bsc#1100382).\n- virtio: add ability to iterate over vqs (bsc#1051510).\n- virtio: release virtio index when fail to device_register (bsc#1051510).\n- virtio_console: do not tie bufs to a vq (bsc#1051510).\n- virtio_console: drop custom control queue cleanup (bsc#1051510).\n- virtio_console: free buffers after reset (bsc#1051510).\n- virtio_console: move removal code (bsc#1051510).\n- virtio_console: reset on out of memory (bsc#1051510).\n- virtio_net: fix adding vids on big-endian (networking-stable-18_04_26).\n- virtio_net: split out ctrl buffer (networking-stable-18_04_26).\n- virtio_ring: fix num_free handling in error case (bsc#1051510).\n- vlan: Fix reading memory beyond skb-\u003etail in skb_vlan_tagged_multi (networking-stable-18_04_26).\n- vlan: also check phy_driver ts_info for vlan\u0027s real device (networking-stable-18_04_10).\n- vlan: fix a use-after-free in vlan_device_event() (networking-stable-17_11_20).\n- vmw_balloon: fix inflation with batching (bsc#1051510).\n- vmw_balloon: fixing double free when batching mode is off (bsc#1051510).\n- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860).\n- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860).\n- vmxnet3: increase default rx ring sizes (bsc#1091860).\n- vmxnet3: repair memory leak (bsc#1051510).\n- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860).\n- vmxnet3: use DMA memory barriers where required (bsc#1091860).\n- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860).\n- vrf: Fix use after free and double free in vrf_finish_output (networking-stable-18_04_10).\n- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend (bsc#1051510).\n- vt: change SGR 21 to follow the standards (bsc#1051510).\n- vt: prevent leaking uninitialized data to userspace via /dev/vcs* (bsc#1051510).\n- vti6: Change minimum MTU to IPV4_MIN_MTU, vti6 can carry IPv4 too (bsc#1082869).\n- vti6: Fix dev-\u003emax_mtu setting (bsc#1082869).\n- vti6: Keep set MTU on link creation or change, validate it (bsc#1082869).\n- vti6: Properly adjust vti6 MTU from MTU of lower device (bsc#1082869).\n- vti6: better validate user provided tunnel names (networking-stable-18_04_10).\n- vti: fix use after free in vti_tunnel_xmit/vti6_tnl_xmit (bsc#1076830).\n- vxlan: fix the issue that neigh proxy blocks all icmpv6 packets (networking-stable-17_11_20).\n- w1: mxc_w1: Enable clock before calling clk_get_rate() on it (bsc#1051510).\n- wait: add wait_event_killable_timeout() (bsc#1099792).\n- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).\n- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).\n- watchdog: da9063: Fix updating timeout value (bsc#1100843).\n- watchdog: f71808e_wdt: Fix WD_EN register read (bsc#1051510).\n- watchdog: f71808e_wdt: Fix magic close handling (bsc#1051510).\n- watchdog: sp5100_tco: Fix watchdog disable bit (bsc#1051510).\n- wcn36xx: Fix dynamic power saving (bsc#1051510).\n- wcn36xx: Introduce mutual exclusion of fw configuration (bsc#1051510).\n- wl1251: check return from call to wl1251_acx_arp_ip_filter (bsc#1051510).\n- workqueue: Allow retrieval of current task\u0027s work struct (bsc#1051510).\n- workqueue: use put_device() instead of kfree() (bsc#1051510).\n- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158).\n- x86/cpu_entry_area: Map also trace_idt_table (bsc#1089878).\n- x86/intel_rdt: Add command line parameter to control L2_CDP ().\n- x86/intel_rdt: Add two new resources for L2 Code and Data Prioritization (CDP) ().\n- x86/intel_rdt: Enable L2 CDP in MSR IA32_L2_QOS_CFG ().\n- x86/intel_rdt: Enumerate L2 Code and Data Prioritization (CDP) feature ().\n- x86/mm: add a function to check if a pfn is UC/UC-/WC (bsc#1087213).\n- x86/pkeys: Add arch_pkeys_enabled() (bsc#1078248).\n- x86/pkeys: Move vma_pkey() into asm/pkeys.h (bsc#1078248).\n- x86/pti: do not report XenPV as vulnerable (bsc#1097551).\n- x86/setup: Do not reserve a crash kernel region if booted on Xen PV (bsc#1085626).\n- x86/stacktrace: Clarify the reliable success paths (bnc#1058115).\n- x86/stacktrace: Do not fail for ORC with regs on stack (bnc#1058115).\n- x86/stacktrace: Do not unwind after user regs (bnc#1058115).\n- x86/stacktrace: Enable HAVE_RELIABLE_STACKTRACE for the ORC unwinder (bnc#1058115).\n- x86/stacktrace: Remove STACKTRACE_DUMP_ONCE (bnc#1058115).\n- x86/tsc: Future-proof native_calibrate_tsc() (bsc#1074873).\n- x86/unwind/orc: Detect the end of the stack (bnc#1058115).\n- xen/acpi: off by one in read_acpi_id() (bnc#1065600).\n- xen/netfront: raise max number of slots in xennet_get_responses() (bnc#1076049).\n- xen: do not print error message in case of missing Xenstore entry (bnc#1065600).\n- xhci: Add port status decoder for tracing purposes ().\n- xhci: Fix USB ports for Dell Inspiron 5775 (bsc#1090888).\n- xhci: add definitions for all port link states ().\n- xhci: add port speed ID to portsc tracing ().\n- xhci: add port status tracing ().\n- xhci: fix endpoint context tracer output (bsc#1087092).\n- xhci: workaround for AMD Promontory disabled ports wakeup (bsc#1087092).\n- xhci: zero usb device slot_id member when disabling and freeing a xhci slot (bsc#1090888).\n- xprtrdma: Fix list corruption / DMAR errors during MR recovery (git-fixes).\n- xprtrdma: Return -ENOBUFS when no pages are available (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Basesystem-15-2018-1420,SUSE-SLE-Module-Development-Tools-15-2018-1420,SUSE-SLE-Module-Legacy-15-2018-1420,SUSE-SLE-Module-Live-Patching-15-2018-1420,SUSE-SLE-Product-HA-15-2018-1420,SUSE-SLE-Product-WE-15-2018-1420",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2092-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2092-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182092-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2092-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046303",
"url": "https://bugzilla.suse.com/1046303"
},
{
"category": "self",
"summary": "SUSE Bug 1046305",
"url": "https://bugzilla.suse.com/1046305"
},
{
"category": "self",
"summary": "SUSE Bug 1046306",
"url": "https://bugzilla.suse.com/1046306"
},
{
"category": "self",
"summary": "SUSE Bug 1046307",
"url": "https://bugzilla.suse.com/1046307"
},
{
"category": "self",
"summary": "SUSE Bug 1046540",
"url": "https://bugzilla.suse.com/1046540"
},
{
"category": "self",
"summary": "SUSE Bug 1046542",
"url": "https://bugzilla.suse.com/1046542"
},
{
"category": "self",
"summary": "SUSE Bug 1046543",
"url": "https://bugzilla.suse.com/1046543"
},
{
"category": "self",
"summary": "SUSE Bug 1048129",
"url": "https://bugzilla.suse.com/1048129"
},
{
"category": "self",
"summary": "SUSE Bug 1050242",
"url": "https://bugzilla.suse.com/1050242"
},
{
"category": "self",
"summary": "SUSE Bug 1050252",
"url": "https://bugzilla.suse.com/1050252"
},
{
"category": "self",
"summary": "SUSE Bug 1050529",
"url": "https://bugzilla.suse.com/1050529"
},
{
"category": "self",
"summary": "SUSE Bug 1050536",
"url": "https://bugzilla.suse.com/1050536"
},
{
"category": "self",
"summary": "SUSE Bug 1050538",
"url": "https://bugzilla.suse.com/1050538"
},
{
"category": "self",
"summary": "SUSE Bug 1050545",
"url": "https://bugzilla.suse.com/1050545"
},
{
"category": "self",
"summary": "SUSE Bug 1050549",
"url": "https://bugzilla.suse.com/1050549"
},
{
"category": "self",
"summary": "SUSE Bug 1050662",
"url": "https://bugzilla.suse.com/1050662"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1052766",
"url": "https://bugzilla.suse.com/1052766"
},
{
"category": "self",
"summary": "SUSE Bug 1055968",
"url": "https://bugzilla.suse.com/1055968"
},
{
"category": "self",
"summary": "SUSE Bug 1056427",
"url": "https://bugzilla.suse.com/1056427"
},
{
"category": "self",
"summary": "SUSE Bug 1056643",
"url": "https://bugzilla.suse.com/1056643"
},
{
"category": "self",
"summary": "SUSE Bug 1056651",
"url": "https://bugzilla.suse.com/1056651"
},
{
"category": "self",
"summary": "SUSE Bug 1056653",
"url": "https://bugzilla.suse.com/1056653"
},
{
"category": "self",
"summary": "SUSE Bug 1056657",
"url": "https://bugzilla.suse.com/1056657"
},
{
"category": "self",
"summary": "SUSE Bug 1056658",
"url": "https://bugzilla.suse.com/1056658"
},
{
"category": "self",
"summary": "SUSE Bug 1056662",
"url": "https://bugzilla.suse.com/1056662"
},
{
"category": "self",
"summary": "SUSE Bug 1056686",
"url": "https://bugzilla.suse.com/1056686"
},
{
"category": "self",
"summary": "SUSE Bug 1056787",
"url": "https://bugzilla.suse.com/1056787"
},
{
"category": "self",
"summary": "SUSE Bug 1058115",
"url": "https://bugzilla.suse.com/1058115"
},
{
"category": "self",
"summary": "SUSE Bug 1058513",
"url": "https://bugzilla.suse.com/1058513"
},
{
"category": "self",
"summary": "SUSE Bug 1058659",
"url": "https://bugzilla.suse.com/1058659"
},
{
"category": "self",
"summary": "SUSE Bug 1058717",
"url": "https://bugzilla.suse.com/1058717"
},
{
"category": "self",
"summary": "SUSE Bug 1060463",
"url": "https://bugzilla.suse.com/1060463"
},
{
"category": "self",
"summary": "SUSE Bug 1061024",
"url": "https://bugzilla.suse.com/1061024"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1062897",
"url": "https://bugzilla.suse.com/1062897"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1066110",
"url": "https://bugzilla.suse.com/1066110"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068054",
"url": "https://bugzilla.suse.com/1068054"
},
{
"category": "self",
"summary": "SUSE Bug 1071218",
"url": "https://bugzilla.suse.com/1071218"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1072829",
"url": "https://bugzilla.suse.com/1072829"
},
{
"category": "self",
"summary": "SUSE Bug 1072856",
"url": "https://bugzilla.suse.com/1072856"
},
{
"category": "self",
"summary": "SUSE Bug 1073513",
"url": "https://bugzilla.suse.com/1073513"
},
{
"category": "self",
"summary": "SUSE Bug 1073765",
"url": "https://bugzilla.suse.com/1073765"
},
{
"category": "self",
"summary": "SUSE Bug 1073960",
"url": "https://bugzilla.suse.com/1073960"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1074578",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "self",
"summary": "SUSE Bug 1074701",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "self",
"summary": "SUSE Bug 1074741",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "self",
"summary": "SUSE Bug 1074873",
"url": "https://bugzilla.suse.com/1074873"
},
{
"category": "self",
"summary": "SUSE Bug 1074919",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "self",
"summary": "SUSE Bug 1075006",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "self",
"summary": "SUSE Bug 1075007",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "self",
"summary": "SUSE Bug 1075262",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "self",
"summary": "SUSE Bug 1075419",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "self",
"summary": "SUSE Bug 1075748",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "self",
"summary": "SUSE Bug 1075876",
"url": "https://bugzilla.suse.com/1075876"
},
{
"category": "self",
"summary": "SUSE Bug 1076049",
"url": "https://bugzilla.suse.com/1076049"
},
{
"category": "self",
"summary": "SUSE Bug 1076115",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "self",
"summary": "SUSE Bug 1076372",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "self",
"summary": "SUSE Bug 1076830",
"url": "https://bugzilla.suse.com/1076830"
},
{
"category": "self",
"summary": "SUSE Bug 1077338",
"url": "https://bugzilla.suse.com/1077338"
},
{
"category": "self",
"summary": "SUSE Bug 1078248",
"url": "https://bugzilla.suse.com/1078248"
},
{
"category": "self",
"summary": "SUSE Bug 1078353",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "self",
"summary": "SUSE Bug 1079152",
"url": "https://bugzilla.suse.com/1079152"
},
{
"category": "self",
"summary": "SUSE Bug 1079747",
"url": "https://bugzilla.suse.com/1079747"
},
{
"category": "self",
"summary": "SUSE Bug 1080039",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "self",
"summary": "SUSE Bug 1080542",
"url": "https://bugzilla.suse.com/1080542"
},
{
"category": "self",
"summary": "SUSE Bug 1081599",
"url": "https://bugzilla.suse.com/1081599"
},
{
"category": "self",
"summary": "SUSE Bug 1082485",
"url": "https://bugzilla.suse.com/1082485"
},
{
"category": "self",
"summary": "SUSE Bug 1082504",
"url": "https://bugzilla.suse.com/1082504"
},
{
"category": "self",
"summary": "SUSE Bug 1082869",
"url": "https://bugzilla.suse.com/1082869"
},
{
"category": "self",
"summary": "SUSE Bug 1082962",
"url": "https://bugzilla.suse.com/1082962"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1083900",
"url": "https://bugzilla.suse.com/1083900"
},
{
"category": "self",
"summary": "SUSE Bug 1084001",
"url": "https://bugzilla.suse.com/1084001"
},
{
"category": "self",
"summary": "SUSE Bug 1084570",
"url": "https://bugzilla.suse.com/1084570"
},
{
"category": "self",
"summary": "SUSE Bug 1085308",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "self",
"summary": "SUSE Bug 1085539",
"url": "https://bugzilla.suse.com/1085539"
},
{
"category": "self",
"summary": "SUSE Bug 1085626",
"url": "https://bugzilla.suse.com/1085626"
},
{
"category": "self",
"summary": "SUSE Bug 1085933",
"url": "https://bugzilla.suse.com/1085933"
},
{
"category": "self",
"summary": "SUSE Bug 1085936",
"url": "https://bugzilla.suse.com/1085936"
},
{
"category": "self",
"summary": "SUSE Bug 1085937",
"url": "https://bugzilla.suse.com/1085937"
},
{
"category": "self",
"summary": "SUSE Bug 1085938",
"url": "https://bugzilla.suse.com/1085938"
},
{
"category": "self",
"summary": "SUSE Bug 1085939",
"url": "https://bugzilla.suse.com/1085939"
},
{
"category": "self",
"summary": "SUSE Bug 1085941",
"url": "https://bugzilla.suse.com/1085941"
},
{
"category": "self",
"summary": "SUSE Bug 1086282",
"url": "https://bugzilla.suse.com/1086282"
},
{
"category": "self",
"summary": "SUSE Bug 1086283",
"url": "https://bugzilla.suse.com/1086283"
},
{
"category": "self",
"summary": "SUSE Bug 1086286",
"url": "https://bugzilla.suse.com/1086286"
},
{
"category": "self",
"summary": "SUSE Bug 1086288",
"url": "https://bugzilla.suse.com/1086288"
},
{
"category": "self",
"summary": "SUSE Bug 1086319",
"url": "https://bugzilla.suse.com/1086319"
},
{
"category": "self",
"summary": "SUSE Bug 1086323",
"url": "https://bugzilla.suse.com/1086323"
},
{
"category": "self",
"summary": "SUSE Bug 1086400",
"url": "https://bugzilla.suse.com/1086400"
},
{
"category": "self",
"summary": "SUSE Bug 1086652",
"url": "https://bugzilla.suse.com/1086652"
},
{
"category": "self",
"summary": "SUSE Bug 1086739",
"url": "https://bugzilla.suse.com/1086739"
},
{
"category": "self",
"summary": "SUSE Bug 1087078",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087084",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1087205",
"url": "https://bugzilla.suse.com/1087205"
},
{
"category": "self",
"summary": "SUSE Bug 1087210",
"url": "https://bugzilla.suse.com/1087210"
},
{
"category": "self",
"summary": "SUSE Bug 1087213",
"url": "https://bugzilla.suse.com/1087213"
},
{
"category": "self",
"summary": "SUSE Bug 1087214",
"url": "https://bugzilla.suse.com/1087214"
},
{
"category": "self",
"summary": "SUSE Bug 1087284",
"url": "https://bugzilla.suse.com/1087284"
},
{
"category": "self",
"summary": "SUSE Bug 1087405",
"url": "https://bugzilla.suse.com/1087405"
},
{
"category": "self",
"summary": "SUSE Bug 1087458",
"url": "https://bugzilla.suse.com/1087458"
},
{
"category": "self",
"summary": "SUSE Bug 1087939",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "self",
"summary": "SUSE Bug 1087978",
"url": "https://bugzilla.suse.com/1087978"
},
{
"category": "self",
"summary": "SUSE Bug 1088354",
"url": "https://bugzilla.suse.com/1088354"
},
{
"category": "self",
"summary": "SUSE Bug 1088690",
"url": "https://bugzilla.suse.com/1088690"
},
{
"category": "self",
"summary": "SUSE Bug 1088704",
"url": "https://bugzilla.suse.com/1088704"
},
{
"category": "self",
"summary": "SUSE Bug 1088722",
"url": "https://bugzilla.suse.com/1088722"
},
{
"category": "self",
"summary": "SUSE Bug 1088796",
"url": "https://bugzilla.suse.com/1088796"
},
{
"category": "self",
"summary": "SUSE Bug 1088804",
"url": "https://bugzilla.suse.com/1088804"
},
{
"category": "self",
"summary": "SUSE Bug 1088821",
"url": "https://bugzilla.suse.com/1088821"
},
{
"category": "self",
"summary": "SUSE Bug 1088866",
"url": "https://bugzilla.suse.com/1088866"
},
{
"category": "self",
"summary": "SUSE Bug 1089115",
"url": "https://bugzilla.suse.com/1089115"
},
{
"category": "self",
"summary": "SUSE Bug 1089268",
"url": "https://bugzilla.suse.com/1089268"
},
{
"category": "self",
"summary": "SUSE Bug 1089467",
"url": "https://bugzilla.suse.com/1089467"
},
{
"category": "self",
"summary": "SUSE Bug 1089608",
"url": "https://bugzilla.suse.com/1089608"
},
{
"category": "self",
"summary": "SUSE Bug 1089663",
"url": "https://bugzilla.suse.com/1089663"
},
{
"category": "self",
"summary": "SUSE Bug 1089664",
"url": "https://bugzilla.suse.com/1089664"
},
{
"category": "self",
"summary": "SUSE Bug 1089667",
"url": "https://bugzilla.suse.com/1089667"
},
{
"category": "self",
"summary": "SUSE Bug 1089669",
"url": "https://bugzilla.suse.com/1089669"
},
{
"category": "self",
"summary": "SUSE Bug 1089752",
"url": "https://bugzilla.suse.com/1089752"
},
{
"category": "self",
"summary": "SUSE Bug 1089753",
"url": "https://bugzilla.suse.com/1089753"
},
{
"category": "self",
"summary": "SUSE Bug 1089878",
"url": "https://bugzilla.suse.com/1089878"
},
{
"category": "self",
"summary": "SUSE Bug 1090150",
"url": "https://bugzilla.suse.com/1090150"
},
{
"category": "self",
"summary": "SUSE Bug 1090457",
"url": "https://bugzilla.suse.com/1090457"
},
{
"category": "self",
"summary": "SUSE Bug 1090605",
"url": "https://bugzilla.suse.com/1090605"
},
{
"category": "self",
"summary": "SUSE Bug 1090643",
"url": "https://bugzilla.suse.com/1090643"
},
{
"category": "self",
"summary": "SUSE Bug 1090646",
"url": "https://bugzilla.suse.com/1090646"
},
{
"category": "self",
"summary": "SUSE Bug 1090658",
"url": "https://bugzilla.suse.com/1090658"
},
{
"category": "self",
"summary": "SUSE Bug 1090734",
"url": "https://bugzilla.suse.com/1090734"
},
{
"category": "self",
"summary": "SUSE Bug 1090888",
"url": "https://bugzilla.suse.com/1090888"
},
{
"category": "self",
"summary": "SUSE Bug 1090953",
"url": "https://bugzilla.suse.com/1090953"
},
{
"category": "self",
"summary": "SUSE Bug 1091158",
"url": "https://bugzilla.suse.com/1091158"
},
{
"category": "self",
"summary": "SUSE Bug 1091171",
"url": "https://bugzilla.suse.com/1091171"
},
{
"category": "self",
"summary": "SUSE Bug 1091424",
"url": "https://bugzilla.suse.com/1091424"
},
{
"category": "self",
"summary": "SUSE Bug 1091594",
"url": "https://bugzilla.suse.com/1091594"
},
{
"category": "self",
"summary": "SUSE Bug 1091666",
"url": "https://bugzilla.suse.com/1091666"
},
{
"category": "self",
"summary": "SUSE Bug 1091678",
"url": "https://bugzilla.suse.com/1091678"
},
{
"category": "self",
"summary": "SUSE Bug 1091686",
"url": "https://bugzilla.suse.com/1091686"
},
{
"category": "self",
"summary": "SUSE Bug 1091781",
"url": "https://bugzilla.suse.com/1091781"
},
{
"category": "self",
"summary": "SUSE Bug 1091782",
"url": "https://bugzilla.suse.com/1091782"
},
{
"category": "self",
"summary": "SUSE Bug 1091815",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "self",
"summary": "SUSE Bug 1091860",
"url": "https://bugzilla.suse.com/1091860"
},
{
"category": "self",
"summary": "SUSE Bug 1091960",
"url": "https://bugzilla.suse.com/1091960"
},
{
"category": "self",
"summary": "SUSE Bug 1092100",
"url": "https://bugzilla.suse.com/1092100"
},
{
"category": "self",
"summary": "SUSE Bug 1092472",
"url": "https://bugzilla.suse.com/1092472"
},
{
"category": "self",
"summary": "SUSE Bug 1092710",
"url": "https://bugzilla.suse.com/1092710"
},
{
"category": "self",
"summary": "SUSE Bug 1092772",
"url": "https://bugzilla.suse.com/1092772"
},
{
"category": "self",
"summary": "SUSE Bug 1092888",
"url": "https://bugzilla.suse.com/1092888"
},
{
"category": "self",
"summary": "SUSE Bug 1092904",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "self",
"summary": "SUSE Bug 1092975",
"url": "https://bugzilla.suse.com/1092975"
},
{
"category": "self",
"summary": "SUSE Bug 1093023",
"url": "https://bugzilla.suse.com/1093023"
},
{
"category": "self",
"summary": "SUSE Bug 1093027",
"url": "https://bugzilla.suse.com/1093027"
},
{
"category": "self",
"summary": "SUSE Bug 1093035",
"url": "https://bugzilla.suse.com/1093035"
},
{
"category": "self",
"summary": "SUSE Bug 1093118",
"url": "https://bugzilla.suse.com/1093118"
},
{
"category": "self",
"summary": "SUSE Bug 1093148",
"url": "https://bugzilla.suse.com/1093148"
},
{
"category": "self",
"summary": "SUSE Bug 1093158",
"url": "https://bugzilla.suse.com/1093158"
},
{
"category": "self",
"summary": "SUSE Bug 1093184",
"url": "https://bugzilla.suse.com/1093184"
},
{
"category": "self",
"summary": "SUSE Bug 1093205",
"url": "https://bugzilla.suse.com/1093205"
},
{
"category": "self",
"summary": "SUSE Bug 1093273",
"url": "https://bugzilla.suse.com/1093273"
},
{
"category": "self",
"summary": "SUSE Bug 1093290",
"url": "https://bugzilla.suse.com/1093290"
},
{
"category": "self",
"summary": "SUSE Bug 1093604",
"url": "https://bugzilla.suse.com/1093604"
},
{
"category": "self",
"summary": "SUSE Bug 1093641",
"url": "https://bugzilla.suse.com/1093641"
},
{
"category": "self",
"summary": "SUSE Bug 1093649",
"url": "https://bugzilla.suse.com/1093649"
},
{
"category": "self",
"summary": "SUSE Bug 1093653",
"url": "https://bugzilla.suse.com/1093653"
},
{
"category": "self",
"summary": "SUSE Bug 1093655",
"url": "https://bugzilla.suse.com/1093655"
},
{
"category": "self",
"summary": "SUSE Bug 1093657",
"url": "https://bugzilla.suse.com/1093657"
},
{
"category": "self",
"summary": "SUSE Bug 1093663",
"url": "https://bugzilla.suse.com/1093663"
},
{
"category": "self",
"summary": "SUSE Bug 1093721",
"url": "https://bugzilla.suse.com/1093721"
},
{
"category": "self",
"summary": "SUSE Bug 1093728",
"url": "https://bugzilla.suse.com/1093728"
},
{
"category": "self",
"summary": "SUSE Bug 1093904",
"url": "https://bugzilla.suse.com/1093904"
},
{
"category": "self",
"summary": "SUSE Bug 1093990",
"url": "https://bugzilla.suse.com/1093990"
},
{
"category": "self",
"summary": "SUSE Bug 1094244",
"url": "https://bugzilla.suse.com/1094244"
},
{
"category": "self",
"summary": "SUSE Bug 1094356",
"url": "https://bugzilla.suse.com/1094356"
},
{
"category": "self",
"summary": "SUSE Bug 1094420",
"url": "https://bugzilla.suse.com/1094420"
},
{
"category": "self",
"summary": "SUSE Bug 1094541",
"url": "https://bugzilla.suse.com/1094541"
},
{
"category": "self",
"summary": "SUSE Bug 1094575",
"url": "https://bugzilla.suse.com/1094575"
},
{
"category": "self",
"summary": "SUSE Bug 1094751",
"url": "https://bugzilla.suse.com/1094751"
},
{
"category": "self",
"summary": "SUSE Bug 1094825",
"url": "https://bugzilla.suse.com/1094825"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1094912",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "self",
"summary": "SUSE Bug 1094978",
"url": "https://bugzilla.suse.com/1094978"
},
{
"category": "self",
"summary": "SUSE Bug 1095042",
"url": "https://bugzilla.suse.com/1095042"
},
{
"category": "self",
"summary": "SUSE Bug 1095094",
"url": "https://bugzilla.suse.com/1095094"
},
{
"category": "self",
"summary": "SUSE Bug 1095115",
"url": "https://bugzilla.suse.com/1095115"
},
{
"category": "self",
"summary": "SUSE Bug 1095155",
"url": "https://bugzilla.suse.com/1095155"
},
{
"category": "self",
"summary": "SUSE Bug 1095265",
"url": "https://bugzilla.suse.com/1095265"
},
{
"category": "self",
"summary": "SUSE Bug 1095321",
"url": "https://bugzilla.suse.com/1095321"
},
{
"category": "self",
"summary": "SUSE Bug 1095337",
"url": "https://bugzilla.suse.com/1095337"
},
{
"category": "self",
"summary": "SUSE Bug 1095467",
"url": "https://bugzilla.suse.com/1095467"
},
{
"category": "self",
"summary": "SUSE Bug 1095573",
"url": "https://bugzilla.suse.com/1095573"
},
{
"category": "self",
"summary": "SUSE Bug 1095735",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "self",
"summary": "SUSE Bug 1095893",
"url": "https://bugzilla.suse.com/1095893"
},
{
"category": "self",
"summary": "SUSE Bug 1096065",
"url": "https://bugzilla.suse.com/1096065"
},
{
"category": "self",
"summary": "SUSE Bug 1096480",
"url": "https://bugzilla.suse.com/1096480"
},
{
"category": "self",
"summary": "SUSE Bug 1096529",
"url": "https://bugzilla.suse.com/1096529"
},
{
"category": "self",
"summary": "SUSE Bug 1096696",
"url": "https://bugzilla.suse.com/1096696"
},
{
"category": "self",
"summary": "SUSE Bug 1096705",
"url": "https://bugzilla.suse.com/1096705"
},
{
"category": "self",
"summary": "SUSE Bug 1096728",
"url": "https://bugzilla.suse.com/1096728"
},
{
"category": "self",
"summary": "SUSE Bug 1096753",
"url": "https://bugzilla.suse.com/1096753"
},
{
"category": "self",
"summary": "SUSE Bug 1096790",
"url": "https://bugzilla.suse.com/1096790"
},
{
"category": "self",
"summary": "SUSE Bug 1096793",
"url": "https://bugzilla.suse.com/1096793"
},
{
"category": "self",
"summary": "SUSE Bug 1097034",
"url": "https://bugzilla.suse.com/1097034"
},
{
"category": "self",
"summary": "SUSE Bug 1097105",
"url": "https://bugzilla.suse.com/1097105"
},
{
"category": "self",
"summary": "SUSE Bug 1097234",
"url": "https://bugzilla.suse.com/1097234"
},
{
"category": "self",
"summary": "SUSE Bug 1097356",
"url": "https://bugzilla.suse.com/1097356"
},
{
"category": "self",
"summary": "SUSE Bug 1097373",
"url": "https://bugzilla.suse.com/1097373"
},
{
"category": "self",
"summary": "SUSE Bug 1097439",
"url": "https://bugzilla.suse.com/1097439"
},
{
"category": "self",
"summary": "SUSE Bug 1097465",
"url": "https://bugzilla.suse.com/1097465"
},
{
"category": "self",
"summary": "SUSE Bug 1097468",
"url": "https://bugzilla.suse.com/1097468"
},
{
"category": "self",
"summary": "SUSE Bug 1097470",
"url": "https://bugzilla.suse.com/1097470"
},
{
"category": "self",
"summary": "SUSE Bug 1097471",
"url": "https://bugzilla.suse.com/1097471"
},
{
"category": "self",
"summary": "SUSE Bug 1097472",
"url": "https://bugzilla.suse.com/1097472"
},
{
"category": "self",
"summary": "SUSE Bug 1097551",
"url": "https://bugzilla.suse.com/1097551"
},
{
"category": "self",
"summary": "SUSE Bug 1097780",
"url": "https://bugzilla.suse.com/1097780"
},
{
"category": "self",
"summary": "SUSE Bug 1097796",
"url": "https://bugzilla.suse.com/1097796"
},
{
"category": "self",
"summary": "SUSE Bug 1097800",
"url": "https://bugzilla.suse.com/1097800"
},
{
"category": "self",
"summary": "SUSE Bug 1097941",
"url": "https://bugzilla.suse.com/1097941"
},
{
"category": "self",
"summary": "SUSE Bug 1097961",
"url": "https://bugzilla.suse.com/1097961"
},
{
"category": "self",
"summary": "SUSE Bug 1098016",
"url": "https://bugzilla.suse.com/1098016"
},
{
"category": "self",
"summary": "SUSE Bug 1098043",
"url": "https://bugzilla.suse.com/1098043"
},
{
"category": "self",
"summary": "SUSE Bug 1098050",
"url": "https://bugzilla.suse.com/1098050"
},
{
"category": "self",
"summary": "SUSE Bug 1098174",
"url": "https://bugzilla.suse.com/1098174"
},
{
"category": "self",
"summary": "SUSE Bug 1098176",
"url": "https://bugzilla.suse.com/1098176"
},
{
"category": "self",
"summary": "SUSE Bug 1098236",
"url": "https://bugzilla.suse.com/1098236"
},
{
"category": "self",
"summary": "SUSE Bug 1098401",
"url": "https://bugzilla.suse.com/1098401"
},
{
"category": "self",
"summary": "SUSE Bug 1098425",
"url": "https://bugzilla.suse.com/1098425"
},
{
"category": "self",
"summary": "SUSE Bug 1098435",
"url": "https://bugzilla.suse.com/1098435"
},
{
"category": "self",
"summary": "SUSE Bug 1098599",
"url": "https://bugzilla.suse.com/1098599"
},
{
"category": "self",
"summary": "SUSE Bug 1098626",
"url": "https://bugzilla.suse.com/1098626"
},
{
"category": "self",
"summary": "SUSE Bug 1098706",
"url": "https://bugzilla.suse.com/1098706"
},
{
"category": "self",
"summary": "SUSE Bug 1098983",
"url": "https://bugzilla.suse.com/1098983"
},
{
"category": "self",
"summary": "SUSE Bug 1098995",
"url": "https://bugzilla.suse.com/1098995"
},
{
"category": "self",
"summary": "SUSE Bug 1099029",
"url": "https://bugzilla.suse.com/1099029"
},
{
"category": "self",
"summary": "SUSE Bug 1099041",
"url": "https://bugzilla.suse.com/1099041"
},
{
"category": "self",
"summary": "SUSE Bug 1099109",
"url": "https://bugzilla.suse.com/1099109"
},
{
"category": "self",
"summary": "SUSE Bug 1099142",
"url": "https://bugzilla.suse.com/1099142"
},
{
"category": "self",
"summary": "SUSE Bug 1099183",
"url": "https://bugzilla.suse.com/1099183"
},
{
"category": "self",
"summary": "SUSE Bug 1099715",
"url": "https://bugzilla.suse.com/1099715"
},
{
"category": "self",
"summary": "SUSE Bug 1099792",
"url": "https://bugzilla.suse.com/1099792"
},
{
"category": "self",
"summary": "SUSE Bug 1099918",
"url": "https://bugzilla.suse.com/1099918"
},
{
"category": "self",
"summary": "SUSE Bug 1099924",
"url": "https://bugzilla.suse.com/1099924"
},
{
"category": "self",
"summary": "SUSE Bug 1099966",
"url": "https://bugzilla.suse.com/1099966"
},
{
"category": "self",
"summary": "SUSE Bug 1100132",
"url": "https://bugzilla.suse.com/1100132"
},
{
"category": "self",
"summary": "SUSE Bug 1100209",
"url": "https://bugzilla.suse.com/1100209"
},
{
"category": "self",
"summary": "SUSE Bug 1100340",
"url": "https://bugzilla.suse.com/1100340"
},
{
"category": "self",
"summary": "SUSE Bug 1100362",
"url": "https://bugzilla.suse.com/1100362"
},
{
"category": "self",
"summary": "SUSE Bug 1100382",
"url": "https://bugzilla.suse.com/1100382"
},
{
"category": "self",
"summary": "SUSE Bug 1100394",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "self",
"summary": "SUSE Bug 1100416",
"url": "https://bugzilla.suse.com/1100416"
},
{
"category": "self",
"summary": "SUSE Bug 1100418",
"url": "https://bugzilla.suse.com/1100418"
},
{
"category": "self",
"summary": "SUSE Bug 1100491",
"url": "https://bugzilla.suse.com/1100491"
},
{
"category": "self",
"summary": "SUSE Bug 1100602",
"url": "https://bugzilla.suse.com/1100602"
},
{
"category": "self",
"summary": "SUSE Bug 1100633",
"url": "https://bugzilla.suse.com/1100633"
},
{
"category": "self",
"summary": "SUSE Bug 1100843",
"url": "https://bugzilla.suse.com/1100843"
},
{
"category": "self",
"summary": "SUSE Bug 1101296",
"url": "https://bugzilla.suse.com/1101296"
},
{
"category": "self",
"summary": "SUSE Bug 1101315",
"url": "https://bugzilla.suse.com/1101315"
},
{
"category": "self",
"summary": "SUSE Bug 1101324",
"url": "https://bugzilla.suse.com/1101324"
},
{
"category": "self",
"summary": "SUSE Bug 971975",
"url": "https://bugzilla.suse.com/971975"
},
{
"category": "self",
"summary": "SUSE Bug 975772",
"url": "https://bugzilla.suse.com/975772"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000200 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000204 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10087 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10124 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1092 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1092/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1093 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1094 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1118 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1120 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1130 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12233 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13053 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13405 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13406 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13406/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5803 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5848 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7492 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8781 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-9385 page",
"url": "https://www.suse.com/security/cve/CVE-2018-9385/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-07-27T13:37:02Z",
"generator": {
"date": "2018-07-27T13:37:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2092-1",
"initial_release_date": "2018-07-27T13:37:02Z",
"revision_history": [
{
"date": "2018-07-27T13:37:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.12.14-25.3.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-25.3.1.aarch64",
"product_id": "kernel-default-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-25.3.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-25.3.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-25.3.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-25.3.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-25.3.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-25.3.1.aarch64",
"product_id": "kernel-syms-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-25.3.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-25.3.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-25.3.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-25.3.1.noarch",
"product_id": "kernel-devel-4.12.14-25.3.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-25.3.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-25.3.1.noarch",
"product_id": "kernel-macros-4.12.14-25.3.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-25.3.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-25.3.1.noarch",
"product_id": "kernel-docs-4.12.14-25.3.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-25.3.1.noarch",
"product": {
"name": "kernel-source-4.12.14-25.3.1.noarch",
"product_id": "kernel-source-4.12.14-25.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.12.14-25.3.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-25.3.1.ppc64le",
"product_id": "kernel-default-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-25.3.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-25.3.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-25.3.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-25.3.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-25.3.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-25.3.1.ppc64le",
"product_id": "kernel-syms-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.12.14-25.3.1.s390x",
"product": {
"name": "kernel-default-4.12.14-25.3.1.s390x",
"product_id": "kernel-default-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-25.3.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-25.3.1.s390x",
"product_id": "kernel-default-devel-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-25.3.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-25.3.1.s390x",
"product_id": "kernel-default-man-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-25.3.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-25.3.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-25.3.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-25.3.1.s390x",
"product_id": "kernel-obs-build-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-25.3.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-25.3.1.s390x",
"product_id": "kernel-syms-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-25.3.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-25.3.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-25.3.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-25.3.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-25.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.12.14-25.3.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-25.3.1.x86_64",
"product_id": "kernel-default-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-25.3.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-25.3.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-25.3.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-25.3.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-25.3.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-25.3.1.x86_64",
"product_id": "kernel-syms-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-25.3.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-25.3.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-25.3.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-25.3.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-25.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x"
},
"product_reference": "kernel-default-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-25.3.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-25.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-25.3.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-25.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x"
},
"product_reference": "kernel-zfcpdump-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-25.3.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-25.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-25.3.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch"
},
"product_reference": "kernel-source-4.12.14-25.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2018-1000200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000200"
}
],
"notes": [
{
"category": "general",
"text": "The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer dereference which can result in an out of memory (OOM) killing of large mlocked processes. The issue arises from an oom killed process\u0027s final thread calling exit_mmap(), which calls munlock_vma_pages_all() for mlocked vmas.This can happen synchronously with the oom reaper\u0027s unmap_page_range() since the vma\u0027s VM_LOCKED bit is cleared before munlocking (to determine if any other vmas share the memory and are mlocked).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000200",
"url": "https://www.suse.com/security/cve/CVE-2018-1000200"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1000200",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090150 for CVE-2018-1000200",
"url": "https://bugzilla.suse.com/1090150"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000200"
},
{
"cve": "CVE-2018-1000204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000204"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don\u0027t usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000204",
"url": "https://www.suse.com/security/cve/CVE-2018-1000204"
},
{
"category": "external",
"summary": "SUSE Bug 1096728 for CVE-2018-1000204",
"url": "https://bugzilla.suse.com/1096728"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-1000204",
"url": "https://bugzilla.suse.com/1105412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000204"
},
{
"cve": "CVE-2018-10087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10087"
}
],
"notes": [
{
"category": "general",
"text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10087",
"url": "https://www.suse.com/security/cve/CVE-2018-10087"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10087",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1089608 for CVE-2018-10087",
"url": "https://bugzilla.suse.com/1089608"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-10087",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "low"
}
],
"title": "CVE-2018-10087"
},
{
"cve": "CVE-2018-10124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10124"
}
],
"notes": [
{
"category": "general",
"text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10124",
"url": "https://www.suse.com/security/cve/CVE-2018-10124"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10124",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1089752 for CVE-2018-10124",
"url": "https://bugzilla.suse.com/1089752"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-10124",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-10124"
},
{
"cve": "CVE-2018-1092",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1092"
}
],
"notes": [
{
"category": "general",
"text": "The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1092",
"url": "https://www.suse.com/security/cve/CVE-2018-1092"
},
{
"category": "external",
"summary": "SUSE Bug 1087012 for CVE-2018-1092",
"url": "https://bugzilla.suse.com/1087012"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1092",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-1092"
},
{
"cve": "CVE-2018-1093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1093"
}
],
"notes": [
{
"category": "general",
"text": "The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1093",
"url": "https://www.suse.com/security/cve/CVE-2018-1093"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1093",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1087095 for CVE-2018-1093",
"url": "https://bugzilla.suse.com/1087095"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-1093"
},
{
"cve": "CVE-2018-1094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1094"
}
],
"notes": [
{
"category": "general",
"text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1094",
"url": "https://www.suse.com/security/cve/CVE-2018-1094"
},
{
"category": "external",
"summary": "SUSE Bug 1087007 for CVE-2018-1094",
"url": "https://bugzilla.suse.com/1087007"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1094",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-1094"
},
{
"cve": "CVE-2018-1118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1118"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1118",
"url": "https://www.suse.com/security/cve/CVE-2018-1118"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092472 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1092472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-1118"
},
{
"cve": "CVE-2018-1120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1120"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process\u0027s memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/\u003cpid\u003e/cmdline (or /proc/\u003cpid\u003e/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1120",
"url": "https://www.suse.com/security/cve/CVE-2018-1120"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1120",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092100 for CVE-2018-1120",
"url": "https://bugzilla.suse.com/1092100"
},
{
"category": "external",
"summary": "SUSE Bug 1093158 for CVE-2018-1120",
"url": "https://bugzilla.suse.com/1093158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "low"
}
],
"title": "CVE-2018-1120"
},
{
"cve": "CVE-2018-1130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1130"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1130",
"url": "https://www.suse.com/security/cve/CVE-2018-1130"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2018-1130",
"url": "https://bugzilla.suse.com/1092904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-1130"
},
{
"cve": "CVE-2018-12233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12233"
}
],
"notes": [
{
"category": "general",
"text": "In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12233",
"url": "https://www.suse.com/security/cve/CVE-2018-12233"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-12233",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1097234 for CVE-2018-12233",
"url": "https://bugzilla.suse.com/1097234"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-12233",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-12233"
},
{
"cve": "CVE-2018-13053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13053"
}
],
"notes": [
{
"category": "general",
"text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13053",
"url": "https://www.suse.com/security/cve/CVE-2018-13053"
},
{
"category": "external",
"summary": "SUSE Bug 1099924 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1099924"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "low"
}
],
"title": "CVE-2018-13053"
},
{
"cve": "CVE-2018-13405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13405"
}
],
"notes": [
{
"category": "general",
"text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13405",
"url": "https://www.suse.com/security/cve/CVE-2018-13405"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1100416 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1100416"
},
{
"category": "external",
"summary": "SUSE Bug 1129735 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1129735"
},
{
"category": "external",
"summary": "SUSE Bug 1195161 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1195161"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-13405"
},
{
"cve": "CVE-2018-13406",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13406"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13406",
"url": "https://www.suse.com/security/cve/CVE-2018-13406"
},
{
"category": "external",
"summary": "SUSE Bug 1098016 for CVE-2018-13406",
"url": "https://bugzilla.suse.com/1098016"
},
{
"category": "external",
"summary": "SUSE Bug 1100418 for CVE-2018-13406",
"url": "https://bugzilla.suse.com/1100418"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-13406",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-13406"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-5803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5803"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5803",
"url": "https://www.suse.com/security/cve/CVE-2018-5803"
},
{
"category": "external",
"summary": "SUSE Bug 1083900 for CVE-2018-5803",
"url": "https://bugzilla.suse.com/1083900"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-5803",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5803",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-5803"
},
{
"cve": "CVE-2018-5848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5848"
}
],
"notes": [
{
"category": "general",
"text": "In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the \u0027ie_len\u0027 argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5848",
"url": "https://www.suse.com/security/cve/CVE-2018-5848"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-5848",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1097356 for CVE-2018-5848",
"url": "https://bugzilla.suse.com/1097356"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-5848",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1115339 for CVE-2018-5848",
"url": "https://bugzilla.suse.com/1115339"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-5848"
},
{
"cve": "CVE-2018-7492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7492"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7492",
"url": "https://www.suse.com/security/cve/CVE-2018-7492"
},
{
"category": "external",
"summary": "SUSE Bug 1082962 for CVE-2018-7492",
"url": "https://bugzilla.suse.com/1082962"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-7492"
},
{
"cve": "CVE-2018-8781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8781"
}
],
"notes": [
{
"category": "general",
"text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8781",
"url": "https://www.suse.com/security/cve/CVE-2018-8781"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-8781",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090643 for CVE-2018-8781",
"url": "https://bugzilla.suse.com/1090643"
},
{
"category": "external",
"summary": "SUSE Bug 1090646 for CVE-2018-8781",
"url": "https://bugzilla.suse.com/1090646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "important"
}
],
"title": "CVE-2018-8781"
},
{
"cve": "CVE-2018-9385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-9385"
}
],
"notes": [
{
"category": "general",
"text": "In driver_override_store of bus.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74128061 References: Upstream kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-9385",
"url": "https://www.suse.com/security/cve/CVE-2018-9385"
},
{
"category": "external",
"summary": "SUSE Bug 1100491 for CVE-2018-9385",
"url": "https://bugzilla.suse.com/1100491"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-9385"
}
]
}
SUSE-SU-2018:0660-1
Vulnerability from csaf_suse - Published: 2018-03-12 06:47 - Updated: 2018-03-12 06:47Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).\n\n The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).\n- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).\n- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).\n- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-\u003eexists value can change after it is validated (bnc#1077922).\n- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).\n- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream kernel skcipher. (bnc#1075908).\n- CVE-2018-1000004: In the Linux kernel a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).\n\nThe following non-security bugs were fixed:\n\n- cdc-acm: apply quirk for card reader (bsc#1060279).\n- Enable CPU vulnerabilities reporting via sysfs\n- fork: clear thread stack upon allocation (bsc#1077560).\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076278).\n- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).\n- Move kABI fixup for retpolines to proper place.\n- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).\n- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).\n- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).\n- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).\n- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).\n- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).\n- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).\n- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).\n- x86/kaiser: use trampoline stack for kernel entry.\n- x86/microcode/intel: Disable late loading on model 79 (bsc#1054305).\n- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).\n- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).\n- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-kernel-20180212-13505,slessp3-kernel-20180212-13505,slexsp3-kernel-20180212-13505",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0660-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0660-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180660-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0660-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003803.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1054305",
"url": "https://bugzilla.suse.com/1054305"
},
{
"category": "self",
"summary": "SUSE Bug 1060279",
"url": "https://bugzilla.suse.com/1060279"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068984",
"url": "https://bugzilla.suse.com/1068984"
},
{
"category": "self",
"summary": "SUSE Bug 1070781",
"url": "https://bugzilla.suse.com/1070781"
},
{
"category": "self",
"summary": "SUSE Bug 1073311",
"url": "https://bugzilla.suse.com/1073311"
},
{
"category": "self",
"summary": "SUSE Bug 1074488",
"url": "https://bugzilla.suse.com/1074488"
},
{
"category": "self",
"summary": "SUSE Bug 1074621",
"url": "https://bugzilla.suse.com/1074621"
},
{
"category": "self",
"summary": "SUSE Bug 1075091",
"url": "https://bugzilla.suse.com/1075091"
},
{
"category": "self",
"summary": "SUSE Bug 1075410",
"url": "https://bugzilla.suse.com/1075410"
},
{
"category": "self",
"summary": "SUSE Bug 1075617",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "self",
"summary": "SUSE Bug 1075621",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "self",
"summary": "SUSE Bug 1075908",
"url": "https://bugzilla.suse.com/1075908"
},
{
"category": "self",
"summary": "SUSE Bug 1075994",
"url": "https://bugzilla.suse.com/1075994"
},
{
"category": "self",
"summary": "SUSE Bug 1076017",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "self",
"summary": "SUSE Bug 1076154",
"url": "https://bugzilla.suse.com/1076154"
},
{
"category": "self",
"summary": "SUSE Bug 1076278",
"url": "https://bugzilla.suse.com/1076278"
},
{
"category": "self",
"summary": "SUSE Bug 1076849",
"url": "https://bugzilla.suse.com/1076849"
},
{
"category": "self",
"summary": "SUSE Bug 1077406",
"url": "https://bugzilla.suse.com/1077406"
},
{
"category": "self",
"summary": "SUSE Bug 1077560",
"url": "https://bugzilla.suse.com/1077560"
},
{
"category": "self",
"summary": "SUSE Bug 1077922",
"url": "https://bugzilla.suse.com/1077922"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13215 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17741 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18017 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18079 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5332 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5333 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5333/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-03-12T06:47:24Z",
"generator": {
"date": "2018-03-12T06:47:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0660-1",
"initial_release_date": "2018-03-12T06:47:24Z",
"revision_history": [
{
"date": "2018-03-12T06:47:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-default-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-default-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-default-base-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-default-devel-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-ec2-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-ec2-base-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-pae-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-pae-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-pae-base-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-pae-devel-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-source-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-source-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-syms-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-syms-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-trace-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-trace-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-trace-base-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-trace-devel-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-xen-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-xen-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-xen-base-3.0.101-0.47.106.19.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"product_id": "kernel-xen-devel-3.0.101-0.47.106.19.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.106.19.1.s390x",
"product": {
"name": "kernel-default-3.0.101-0.47.106.19.1.s390x",
"product_id": "kernel-default-3.0.101-0.47.106.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"product_id": "kernel-default-base-3.0.101-0.47.106.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"product_id": "kernel-default-devel-3.0.101-0.47.106.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"product_id": "kernel-default-man-3.0.101-0.47.106.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.106.19.1.s390x",
"product": {
"name": "kernel-source-3.0.101-0.47.106.19.1.s390x",
"product_id": "kernel-source-3.0.101-0.47.106.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.106.19.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-0.47.106.19.1.s390x",
"product_id": "kernel-syms-3.0.101-0.47.106.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.106.19.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-0.47.106.19.1.s390x",
"product_id": "kernel-trace-3.0.101-0.47.106.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"product_id": "kernel-trace-base-3.0.101-0.47.106.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-0.47.106.19.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-default-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-default-base-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-ec2-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-source-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-syms-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-trace-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-xen-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-0.47.106.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-default-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-pae-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-source-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-xen-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-default-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x"
},
"product_reference": "kernel-default-3.0.101-0.47.106.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-pae-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-source-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x"
},
"product_reference": "kernel-source-3.0.101-0.47.106.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-xen-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13215"
}
],
"notes": [
{
"category": "general",
"text": "A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13215",
"url": "https://www.suse.com/security/cve/CVE-2017-13215"
},
{
"category": "external",
"summary": "SUSE Bug 1075908 for CVE-2017-13215",
"url": "https://bugzilla.suse.com/1075908"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-13215",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-12T06:47:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-13215"
},
{
"cve": "CVE-2017-17741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17741"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17741",
"url": "https://www.suse.com/security/cve/CVE-2017-17741"
},
{
"category": "external",
"summary": "SUSE Bug 1073311 for CVE-2017-17741",
"url": "https://bugzilla.suse.com/1073311"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-17741",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-12T06:47:24Z",
"details": "important"
}
],
"title": "CVE-2017-17741"
},
{
"cve": "CVE-2017-18017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18017"
}
],
"notes": [
{
"category": "general",
"text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18017",
"url": "https://www.suse.com/security/cve/CVE-2017-18017"
},
{
"category": "external",
"summary": "SUSE Bug 1074488 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1074488"
},
{
"category": "external",
"summary": "SUSE Bug 1080255 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1080255"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 971126 for CVE-2017-18017",
"url": "https://bugzilla.suse.com/971126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-12T06:47:24Z",
"details": "important"
}
],
"title": "CVE-2017-18017"
},
{
"cve": "CVE-2017-18079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18079"
}
],
"notes": [
{
"category": "general",
"text": "drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-\u003eexists value can change after it is validated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18079",
"url": "https://www.suse.com/security/cve/CVE-2017-18079"
},
{
"category": "external",
"summary": "SUSE Bug 1077922 for CVE-2017-18079",
"url": "https://bugzilla.suse.com/1077922"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18079",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-12T06:47:24Z",
"details": "low"
}
],
"title": "CVE-2017-18079"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-12T06:47:24Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-12T06:47:24Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-5332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5332"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5332",
"url": "https://www.suse.com/security/cve/CVE-2018-5332"
},
{
"category": "external",
"summary": "SUSE Bug 1075621 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-12T06:47:24Z",
"details": "low"
}
],
"title": "CVE-2018-5332"
},
{
"cve": "CVE-2018-5333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5333"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5333",
"url": "https://www.suse.com/security/cve/CVE-2018-5333"
},
{
"category": "external",
"summary": "SUSE Bug 1075617 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-12T06:47:24Z",
"details": "low"
}
],
"title": "CVE-2018-5333"
}
]
}
SUSE-SU-2019:13999-1
Vulnerability from csaf_suse - Published: 2019-03-29 15:35 - Updated: 2019-03-29 15:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for various KMPs",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update rebuilds missing kernel modules (KMP) to use \u0027retpolines\u0027\nmitigations for Spectre Variant 2 (CVE-2017-5715).\n\nRebuilt KMP packages:\n\n- cluster-network\n- drbd\n- gfs2\n- iscsitarget\n- ocfs2\n- ofed\n- oracleasm\n\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-kmps-retpoline-20190320-13999,slehasp4-kmps-retpoline-20190320-13999,slertesp4-kmps-retpoline-20190320-13999,slessp4-kmps-retpoline-20190320-13999",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_13999-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:13999-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201913999-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:13999-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005270.html"
},
{
"category": "self",
"summary": "SUSE Bug 1095824",
"url": "https://bugzilla.suse.com/1095824"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for various KMPs",
"tracking": {
"current_release_date": "2019-03-29T15:35:17Z",
"generator": {
"date": "2019-03-29T15:35:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:13999-1",
"initial_release_date": "2019-03-29T15:35:17Z",
"revision_history": [
{
"date": "2019-03-29T15:35:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ofed-devel-1.5.4.1-22.6.1.i586",
"product": {
"name": "ofed-devel-1.5.4.1-22.6.1.i586",
"product_id": "ofed-devel-1.5.4.1-22.6.1.i586"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.i586",
"product": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.i586",
"product_id": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.i586"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-pae-1.4_3.0.101_108.87-2.32.6.1.i586",
"product": {
"name": "cluster-network-kmp-pae-1.4_3.0.101_108.87-2.32.6.1.i586",
"product_id": "cluster-network-kmp-pae-1.4_3.0.101_108.87-2.32.6.1.i586"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.i586",
"product": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.i586",
"product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.i586"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.i586",
"product": {
"name": "cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.i586",
"product_id": "cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.i586"
}
},
{
"category": "product_version",
"name": "drbd-8.4.4-0.27.6.1.i586",
"product": {
"name": "drbd-8.4.4-0.27.6.1.i586",
"product_id": "drbd-8.4.4-0.27.6.1.i586"
}
},
{
"category": "product_version",
"name": "drbd-bash-completion-8.4.4-0.27.6.1.i586",
"product": {
"name": "drbd-bash-completion-8.4.4-0.27.6.1.i586",
"product_id": "drbd-bash-completion-8.4.4-0.27.6.1.i586"
}
},
{
"category": "product_version",
"name": "drbd-heartbeat-8.4.4-0.27.6.1.i586",
"product": {
"name": "drbd-heartbeat-8.4.4-0.27.6.1.i586",
"product_id": "drbd-heartbeat-8.4.4-0.27.6.1.i586"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"product": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"product_id": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.i586"
}
},
{
"category": "product_version",
"name": "drbd-kmp-pae-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"product": {
"name": "drbd-kmp-pae-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"product_id": "drbd-kmp-pae-8.4.4_3.0.101_108.87-0.27.6.1.i586"
}
},
{
"category": "product_version",
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"product": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.i586"
}
},
{
"category": "product_version",
"name": "drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"product": {
"name": "drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"product_id": "drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.i586"
}
},
{
"category": "product_version",
"name": "drbd-pacemaker-8.4.4-0.27.6.1.i586",
"product": {
"name": "drbd-pacemaker-8.4.4-0.27.6.1.i586",
"product_id": "drbd-pacemaker-8.4.4-0.27.6.1.i586"
}
},
{
"category": "product_version",
"name": "drbd-udev-8.4.4-0.27.6.1.i586",
"product": {
"name": "drbd-udev-8.4.4-0.27.6.1.i586",
"product_id": "drbd-udev-8.4.4-0.27.6.1.i586"
}
},
{
"category": "product_version",
"name": "drbd-utils-8.4.4-0.27.6.1.i586",
"product": {
"name": "drbd-utils-8.4.4-0.27.6.1.i586",
"product_id": "drbd-utils-8.4.4-0.27.6.1.i586"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.i586",
"product": {
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.i586",
"product_id": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.i586"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-pae-2_3.0.101_108.87-0.24.6.1.i586",
"product": {
"name": "gfs2-kmp-pae-2_3.0.101_108.87-0.24.6.1.i586",
"product_id": "gfs2-kmp-pae-2_3.0.101_108.87-0.24.6.1.i586"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.i586",
"product": {
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.i586",
"product_id": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.i586"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.i586",
"product": {
"name": "gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.i586",
"product_id": "gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.i586"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.i586",
"product": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.i586",
"product_id": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.i586"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-pae-1.6_3.0.101_108.87-0.28.9.1.i586",
"product": {
"name": "ocfs2-kmp-pae-1.6_3.0.101_108.87-0.28.9.1.i586",
"product_id": "ocfs2-kmp-pae-1.6_3.0.101_108.87-0.28.9.1.i586"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.i586",
"product": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.i586",
"product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.i586"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.i586",
"product": {
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.i586",
"product_id": "ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.i586"
}
},
{
"category": "product_version",
"name": "iscsitarget-1.4.20-0.43.7.1.i586",
"product": {
"name": "iscsitarget-1.4.20-0.43.7.1.i586",
"product_id": "iscsitarget-1.4.20-0.43.7.1.i586"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"product": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"product_id": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"product": {
"name": "iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"product_id": "iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"product": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"product_id": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"product": {
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"product_id": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586"
}
},
{
"category": "product_version",
"name": "ofed-1.5.4.1-22.6.1.i586",
"product": {
"name": "ofed-1.5.4.1-22.6.1.i586",
"product_id": "ofed-1.5.4.1-22.6.1.i586"
}
},
{
"category": "product_version",
"name": "ofed-doc-1.5.4.1-22.6.1.i586",
"product": {
"name": "ofed-doc-1.5.4.1-22.6.1.i586",
"product_id": "ofed-doc-1.5.4.1-22.6.1.i586"
}
},
{
"category": "product_version",
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"product": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"product_id": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586"
}
},
{
"category": "product_version",
"name": "ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"product": {
"name": "ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"product_id": "ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586"
}
},
{
"category": "product_version",
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"product": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"product_id": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586"
}
},
{
"category": "product_version",
"name": "oracleasm-2.0.5-7.44.2.1.i586",
"product": {
"name": "oracleasm-2.0.5-7.44.2.1.i586",
"product_id": "oracleasm-2.0.5-7.44.2.1.i586"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"product": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"product_id": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"product": {
"name": "oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"product_id": "oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"product": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"product_id": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"product": {
"name": "oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"product_id": "oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "ofed-devel-1.5.4.1-22.6.1.ia64",
"product": {
"name": "ofed-devel-1.5.4.1-22.6.1.ia64",
"product_id": "ofed-devel-1.5.4.1-22.6.1.ia64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ia64",
"product": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ia64",
"product_id": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ia64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ia64",
"product": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ia64",
"product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ia64"
}
},
{
"category": "product_version",
"name": "drbd-8.4.4-0.27.6.1.ia64",
"product": {
"name": "drbd-8.4.4-0.27.6.1.ia64",
"product_id": "drbd-8.4.4-0.27.6.1.ia64"
}
},
{
"category": "product_version",
"name": "drbd-bash-completion-8.4.4-0.27.6.1.ia64",
"product": {
"name": "drbd-bash-completion-8.4.4-0.27.6.1.ia64",
"product_id": "drbd-bash-completion-8.4.4-0.27.6.1.ia64"
}
},
{
"category": "product_version",
"name": "drbd-heartbeat-8.4.4-0.27.6.1.ia64",
"product": {
"name": "drbd-heartbeat-8.4.4-0.27.6.1.ia64",
"product_id": "drbd-heartbeat-8.4.4-0.27.6.1.ia64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ia64",
"product": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ia64",
"product_id": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ia64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ia64",
"product": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ia64",
"product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ia64"
}
},
{
"category": "product_version",
"name": "drbd-pacemaker-8.4.4-0.27.6.1.ia64",
"product": {
"name": "drbd-pacemaker-8.4.4-0.27.6.1.ia64",
"product_id": "drbd-pacemaker-8.4.4-0.27.6.1.ia64"
}
},
{
"category": "product_version",
"name": "drbd-udev-8.4.4-0.27.6.1.ia64",
"product": {
"name": "drbd-udev-8.4.4-0.27.6.1.ia64",
"product_id": "drbd-udev-8.4.4-0.27.6.1.ia64"
}
},
{
"category": "product_version",
"name": "drbd-utils-8.4.4-0.27.6.1.ia64",
"product": {
"name": "drbd-utils-8.4.4-0.27.6.1.ia64",
"product_id": "drbd-utils-8.4.4-0.27.6.1.ia64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ia64",
"product": {
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ia64",
"product_id": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ia64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ia64",
"product": {
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ia64",
"product_id": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ia64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ia64",
"product": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ia64",
"product_id": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ia64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ia64",
"product": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ia64",
"product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ia64"
}
},
{
"category": "product_version",
"name": "iscsitarget-1.4.20-0.43.7.1.ia64",
"product": {
"name": "iscsitarget-1.4.20-0.43.7.1.ia64",
"product_id": "iscsitarget-1.4.20-0.43.7.1.ia64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"product": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"product_id": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"product": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"product_id": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64"
}
},
{
"category": "product_version",
"name": "ofed-1.5.4.1-22.6.1.ia64",
"product": {
"name": "ofed-1.5.4.1-22.6.1.ia64",
"product_id": "ofed-1.5.4.1-22.6.1.ia64"
}
},
{
"category": "product_version",
"name": "ofed-doc-1.5.4.1-22.6.1.ia64",
"product": {
"name": "ofed-doc-1.5.4.1-22.6.1.ia64",
"product_id": "ofed-doc-1.5.4.1-22.6.1.ia64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"product": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"product_id": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"product": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"product_id": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64"
}
},
{
"category": "product_version",
"name": "oracleasm-2.0.5-7.44.2.1.ia64",
"product": {
"name": "oracleasm-2.0.5-7.44.2.1.ia64",
"product_id": "oracleasm-2.0.5-7.44.2.1.ia64"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"product": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"product_id": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"product": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"product_id": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ofed-devel-1.5.4.1-22.6.1.ppc64",
"product": {
"name": "ofed-devel-1.5.4.1-22.6.1.ppc64",
"product_id": "ofed-devel-1.5.4.1-22.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-bigmem-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"product": {
"name": "cluster-network-kmp-bigmem-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"product_id": "cluster-network-kmp-bigmem-1.4_3.0.101_108.87-2.32.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"product": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"product_id": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-ppc64-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"product": {
"name": "cluster-network-kmp-ppc64-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"product_id": "cluster-network-kmp-ppc64-1.4_3.0.101_108.87-2.32.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"product": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-8.4.4-0.27.6.1.ppc64",
"product": {
"name": "drbd-8.4.4-0.27.6.1.ppc64",
"product_id": "drbd-8.4.4-0.27.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-bash-completion-8.4.4-0.27.6.1.ppc64",
"product": {
"name": "drbd-bash-completion-8.4.4-0.27.6.1.ppc64",
"product_id": "drbd-bash-completion-8.4.4-0.27.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-heartbeat-8.4.4-0.27.6.1.ppc64",
"product": {
"name": "drbd-heartbeat-8.4.4-0.27.6.1.ppc64",
"product_id": "drbd-heartbeat-8.4.4-0.27.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-bigmem-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"product": {
"name": "drbd-kmp-bigmem-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"product_id": "drbd-kmp-bigmem-8.4.4_3.0.101_108.87-0.27.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"product": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"product_id": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-ppc64-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"product": {
"name": "drbd-kmp-ppc64-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"product_id": "drbd-kmp-ppc64-8.4.4_3.0.101_108.87-0.27.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"product": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-pacemaker-8.4.4-0.27.6.1.ppc64",
"product": {
"name": "drbd-pacemaker-8.4.4-0.27.6.1.ppc64",
"product_id": "drbd-pacemaker-8.4.4-0.27.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-udev-8.4.4-0.27.6.1.ppc64",
"product": {
"name": "drbd-udev-8.4.4-0.27.6.1.ppc64",
"product_id": "drbd-udev-8.4.4-0.27.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "drbd-utils-8.4.4-0.27.6.1.ppc64",
"product": {
"name": "drbd-utils-8.4.4-0.27.6.1.ppc64",
"product_id": "drbd-utils-8.4.4-0.27.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-bigmem-2_3.0.101_108.87-0.24.6.1.ppc64",
"product": {
"name": "gfs2-kmp-bigmem-2_3.0.101_108.87-0.24.6.1.ppc64",
"product_id": "gfs2-kmp-bigmem-2_3.0.101_108.87-0.24.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ppc64",
"product": {
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ppc64",
"product_id": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-ppc64-2_3.0.101_108.87-0.24.6.1.ppc64",
"product": {
"name": "gfs2-kmp-ppc64-2_3.0.101_108.87-0.24.6.1.ppc64",
"product_id": "gfs2-kmp-ppc64-2_3.0.101_108.87-0.24.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ppc64",
"product": {
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ppc64",
"product_id": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-bigmem-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"product": {
"name": "ocfs2-kmp-bigmem-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"product_id": "ocfs2-kmp-bigmem-1.6_3.0.101_108.87-0.28.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"product": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"product_id": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-ppc64-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"product": {
"name": "ocfs2-kmp-ppc64-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"product_id": "ocfs2-kmp-ppc64-1.6_3.0.101_108.87-0.28.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"product": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ppc64"
}
},
{
"category": "product_version",
"name": "iscsitarget-1.4.20-0.43.7.1.ppc64",
"product": {
"name": "iscsitarget-1.4.20-0.43.7.1.ppc64",
"product_id": "iscsitarget-1.4.20-0.43.7.1.ppc64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"product": {
"name": "iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"product_id": "iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"product": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"product_id": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"product": {
"name": "iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"product_id": "iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"product": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"product_id": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64"
}
},
{
"category": "product_version",
"name": "ofed-1.5.4.1-22.6.1.ppc64",
"product": {
"name": "ofed-1.5.4.1-22.6.1.ppc64",
"product_id": "ofed-1.5.4.1-22.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "ofed-doc-1.5.4.1-22.6.1.ppc64",
"product": {
"name": "ofed-doc-1.5.4.1-22.6.1.ppc64",
"product_id": "ofed-doc-1.5.4.1-22.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"product": {
"name": "ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"product_id": "ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"product": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"product_id": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"product": {
"name": "ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"product_id": "ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"product": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"product_id": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "oracleasm-2.0.5-7.44.2.1.ppc64",
"product": {
"name": "oracleasm-2.0.5-7.44.2.1.ppc64",
"product_id": "oracleasm-2.0.5-7.44.2.1.ppc64"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"product": {
"name": "oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"product_id": "oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"product": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"product_id": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"product": {
"name": "oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"product_id": "oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"product": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"product_id": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.s390x",
"product": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.s390x",
"product_id": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.s390x",
"product": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.s390x",
"product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-8.4.4-0.27.6.1.s390x",
"product": {
"name": "drbd-8.4.4-0.27.6.1.s390x",
"product_id": "drbd-8.4.4-0.27.6.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-bash-completion-8.4.4-0.27.6.1.s390x",
"product": {
"name": "drbd-bash-completion-8.4.4-0.27.6.1.s390x",
"product_id": "drbd-bash-completion-8.4.4-0.27.6.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-heartbeat-8.4.4-0.27.6.1.s390x",
"product": {
"name": "drbd-heartbeat-8.4.4-0.27.6.1.s390x",
"product_id": "drbd-heartbeat-8.4.4-0.27.6.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.s390x",
"product": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.s390x",
"product_id": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.s390x",
"product": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.s390x",
"product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-pacemaker-8.4.4-0.27.6.1.s390x",
"product": {
"name": "drbd-pacemaker-8.4.4-0.27.6.1.s390x",
"product_id": "drbd-pacemaker-8.4.4-0.27.6.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-udev-8.4.4-0.27.6.1.s390x",
"product": {
"name": "drbd-udev-8.4.4-0.27.6.1.s390x",
"product_id": "drbd-udev-8.4.4-0.27.6.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-utils-8.4.4-0.27.6.1.s390x",
"product": {
"name": "drbd-utils-8.4.4-0.27.6.1.s390x",
"product_id": "drbd-utils-8.4.4-0.27.6.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.s390x",
"product": {
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.s390x",
"product_id": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.s390x",
"product": {
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.s390x",
"product_id": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.s390x",
"product": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.s390x",
"product_id": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.s390x",
"product": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.s390x",
"product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.s390x"
}
},
{
"category": "product_version",
"name": "iscsitarget-1.4.20-0.43.7.1.s390x",
"product": {
"name": "iscsitarget-1.4.20-0.43.7.1.s390x",
"product_id": "iscsitarget-1.4.20-0.43.7.1.s390x"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"product": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"product_id": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"product": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"product_id": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x"
}
},
{
"category": "product_version",
"name": "ofed-1.5.4.1-22.6.1.s390x",
"product": {
"name": "ofed-1.5.4.1-22.6.1.s390x",
"product_id": "ofed-1.5.4.1-22.6.1.s390x"
}
},
{
"category": "product_version",
"name": "ofed-doc-1.5.4.1-22.6.1.s390x",
"product": {
"name": "ofed-doc-1.5.4.1-22.6.1.s390x",
"product_id": "ofed-doc-1.5.4.1-22.6.1.s390x"
}
},
{
"category": "product_version",
"name": "oracleasm-2.0.5-7.44.2.1.s390x",
"product": {
"name": "oracleasm-2.0.5-7.44.2.1.s390x",
"product_id": "oracleasm-2.0.5-7.44.2.1.s390x"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"product": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"product_id": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"product": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"product_id": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ofed-devel-1.5.4.1-22.6.1.x86_64",
"product": {
"name": "ofed-devel-1.5.4.1-22.6.1.x86_64",
"product_id": "ofed-devel-1.5.4.1-22.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"product_id": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"product": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"product": {
"name": "cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"product_id": "cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-8.4.4-0.27.6.1.x86_64",
"product": {
"name": "drbd-8.4.4-0.27.6.1.x86_64",
"product_id": "drbd-8.4.4-0.27.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-bash-completion-8.4.4-0.27.6.1.x86_64",
"product": {
"name": "drbd-bash-completion-8.4.4-0.27.6.1.x86_64",
"product_id": "drbd-bash-completion-8.4.4-0.27.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-heartbeat-8.4.4-0.27.6.1.x86_64",
"product": {
"name": "drbd-heartbeat-8.4.4-0.27.6.1.x86_64",
"product_id": "drbd-heartbeat-8.4.4-0.27.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"product": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"product_id": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"product": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"product": {
"name": "drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"product_id": "drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-pacemaker-8.4.4-0.27.6.1.x86_64",
"product": {
"name": "drbd-pacemaker-8.4.4-0.27.6.1.x86_64",
"product_id": "drbd-pacemaker-8.4.4-0.27.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-udev-8.4.4-0.27.6.1.x86_64",
"product": {
"name": "drbd-udev-8.4.4-0.27.6.1.x86_64",
"product_id": "drbd-udev-8.4.4-0.27.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-utils-8.4.4-0.27.6.1.x86_64",
"product": {
"name": "drbd-utils-8.4.4-0.27.6.1.x86_64",
"product_id": "drbd-utils-8.4.4-0.27.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-xen-8.4.4-0.27.6.1.x86_64",
"product": {
"name": "drbd-xen-8.4.4-0.27.6.1.x86_64",
"product_id": "drbd-xen-8.4.4-0.27.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.x86_64",
"product": {
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.x86_64",
"product_id": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.x86_64",
"product": {
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.x86_64",
"product_id": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.x86_64",
"product": {
"name": "gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.x86_64",
"product_id": "gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"product_id": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"product": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"product": {
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"product_id": "ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64",
"product": {
"name": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64",
"product_id": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64",
"product": {
"name": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64",
"product_id": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64",
"product": {
"name": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64",
"product_id": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64",
"product": {
"name": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64",
"product_id": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-2_3.0.101_rt130_69.42-0.24.6.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-2_3.0.101_rt130_69.42-0.24.6.1.x86_64",
"product_id": "gfs2-kmp-rt-2_3.0.101_rt130_69.42-0.24.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.42-0.24.6.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.42-0.24.6.1.x86_64",
"product_id": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.42-0.24.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64",
"product": {
"name": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64",
"product_id": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64",
"product": {
"name": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64",
"product_id": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64",
"product_id": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64",
"product_id": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64",
"product": {
"name": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64",
"product_id": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64",
"product": {
"name": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64",
"product_id": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "iscsitarget-1.4.20-0.43.7.1.x86_64",
"product": {
"name": "iscsitarget-1.4.20-0.43.7.1.x86_64",
"product_id": "iscsitarget-1.4.20-0.43.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"product": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"product_id": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"product": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"product_id": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"product": {
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"product_id": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "ofed-1.5.4.1-22.6.1.x86_64",
"product": {
"name": "ofed-1.5.4.1-22.6.1.x86_64",
"product_id": "ofed-1.5.4.1-22.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "ofed-doc-1.5.4.1-22.6.1.x86_64",
"product": {
"name": "ofed-doc-1.5.4.1-22.6.1.x86_64",
"product_id": "ofed-doc-1.5.4.1-22.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"product": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"product_id": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"product": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"product_id": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "oracleasm-2.0.5-7.44.2.1.x86_64",
"product": {
"name": "oracleasm-2.0.5-7.44.2.1.x86_64",
"product_id": "oracleasm-2.0.5-7.44.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"product": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"product_id": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"product": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"product_id": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"product": {
"name": "oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"product_id": "oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 11 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-hae:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-devel-1.5.4.1-22.6.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.i586"
},
"product_reference": "ofed-devel-1.5.4.1-22.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-devel-1.5.4.1-22.6.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.ia64"
},
"product_reference": "ofed-devel-1.5.4.1-22.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-devel-1.5.4.1-22.6.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.ppc64"
},
"product_reference": "ofed-devel-1.5.4.1-22.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-devel-1.5.4.1-22.6.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.x86_64"
},
"product_reference": "ofed-devel-1.5.4.1-22.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-bigmem-1.4_3.0.101_108.87-2.32.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.87-2.32.6.1.ppc64"
},
"product_reference": "cluster-network-kmp-bigmem-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.i586"
},
"product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ia64"
},
"product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ppc64"
},
"product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.s390x"
},
"product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.x86_64"
},
"product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-pae-1.4_3.0.101_108.87-2.32.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.87-2.32.6.1.i586"
},
"product_reference": "cluster-network-kmp-pae-1.4_3.0.101_108.87-2.32.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-ppc64-1.4_3.0.101_108.87-2.32.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.87-2.32.6.1.ppc64"
},
"product_reference": "cluster-network-kmp-ppc64-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.i586"
},
"product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ia64"
},
"product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ppc64"
},
"product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.s390x"
},
"product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.x86_64"
},
"product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.i586"
},
"product_reference": "cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.x86_64"
},
"product_reference": "cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.4-0.27.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.i586"
},
"product_reference": "drbd-8.4.4-0.27.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.4-0.27.6.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.ia64"
},
"product_reference": "drbd-8.4.4-0.27.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.4-0.27.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.ppc64"
},
"product_reference": "drbd-8.4.4-0.27.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.4-0.27.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.s390x"
},
"product_reference": "drbd-8.4.4-0.27.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-8.4.4-0.27.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.x86_64"
},
"product_reference": "drbd-8.4.4-0.27.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-bash-completion-8.4.4-0.27.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.i586"
},
"product_reference": "drbd-bash-completion-8.4.4-0.27.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-bash-completion-8.4.4-0.27.6.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.ia64"
},
"product_reference": "drbd-bash-completion-8.4.4-0.27.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-bash-completion-8.4.4-0.27.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.ppc64"
},
"product_reference": "drbd-bash-completion-8.4.4-0.27.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-bash-completion-8.4.4-0.27.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.s390x"
},
"product_reference": "drbd-bash-completion-8.4.4-0.27.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-bash-completion-8.4.4-0.27.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.x86_64"
},
"product_reference": "drbd-bash-completion-8.4.4-0.27.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-heartbeat-8.4.4-0.27.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.i586"
},
"product_reference": "drbd-heartbeat-8.4.4-0.27.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-heartbeat-8.4.4-0.27.6.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.ia64"
},
"product_reference": "drbd-heartbeat-8.4.4-0.27.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-heartbeat-8.4.4-0.27.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.ppc64"
},
"product_reference": "drbd-heartbeat-8.4.4-0.27.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-heartbeat-8.4.4-0.27.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.s390x"
},
"product_reference": "drbd-heartbeat-8.4.4-0.27.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-heartbeat-8.4.4-0.27.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.x86_64"
},
"product_reference": "drbd-heartbeat-8.4.4-0.27.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-bigmem-8.4.4_3.0.101_108.87-0.27.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.87-0.27.6.1.ppc64"
},
"product_reference": "drbd-kmp-bigmem-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.i586"
},
"product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ia64"
},
"product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ppc64"
},
"product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.s390x"
},
"product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.x86_64"
},
"product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-pae-8.4.4_3.0.101_108.87-0.27.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.87-0.27.6.1.i586"
},
"product_reference": "drbd-kmp-pae-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-ppc64-8.4.4_3.0.101_108.87-0.27.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.87-0.27.6.1.ppc64"
},
"product_reference": "drbd-kmp-ppc64-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.i586"
},
"product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ia64"
},
"product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ppc64"
},
"product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.s390x"
},
"product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.x86_64"
},
"product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.i586"
},
"product_reference": "drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.x86_64"
},
"product_reference": "drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-pacemaker-8.4.4-0.27.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.i586"
},
"product_reference": "drbd-pacemaker-8.4.4-0.27.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-pacemaker-8.4.4-0.27.6.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.ia64"
},
"product_reference": "drbd-pacemaker-8.4.4-0.27.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-pacemaker-8.4.4-0.27.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.ppc64"
},
"product_reference": "drbd-pacemaker-8.4.4-0.27.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-pacemaker-8.4.4-0.27.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.s390x"
},
"product_reference": "drbd-pacemaker-8.4.4-0.27.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-pacemaker-8.4.4-0.27.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.x86_64"
},
"product_reference": "drbd-pacemaker-8.4.4-0.27.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-udev-8.4.4-0.27.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.i586"
},
"product_reference": "drbd-udev-8.4.4-0.27.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-udev-8.4.4-0.27.6.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.ia64"
},
"product_reference": "drbd-udev-8.4.4-0.27.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-udev-8.4.4-0.27.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.ppc64"
},
"product_reference": "drbd-udev-8.4.4-0.27.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-udev-8.4.4-0.27.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.s390x"
},
"product_reference": "drbd-udev-8.4.4-0.27.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-udev-8.4.4-0.27.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.x86_64"
},
"product_reference": "drbd-udev-8.4.4-0.27.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-8.4.4-0.27.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.i586"
},
"product_reference": "drbd-utils-8.4.4-0.27.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-8.4.4-0.27.6.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.ia64"
},
"product_reference": "drbd-utils-8.4.4-0.27.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-8.4.4-0.27.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.ppc64"
},
"product_reference": "drbd-utils-8.4.4-0.27.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-8.4.4-0.27.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.s390x"
},
"product_reference": "drbd-utils-8.4.4-0.27.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-utils-8.4.4-0.27.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.x86_64"
},
"product_reference": "drbd-utils-8.4.4-0.27.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-xen-8.4.4-0.27.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.6.1.x86_64"
},
"product_reference": "drbd-xen-8.4.4-0.27.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-bigmem-2_3.0.101_108.87-0.24.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.87-0.24.6.1.ppc64"
},
"product_reference": "gfs2-kmp-bigmem-2_3.0.101_108.87-0.24.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.i586"
},
"product_reference": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ia64"
},
"product_reference": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ppc64"
},
"product_reference": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.s390x"
},
"product_reference": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.x86_64"
},
"product_reference": "gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-pae-2_3.0.101_108.87-0.24.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.87-0.24.6.1.i586"
},
"product_reference": "gfs2-kmp-pae-2_3.0.101_108.87-0.24.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-ppc64-2_3.0.101_108.87-0.24.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.87-0.24.6.1.ppc64"
},
"product_reference": "gfs2-kmp-ppc64-2_3.0.101_108.87-0.24.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.i586"
},
"product_reference": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ia64"
},
"product_reference": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ppc64"
},
"product_reference": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.s390x"
},
"product_reference": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.x86_64"
},
"product_reference": "gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.i586"
},
"product_reference": "gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.x86_64"
},
"product_reference": "gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-bigmem-1.6_3.0.101_108.87-0.28.9.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.87-0.28.9.1.ppc64"
},
"product_reference": "ocfs2-kmp-bigmem-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.i586"
},
"product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ia64"
},
"product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ppc64"
},
"product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.s390x"
},
"product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-pae-1.6_3.0.101_108.87-0.28.9.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.87-0.28.9.1.i586"
},
"product_reference": "ocfs2-kmp-pae-1.6_3.0.101_108.87-0.28.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-ppc64-1.6_3.0.101_108.87-0.28.9.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.87-0.28.9.1.ppc64"
},
"product_reference": "ocfs2-kmp-ppc64-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.i586"
},
"product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ia64"
},
"product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ppc64"
},
"product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.s390x"
},
"product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.x86_64"
},
"product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.i586"
},
"product_reference": "ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.x86_64"
},
"product_reference": "ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64"
},
"product_reference": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64"
},
"product_reference": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64"
},
"product_reference": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64"
},
"product_reference": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-2_3.0.101_rt130_69.42-0.24.6.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.42-0.24.6.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-2_3.0.101_rt130_69.42-0.24.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.42-0.24.6.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.42-0.24.6.1.x86_64"
},
"product_reference": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.42-0.24.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64"
},
"product_reference": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64"
},
"product_reference": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64"
},
"product_reference": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64"
},
"product_reference": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.7.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.i586"
},
"product_reference": "iscsitarget-1.4.20-0.43.7.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.7.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.ia64"
},
"product_reference": "iscsitarget-1.4.20-0.43.7.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.7.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.ppc64"
},
"product_reference": "iscsitarget-1.4.20-0.43.7.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.7.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.s390x"
},
"product_reference": "iscsitarget-1.4.20-0.43.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.7.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.x86_64"
},
"product_reference": "iscsitarget-1.4.20-0.43.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64"
},
"product_reference": "iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586"
},
"product_reference": "iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64"
},
"product_reference": "iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586"
},
"product_reference": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64"
},
"product_reference": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.i586"
},
"product_reference": "ofed-1.5.4.1-22.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.6.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.ia64"
},
"product_reference": "ofed-1.5.4.1-22.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.ppc64"
},
"product_reference": "ofed-1.5.4.1-22.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.s390x"
},
"product_reference": "ofed-1.5.4.1-22.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.x86_64"
},
"product_reference": "ofed-1.5.4.1-22.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.i586"
},
"product_reference": "ofed-doc-1.5.4.1-22.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.6.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.ia64"
},
"product_reference": "ofed-doc-1.5.4.1-22.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.ppc64"
},
"product_reference": "ofed-doc-1.5.4.1-22.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.s390x"
},
"product_reference": "ofed-doc-1.5.4.1-22.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.x86_64"
},
"product_reference": "ofed-doc-1.5.4.1-22.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64"
},
"product_reference": "ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586"
},
"product_reference": "ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64"
},
"product_reference": "ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-2.0.5-7.44.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.i586"
},
"product_reference": "oracleasm-2.0.5-7.44.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-2.0.5-7.44.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.ia64"
},
"product_reference": "oracleasm-2.0.5-7.44.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-2.0.5-7.44.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.ppc64"
},
"product_reference": "oracleasm-2.0.5-7.44.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-2.0.5-7.44.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.s390x"
},
"product_reference": "oracleasm-2.0.5-7.44.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-2.0.5-7.44.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.x86_64"
},
"product_reference": "oracleasm-2.0.5-7.44.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64"
},
"product_reference": "oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586"
},
"product_reference": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64"
},
"product_reference": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64"
},
"product_reference": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x"
},
"product_reference": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64"
},
"product_reference": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586"
},
"product_reference": "oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64"
},
"product_reference": "oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586"
},
"product_reference": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64"
},
"product_reference": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64"
},
"product_reference": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x"
},
"product_reference": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64"
},
"product_reference": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586"
},
"product_reference": "oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64"
},
"product_reference": "oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.7.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.i586"
},
"product_reference": "iscsitarget-1.4.20-0.43.7.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.7.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.ia64"
},
"product_reference": "iscsitarget-1.4.20-0.43.7.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.7.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.ppc64"
},
"product_reference": "iscsitarget-1.4.20-0.43.7.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.s390x"
},
"product_reference": "iscsitarget-1.4.20-0.43.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.x86_64"
},
"product_reference": "iscsitarget-1.4.20-0.43.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64"
},
"product_reference": "iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586"
},
"product_reference": "iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64"
},
"product_reference": "iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586"
},
"product_reference": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64"
},
"product_reference": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.6.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.i586"
},
"product_reference": "ofed-1.5.4.1-22.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.6.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.ia64"
},
"product_reference": "ofed-1.5.4.1-22.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.6.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.ppc64"
},
"product_reference": "ofed-1.5.4.1-22.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.s390x"
},
"product_reference": "ofed-1.5.4.1-22.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.x86_64"
},
"product_reference": "ofed-1.5.4.1-22.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.6.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.i586"
},
"product_reference": "ofed-doc-1.5.4.1-22.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.6.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.ia64"
},
"product_reference": "ofed-doc-1.5.4.1-22.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.6.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.ppc64"
},
"product_reference": "ofed-doc-1.5.4.1-22.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.s390x"
},
"product_reference": "ofed-doc-1.5.4.1-22.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.x86_64"
},
"product_reference": "ofed-doc-1.5.4.1-22.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64"
},
"product_reference": "ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586"
},
"product_reference": "ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64"
},
"product_reference": "ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-2.0.5-7.44.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.i586"
},
"product_reference": "oracleasm-2.0.5-7.44.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-2.0.5-7.44.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.ia64"
},
"product_reference": "oracleasm-2.0.5-7.44.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-2.0.5-7.44.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.ppc64"
},
"product_reference": "oracleasm-2.0.5-7.44.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-2.0.5-7.44.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.s390x"
},
"product_reference": "oracleasm-2.0.5-7.44.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-2.0.5-7.44.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.x86_64"
},
"product_reference": "oracleasm-2.0.5-7.44.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64"
},
"product_reference": "oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586"
},
"product_reference": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64"
},
"product_reference": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64"
},
"product_reference": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x"
},
"product_reference": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64"
},
"product_reference": "oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586"
},
"product_reference": "oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64"
},
"product_reference": "oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586"
},
"product_reference": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64"
},
"product_reference": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64"
},
"product_reference": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x"
},
"product_reference": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64"
},
"product_reference": "oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586"
},
"product_reference": "oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64"
},
"product_reference": "oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.87-2.32.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.87-0.24.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.87-0.24.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.87-0.24.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.87-0.28.9.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.42-0.24.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.42-0.24.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.87-2.32.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.87-0.24.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.87-0.24.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.87-0.24.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.87-0.28.9.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.42-0.24.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.42-0.24.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.87-2.32.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.87-0.24.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.87-0.24.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.87-0.24.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.87-0.28.9.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ia64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.42-2.32.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.42-0.27.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.42-0.24.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.42-0.24.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.42-0.43.7.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.42-0.28.9.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.42-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-2.0.5-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-2.0.5-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-29T15:35:17Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:0007-1
Vulnerability from csaf_suse - Published: 2018-01-03 23:03 - Updated: 2018-01-03 23:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n \nThis update for qemu fixes the following issues:\n\nA new feature was added:\n\n- Support EPYC vCPU type (bsc#1052825 fate#324038)\n\nAlso a mitigation for a security problem has been applied:\n\n- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from \n the host VM to the CPU, to allow enabling/disabling branch prediction features in the\n Intel CPU. (bsc#1068032)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-CAASP-ALL-2018-9,SUSE-SLE-DESKTOP-12-SP3-2018-9,SUSE-SLE-SERVER-12-SP3-2018-9",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0007-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0007-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180007-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0007-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003561.html"
},
{
"category": "self",
"summary": "SUSE Bug 1052825",
"url": "https://bugzilla.suse.com/1052825"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-01-03T23:03:54Z",
"generator": {
"date": "2018-01-03T23:03:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0007-1",
"initial_release_date": "2018-01-03T23:03:54Z",
"revision_history": [
{
"date": "2018-01-03T23:03:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.9.2.aarch64",
"product": {
"name": "qemu-2.9.1-6.9.2.aarch64",
"product_id": "qemu-2.9.1-6.9.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.9.1-6.9.2.aarch64",
"product": {
"name": "qemu-arm-2.9.1-6.9.2.aarch64",
"product_id": "qemu-arm-2.9.1-6.9.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.9.2.aarch64",
"product": {
"name": "qemu-block-curl-2.9.1-6.9.2.aarch64",
"product_id": "qemu-block-curl-2.9.1-6.9.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.9.2.aarch64",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.9.2.aarch64",
"product_id": "qemu-block-iscsi-2.9.1-6.9.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.9.1-6.9.2.aarch64",
"product": {
"name": "qemu-block-rbd-2.9.1-6.9.2.aarch64",
"product_id": "qemu-block-rbd-2.9.1-6.9.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.9.2.aarch64",
"product": {
"name": "qemu-block-ssh-2.9.1-6.9.2.aarch64",
"product_id": "qemu-block-ssh-2.9.1-6.9.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.9.2.aarch64",
"product": {
"name": "qemu-guest-agent-2.9.1-6.9.2.aarch64",
"product_id": "qemu-guest-agent-2.9.1-6.9.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.9.2.aarch64",
"product": {
"name": "qemu-lang-2.9.1-6.9.2.aarch64",
"product_id": "qemu-lang-2.9.1-6.9.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.9.2.aarch64",
"product": {
"name": "qemu-tools-2.9.1-6.9.2.aarch64",
"product_id": "qemu-tools-2.9.1-6.9.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-6.9.2.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-6.9.2.noarch",
"product_id": "qemu-ipxe-1.0.0-6.9.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.10.2-6.9.2.noarch",
"product": {
"name": "qemu-seabios-1.10.2-6.9.2.noarch",
"product_id": "qemu-seabios-1.10.2-6.9.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-6.9.2.noarch",
"product": {
"name": "qemu-sgabios-8-6.9.2.noarch",
"product_id": "qemu-sgabios-8-6.9.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.10.2-6.9.2.noarch",
"product": {
"name": "qemu-vgabios-1.10.2-6.9.2.noarch",
"product_id": "qemu-vgabios-1.10.2-6.9.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.9.2.ppc64le",
"product": {
"name": "qemu-2.9.1-6.9.2.ppc64le",
"product_id": "qemu-2.9.1-6.9.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.9.2.ppc64le",
"product": {
"name": "qemu-block-curl-2.9.1-6.9.2.ppc64le",
"product_id": "qemu-block-curl-2.9.1-6.9.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.9.2.ppc64le",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.9.2.ppc64le",
"product_id": "qemu-block-iscsi-2.9.1-6.9.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.9.2.ppc64le",
"product": {
"name": "qemu-block-ssh-2.9.1-6.9.2.ppc64le",
"product_id": "qemu-block-ssh-2.9.1-6.9.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.9.2.ppc64le",
"product": {
"name": "qemu-guest-agent-2.9.1-6.9.2.ppc64le",
"product_id": "qemu-guest-agent-2.9.1-6.9.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.9.2.ppc64le",
"product": {
"name": "qemu-lang-2.9.1-6.9.2.ppc64le",
"product_id": "qemu-lang-2.9.1-6.9.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.9.1-6.9.2.ppc64le",
"product": {
"name": "qemu-ppc-2.9.1-6.9.2.ppc64le",
"product_id": "qemu-ppc-2.9.1-6.9.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.9.2.ppc64le",
"product": {
"name": "qemu-tools-2.9.1-6.9.2.ppc64le",
"product_id": "qemu-tools-2.9.1-6.9.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.9.2.s390x",
"product": {
"name": "qemu-2.9.1-6.9.2.s390x",
"product_id": "qemu-2.9.1-6.9.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.9.2.s390x",
"product": {
"name": "qemu-block-curl-2.9.1-6.9.2.s390x",
"product_id": "qemu-block-curl-2.9.1-6.9.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.9.2.s390x",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.9.2.s390x",
"product_id": "qemu-block-iscsi-2.9.1-6.9.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.9.2.s390x",
"product": {
"name": "qemu-block-ssh-2.9.1-6.9.2.s390x",
"product_id": "qemu-block-ssh-2.9.1-6.9.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.9.2.s390x",
"product": {
"name": "qemu-guest-agent-2.9.1-6.9.2.s390x",
"product_id": "qemu-guest-agent-2.9.1-6.9.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.9.1-6.9.2.s390x",
"product": {
"name": "qemu-kvm-2.9.1-6.9.2.s390x",
"product_id": "qemu-kvm-2.9.1-6.9.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.9.2.s390x",
"product": {
"name": "qemu-lang-2.9.1-6.9.2.s390x",
"product_id": "qemu-lang-2.9.1-6.9.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.9.1-6.9.2.s390x",
"product": {
"name": "qemu-s390-2.9.1-6.9.2.s390x",
"product_id": "qemu-s390-2.9.1-6.9.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.9.2.s390x",
"product": {
"name": "qemu-tools-2.9.1-6.9.2.s390x",
"product_id": "qemu-tools-2.9.1-6.9.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.9.2.x86_64",
"product": {
"name": "qemu-2.9.1-6.9.2.x86_64",
"product_id": "qemu-2.9.1-6.9.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.9.2.x86_64",
"product": {
"name": "qemu-block-curl-2.9.1-6.9.2.x86_64",
"product_id": "qemu-block-curl-2.9.1-6.9.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.9.1-6.9.2.x86_64",
"product": {
"name": "qemu-kvm-2.9.1-6.9.2.x86_64",
"product_id": "qemu-kvm-2.9.1-6.9.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.9.2.x86_64",
"product": {
"name": "qemu-tools-2.9.1-6.9.2.x86_64",
"product_id": "qemu-tools-2.9.1-6.9.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.9.1-6.9.2.x86_64",
"product": {
"name": "qemu-x86-2.9.1-6.9.2.x86_64",
"product_id": "qemu-x86-2.9.1-6.9.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.9.2.x86_64",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.9.2.x86_64",
"product_id": "qemu-block-iscsi-2.9.1-6.9.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.9.1-6.9.2.x86_64",
"product": {
"name": "qemu-block-rbd-2.9.1-6.9.2.x86_64",
"product_id": "qemu-block-rbd-2.9.1-6.9.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.9.2.x86_64",
"product": {
"name": "qemu-block-ssh-2.9.1-6.9.2.x86_64",
"product_id": "qemu-block-ssh-2.9.1-6.9.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.9.2.x86_64",
"product": {
"name": "qemu-guest-agent-2.9.1-6.9.2.x86_64",
"product_id": "qemu-guest-agent-2.9.1-6.9.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.9.2.x86_64",
"product": {
"name": "qemu-lang-2.9.1-6.9.2.x86_64",
"product_id": "qemu-lang-2.9.1-6.9.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-block-curl-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-6.9.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.9.2.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-6.9.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-kvm-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.10.2-6.9.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.9.2.noarch"
},
"product_reference": "qemu-seabios-1.10.2-6.9.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-6.9.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.9.2.noarch"
},
"product_reference": "qemu-sgabios-8-6.9.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-tools-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.10.2-6.9.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.9.2.noarch"
},
"product_reference": "qemu-vgabios-1.10.2-6.9.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-x86-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-arm-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-block-curl-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-block-curl-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-block-curl-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-block-curl-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-block-ssh-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-block-ssh-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-guest-agent-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-guest-agent-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-6.9.2.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.9.2.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-6.9.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-kvm-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-kvm-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-lang-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-lang-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-lang-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-lang-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-ppc-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-s390-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.10.2-6.9.2.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.9.2.noarch"
},
"product_reference": "qemu-seabios-1.10.2-6.9.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-6.9.2.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.9.2.noarch"
},
"product_reference": "qemu-sgabios-8-6.9.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-tools-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-tools-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-tools-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-tools-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.10.2-6.9.2.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.9.2.noarch"
},
"product_reference": "qemu-vgabios-1.10.2-6.9.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-x86-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-arm-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-block-curl-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-block-curl-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-block-curl-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-block-curl-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-block-ssh-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-block-ssh-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-guest-agent-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-guest-agent-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-6.9.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.9.2.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-6.9.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-kvm-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-kvm-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-lang-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-lang-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-lang-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-lang-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-ppc-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-s390-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.10.2-6.9.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.9.2.noarch"
},
"product_reference": "qemu-seabios-1.10.2-6.9.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-6.9.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.9.2.noarch"
},
"product_reference": "qemu-sgabios-8-6.9.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.9.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.aarch64"
},
"product_reference": "qemu-tools-2.9.1-6.9.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.9.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.ppc64le"
},
"product_reference": "qemu-tools-2.9.1-6.9.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.9.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.s390x"
},
"product_reference": "qemu-tools-2.9.1-6.9.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-tools-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.10.2-6.9.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.9.2.noarch"
},
"product_reference": "qemu-vgabios-1.10.2-6.9.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.9.1-6.9.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.9.2.x86_64"
},
"product_reference": "qemu-x86-2.9.1-6.9.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.9.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.9.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.9.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.9.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.9.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.9.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.9.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.9.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.9.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.9.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.9.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.9.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.9.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.9.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.9.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.9.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.9.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.9.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.9.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.9.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.9.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.9.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.9.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-03T23:03:54Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:2082-1
Vulnerability from csaf_suse - Published: 2018-07-27 10:50 - Updated: 2018-07-27 10:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2017-5715: Fixes for speculative side channel attacks aka \u0027SpectreAttack\u0027 (var2) (bsc#1079869).\n- CVE-2018-3639: Add support for \u0027ssbd\u0027 and \u0027virt-ssbd\u0027 CPUID feature bits to address V4 Speculative Store Bypass aka \u0027Memory Disambiguation\u0027 (bsc#1092885).\n- CVE-2018-1064: Fix denial of service problem during reading from guest agent (bsc#1083625).\n- CVE-2018-5748: Fix resource exhaustion via qemuMonitorIORead() method (bsc#1076500).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-SP1-2018-1417,SUSE-SLE-SERVER-12-SP1-2018-1417",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2082-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2082-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182082-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2082-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html"
},
{
"category": "self",
"summary": "SUSE Bug 1076500",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "self",
"summary": "SUSE Bug 1079869",
"url": "https://bugzilla.suse.com/1079869"
},
{
"category": "self",
"summary": "SUSE Bug 1083625",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1064 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5748 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5748/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-07-27T10:50:13Z",
"generator": {
"date": "2018-07-27T10:50:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2082-1",
"initial_release_date": "2018-07-27T10:50:13Z",
"revision_history": [
{
"date": "2018-07-27T10:50:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-client-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-client-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-doc-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-client-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-client-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-doc-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-doc-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-client-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-client-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-doc-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-doc-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-client-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-client-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-doc-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-client-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-client-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-client-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-doc-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-doc-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T10:50:13Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1064"
}
],
"notes": [
{
"category": "general",
"text": "libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1064",
"url": "https://www.suse.com/security/cve/CVE-2018-1064"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1088147"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T10:50:13Z",
"details": "moderate"
}
],
"title": "CVE-2018-1064"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T10:50:13Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-5748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5748"
}
],
"notes": [
{
"category": "general",
"text": "qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5748",
"url": "https://www.suse.com/security/cve/CVE-2018-5748"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1087887"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T10:50:13Z",
"details": "low"
}
],
"title": "CVE-2018-5748"
}
]
}
SUSE-SU-2018:0019-1
Vulnerability from csaf_suse - Published: 2018-01-04 12:57 - Updated: 2018-01-04 12:57Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kvm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThis update for kvm fixes the following issues:\n\nAlso a mitigation for a security flaw has been applied:\n\n- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from \n the host VM to the CPU, to allow enabling/disabling branch prediction features in the\n Intel CPU. (bsc#1068032)\n\nSecurity fixes have been applied:\n\n- CVE-2017-2633: Fix various out of bounds access issues in the QEMU vnc infrastructure (bsc#1026612)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slessp4-kvm-13393",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0019-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0019-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180019-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0019-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003571.html"
},
{
"category": "self",
"summary": "SUSE Bug 1026612",
"url": "https://bugzilla.suse.com/1026612"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2633 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2633/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for kvm",
"tracking": {
"current_release_date": "2018-01-04T12:57:52Z",
"generator": {
"date": "2018-01-04T12:57:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0019-1",
"initial_release_date": "2018-01-04T12:57:52Z",
"revision_history": [
{
"date": "2018-01-04T12:57:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-60.6.1.i586",
"product": {
"name": "kvm-1.4.2-60.6.1.i586",
"product_id": "kvm-1.4.2-60.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-60.6.1.s390x",
"product": {
"name": "kvm-1.4.2-60.6.1.s390x",
"product_id": "kvm-1.4.2-60.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-60.6.1.x86_64",
"product": {
"name": "kvm-1.4.2-60.6.1.x86_64",
"product_id": "kvm-1.4.2-60.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.i586"
},
"product_reference": "kvm-1.4.2-60.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.s390x"
},
"product_reference": "kvm-1.4.2-60.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.x86_64"
},
"product_reference": "kvm-1.4.2-60.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.6.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.i586"
},
"product_reference": "kvm-1.4.2-60.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.s390x"
},
"product_reference": "kvm-1.4.2-60.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.x86_64"
},
"product_reference": "kvm-1.4.2-60.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-2633",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2633"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the \u0027vnc_refresh_server_surface\u0027. A user inside a guest could use this flaw to crash the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2633",
"url": "https://www.suse.com/security/cve/CVE-2017-2633"
},
{
"category": "external",
"summary": "SUSE Bug 1026612 for CVE-2017-2633",
"url": "https://bugzilla.suse.com/1026612"
},
{
"category": "external",
"summary": "SUSE Bug 1026636 for CVE-2017-2633",
"url": "https://bugzilla.suse.com/1026636"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-2633",
"url": "https://bugzilla.suse.com/1074701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T12:57:52Z",
"details": "low"
}
],
"title": "CVE-2017-2633"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T12:57:52Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:1567-1
Vulnerability from csaf_suse - Published: 2018-06-07 11:43 - Updated: 2018-06-07 11:43Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-firmware",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-firmware fixes the following issues:\n\n- CVE-2015-1142857: Add 7.13.1.0 bnx2x firmware files for ethernet flow control\n vulnerability in SRIOV devices (bsc#1077355)\n- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker\n with local user access caused by speculative execution and indirect branch\n prediction (bsc#1095735).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-2018-1087",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1567-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1567-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181567-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1567-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004160.html"
},
{
"category": "self",
"summary": "SUSE Bug 1077355",
"url": "https://bugzilla.suse.com/1077355"
},
{
"category": "self",
"summary": "SUSE Bug 1095735",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1142857 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1142857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for kernel-firmware",
"tracking": {
"current_release_date": "2018-06-07T11:43:17Z",
"generator": {
"date": "2018-06-07T11:43:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1567-1",
"initial_release_date": "2018-06-07T11:43:17Z",
"revision_history": [
{
"date": "2018-06-07T11:43:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-20140807git-5.8.1.noarch",
"product": {
"name": "kernel-firmware-20140807git-5.8.1.noarch",
"product_id": "kernel-firmware-20140807git-5.8.1.noarch"
}
},
{
"category": "product_version",
"name": "ucode-amd-20140807git-5.8.1.noarch",
"product": {
"name": "ucode-amd-20140807git-5.8.1.noarch",
"product_id": "ucode-amd-20140807git-5.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20140807git-5.8.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-firmware-20140807git-5.8.1.noarch"
},
"product_reference": "kernel-firmware-20140807git-5.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20140807git-5.8.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:ucode-amd-20140807git-5.8.1.noarch"
},
"product_reference": "ucode-amd-20140807git-5.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-1142857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1142857"
}
],
"notes": [
{
"category": "general",
"text": "On multiple SR-IOV cars it is possible for VF\u0027s assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kernel-firmware-20140807git-5.8.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:ucode-amd-20140807git-5.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1142857",
"url": "https://www.suse.com/security/cve/CVE-2015-1142857"
},
{
"category": "external",
"summary": "SUSE Bug 1077355 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1077355"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1105108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kernel-firmware-20140807git-5.8.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:ucode-amd-20140807git-5.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kernel-firmware-20140807git-5.8.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:ucode-amd-20140807git-5.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-07T11:43:17Z",
"details": "moderate"
}
],
"title": "CVE-2015-1142857"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kernel-firmware-20140807git-5.8.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:ucode-amd-20140807git-5.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kernel-firmware-20140807git-5.8.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:ucode-amd-20140807git-5.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kernel-firmware-20140807git-5.8.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:ucode-amd-20140807git-5.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-07T11:43:17Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:1603-1
Vulnerability from csaf_suse - Published: 2018-06-08 10:36 - Updated: 2018-06-08 10:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).\n- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).\n\nbsc#1027519\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-xen-13647,slessp4-xen-13647",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1603-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1603-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181603-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1603-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1092631",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-06-08T10:36:09Z",
"generator": {
"date": "2018-06-08T10:36:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1603-1",
"initial_release_date": "2018-06-08T10:36:09Z",
"revision_history": [
{
"date": "2018-06-08T10:36:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.4.4_32-61.29.2.i586",
"product": {
"name": "xen-devel-4.4.4_32-61.29.2.i586",
"product_id": "xen-devel-4.4.4_32-61.29.2.i586"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"product": {
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"product_id": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586"
}
},
{
"category": "product_version",
"name": "xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"product": {
"name": "xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"product_id": "xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_32-61.29.2.i586",
"product": {
"name": "xen-libs-4.4.4_32-61.29.2.i586",
"product_id": "xen-libs-4.4.4_32-61.29.2.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_32-61.29.2.i586",
"product": {
"name": "xen-tools-domU-4.4.4_32-61.29.2.i586",
"product_id": "xen-tools-domU-4.4.4_32-61.29.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.4.4_32-61.29.2.x86_64",
"product": {
"name": "xen-devel-4.4.4_32-61.29.2.x86_64",
"product_id": "xen-devel-4.4.4_32-61.29.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-4.4.4_32-61.29.2.x86_64",
"product": {
"name": "xen-4.4.4_32-61.29.2.x86_64",
"product_id": "xen-4.4.4_32-61.29.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.4.4_32-61.29.2.x86_64",
"product": {
"name": "xen-doc-html-4.4.4_32-61.29.2.x86_64",
"product_id": "xen-doc-html-4.4.4_32-61.29.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"product": {
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"product_id": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_32-61.29.2.x86_64",
"product": {
"name": "xen-libs-4.4.4_32-61.29.2.x86_64",
"product_id": "xen-libs-4.4.4_32-61.29.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"product": {
"name": "xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"product_id": "xen-libs-32bit-4.4.4_32-61.29.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.4.4_32-61.29.2.x86_64",
"product": {
"name": "xen-tools-4.4.4_32-61.29.2.x86_64",
"product_id": "xen-tools-4.4.4_32-61.29.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"product": {
"name": "xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"product_id": "xen-tools-domU-4.4.4_32-61.29.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.4.4_32-61.29.2.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586"
},
"product_reference": "xen-devel-4.4.4_32-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-devel-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586"
},
"product_reference": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586"
},
"product_reference": "xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_32-61.29.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586"
},
"product_reference": "xen-libs-4.4.4_32-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-libs-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-tools-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_32-61.29.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586"
},
"product_reference": "xen-tools-domU-4.4.4_32-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586"
},
"product_reference": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586"
},
"product_reference": "xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_32-61.29.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586"
},
"product_reference": "xen-libs-4.4.4_32-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-libs-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-tools-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_32-61.29.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586"
},
"product_reference": "xen-tools-domU-4.4.4_32-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-08T10:36:09Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-08T10:36:09Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-08T10:36:09Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-08T10:36:09Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:0114-1
Vulnerability from csaf_suse - Published: 2018-01-16 14:55 - Updated: 2018-01-16 14:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\nThis update is only provided as a fix update for IBM Z platform.\n\n- CVE-2017-5753 / \u0027Spectre Attack\u0027: IBM Z fixes were included but not enabled in the previous update. This update enables those fixes.\n- CVE-2017-5715 / \u0027Spectre Attack\u0027: IBM Z fixes were already included in the previous update. A bugfix for the patches has been applied on top.\n- CVE-2017-5754: The IBM Z architecture is not affected by the \u0027Meltdown\u0027 attack.\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-SP1-2018-81",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0114-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0114-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180114-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0114-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003601.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-01-16T14:55:13Z",
"generator": {
"date": "2018-01-16T14:55:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0114-1",
"initial_release_date": "2018-01-16T14:55:13Z",
"revision_history": [
{
"date": "2018-01-16T14:55:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.74-60.64.72.1.noarch",
"product": {
"name": "kernel-devel-3.12.74-60.64.72.1.noarch",
"product_id": "kernel-devel-3.12.74-60.64.72.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.74-60.64.72.1.noarch",
"product": {
"name": "kernel-macros-3.12.74-60.64.72.1.noarch",
"product_id": "kernel-macros-3.12.74-60.64.72.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.74-60.64.72.1.noarch",
"product": {
"name": "kernel-source-3.12.74-60.64.72.1.noarch",
"product_id": "kernel-source-3.12.74-60.64.72.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.72.1.s390x",
"product": {
"name": "kernel-default-3.12.74-60.64.72.1.s390x",
"product_id": "kernel-default-3.12.74-60.64.72.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.72.1.s390x",
"product": {
"name": "kernel-default-base-3.12.74-60.64.72.1.s390x",
"product_id": "kernel-default-base-3.12.74-60.64.72.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.72.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.72.1.s390x",
"product_id": "kernel-default-devel-3.12.74-60.64.72.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.74-60.64.72.1.s390x",
"product": {
"name": "kernel-default-man-3.12.74-60.64.72.1.s390x",
"product_id": "kernel-default-man-3.12.74-60.64.72.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.72.1.s390x",
"product": {
"name": "kernel-syms-3.12.74-60.64.72.1.s390x",
"product_id": "kernel-syms-3.12.74-60.64.72.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.72.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.72.1.s390x"
},
"product_reference": "kernel-default-3.12.74-60.64.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.72.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.72.1.s390x"
},
"product_reference": "kernel-default-base-3.12.74-60.64.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.72.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.72.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.74-60.64.72.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.72.1.s390x"
},
"product_reference": "kernel-default-man-3.12.74-60.64.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.72.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.72.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.72.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.72.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.72.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.72.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.72.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.72.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.72.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.72.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.72.1.s390x"
},
"product_reference": "kernel-syms-3.12.74-60.64.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.72.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.72.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.72.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T14:55:13Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.72.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.72.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.72.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.72.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.72.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-16T14:55:13Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
}
]
}
SUSE-SU-2018:0131-1
Vulnerability from csaf_suse - Published: 2018-01-18 08:47 - Updated: 2018-01-18 08:47Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThis update is only provided as a fix update for IBM Z platform.\n\n- CVE-2017-5753 / \u0027Spectre Attack\u0027: IBM Z fixes were included but not enabled in the previous update. This update enables those fixes.\n- CVE-2017-5715 / \u0027Spectre Attack\u0027: IBM Z fixes were already included in the previous update. A bugfix for the patches has been applied on top.\n- CVE-2017-5754: The IBM Z architecture is not affected by the \u0027Meltdown\u0027 attack.\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-kernel-20180111-13421,slessp4-kernel-20180111-13421,slexsp3-kernel-20180111-13421",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0131-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0131-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180131-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0131-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VVUXCLQ7WIXJFNYSB6YFSFQV3AE3BKOZ/#VVUXCLQ7WIXJFNYSB6YFSFQV3AE3BKOZ"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-01-18T08:47:12Z",
"generator": {
"date": "2018-01-18T08:47:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0131-1",
"initial_release_date": "2018-01-18T08:47:12Z",
"revision_history": [
{
"date": "2018-01-18T08:47:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-docs-3.0.101-108.24.3.noarch",
"product": {
"name": "kernel-docs-3.0.101-108.24.3.noarch",
"product_id": "kernel-docs-3.0.101-108.24.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.24.1.s390x",
"product": {
"name": "kernel-default-3.0.101-108.24.1.s390x",
"product_id": "kernel-default-3.0.101-108.24.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.24.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-108.24.1.s390x",
"product_id": "kernel-default-base-3.0.101-108.24.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.24.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-108.24.1.s390x",
"product_id": "kernel-default-devel-3.0.101-108.24.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-108.24.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-108.24.1.s390x",
"product_id": "kernel-default-man-3.0.101-108.24.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.24.1.s390x",
"product": {
"name": "kernel-source-3.0.101-108.24.1.s390x",
"product_id": "kernel-source-3.0.101-108.24.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.24.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-108.24.1.s390x",
"product_id": "kernel-syms-3.0.101-108.24.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.24.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-108.24.1.s390x",
"product_id": "kernel-trace-3.0.101-108.24.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.24.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-108.24.1.s390x",
"product_id": "kernel-trace-base-3.0.101-108.24.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.24.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-108.24.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-108.24.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-3.0.101-108.24.3.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.24.3.noarch"
},
"product_reference": "kernel-docs-3.0.101-108.24.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.24.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.24.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.24.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.24.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-18T08:47:12Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.24.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.24.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.24.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-18T08:47:12Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
}
]
}
SUSE-SU-2018:0041-1
Vulnerability from csaf_suse - Published: 2018-01-08 15:31 - Updated: 2018-01-08 15:31Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-firmware",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-firmware fixes the following issues:\n\n- Add microcode_amd_fam17h.bin (bsc#1068032 CVE-2017-5715)\n\nThis new firmware enables the Indirect Branch Control (IBC) feature on\nAMD family 17h processor to mitigate an attack on the branch predictor\nthat could lead to information disclosure from e.g. kernel memory\n(bsc#1068032 CVE-2017-5715).\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-6-2018-30,SUSE-SLE-SAP-12-SP1-2018-30,SUSE-SLE-SERVER-12-SP1-2018-30",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0041-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0041-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180041-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0041-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003577.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for kernel-firmware",
"tracking": {
"current_release_date": "2018-01-08T15:31:06Z",
"generator": {
"date": "2018-01-08T15:31:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0041-1",
"initial_release_date": "2018-01-08T15:31:06Z",
"revision_history": [
{
"date": "2018-01-08T15:31:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-20160516git-10.8.1.noarch",
"product": {
"name": "kernel-firmware-20160516git-10.8.1.noarch",
"product_id": "kernel-firmware-20160516git-10.8.1.noarch"
}
},
{
"category": "product_version",
"name": "ucode-amd-20160516git-10.8.1.noarch",
"product": {
"name": "ucode-amd-20160516git-10.8.1.noarch",
"product_id": "ucode-amd-20160516git-10.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 6",
"product": {
"name": "SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20160516git-10.8.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-firmware-20160516git-10.8.1.noarch"
},
"product_reference": "kernel-firmware-20160516git-10.8.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20160516git-10.8.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:ucode-amd-20160516git-10.8.1.noarch"
},
"product_reference": "ucode-amd-20160516git-10.8.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20160516git-10.8.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-firmware-20160516git-10.8.1.noarch"
},
"product_reference": "kernel-firmware-20160516git-10.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20160516git-10.8.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-amd-20160516git-10.8.1.noarch"
},
"product_reference": "ucode-amd-20160516git-10.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20160516git-10.8.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-firmware-20160516git-10.8.1.noarch"
},
"product_reference": "kernel-firmware-20160516git-10.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20160516git-10.8.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-amd-20160516git-10.8.1.noarch"
},
"product_reference": "ucode-amd-20160516git-10.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-firmware-20160516git-10.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-amd-20160516git-10.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-firmware-20160516git-10.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-amd-20160516git-10.8.1.noarch",
"SUSE OpenStack Cloud 6:kernel-firmware-20160516git-10.8.1.noarch",
"SUSE OpenStack Cloud 6:ucode-amd-20160516git-10.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-firmware-20160516git-10.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-amd-20160516git-10.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-firmware-20160516git-10.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-amd-20160516git-10.8.1.noarch",
"SUSE OpenStack Cloud 6:kernel-firmware-20160516git-10.8.1.noarch",
"SUSE OpenStack Cloud 6:ucode-amd-20160516git-10.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-firmware-20160516git-10.8.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-amd-20160516git-10.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-firmware-20160516git-10.8.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-amd-20160516git-10.8.1.noarch",
"SUSE OpenStack Cloud 6:kernel-firmware-20160516git-10.8.1.noarch",
"SUSE OpenStack Cloud 6:ucode-amd-20160516git-10.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T15:31:06Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:0552-2
Vulnerability from csaf_suse - Published: 2018-03-08 13:47 - Updated: 2018-03-08 13:47Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for SUSE Manager Server 3.1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\nnutch:\n\n- Fix hadoop log dir. (bsc#1061574)\n\nosad, rhnlib:\n\n- Fix update mechanism when updating the updateservice (bsc#1073619)\n\npxe-default-image:\n\n- Spectre and Meltdown mitigation. (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754, bsc#1068032)\n\nspacecmd:\n\n- Support multiple FQDNs per system. (bsc#1063419)\n- Added custom JSON encoder in order to parse date fields correctly. (bsc#1070372)\n\nspacewalk-backend:\n\n- Fix spacewalk-data-fsck restore of broken package database entry. (bsc#1071526)\n- Support multiple FQDNs per system. (bsc#1063419)\n- Fix restore hostname and ip*addr in templated documents. (bsc#1075044)\n- Fix directory name in spacewalk-data-fsck.\n\nspacewalk-branding:\n\n- Replace custom states with configuration channels.\n- Fix pre formatted code. (bsc#1067608)\n- Fix message about package profile sync. (bsc#1073739)\n- Fix naming of the Tools channel. (bsc#979633)\n\nspacewalk-client-tools:\n\n- Support multiple FQDNs per system. (bsc#1063419)\n- Fix update mechanism when updating the updateservice. (bsc#1073619)\n\nspacewalk-java:\n\n- Fix the file count for deployed files. (bsc#1074300)\n- Remove previous activation keys when migrating to salt. (bsc#1031081)\n- Improve webui for comparing files. (bsc#1076201)\n- Separate Salt calls based on config revisions and server grouping. (bsc#1074854)\n- For minion, no option to modifiy config file but just view.\n- Handle gpg_check correctly. (bsc#1076578)\n- Uniform date formatting in System Details view. (bsc#1045289)\n- Import content of custom states from filesystem to database on startup, backup old state files.\n- Change the directory of the (normal) configuration channels from mgr_cfg_org_N to manager_org_N.\n- Replace custom states with configuration channels.\n- Hide ownership/permission fields from create/upload config file forms for state channels. (bsc#1072153)\n- Hide files from state channels from deploy/compare file lists. (bsc#1072160)\n- Disable and hide deploy files tab for state config channels. (bsc#1072157)\n- Allow ordering config channels in state revision.\n- Disallow creating \u0027normal\u0027 config channels when a \u0027state\u0027 channel with the same name and org already exists and\n vice versa.\n- UI has been updated to manage state channels.\n- Support multiple FQDNs per system. (bsc#1063419)\n- Setting \u0027Base Channels\u0027 as default tab for \u0027Channels\u0027 tab in SSM Overview screen. (bsc#979616)\n- Log triggers that are in ERROR state.\n- Refresh pillar data on formular change. (bsc#1028285)\n- Uniform the notification message when rebooting a system. (bsc#1036302)\n- Avoid use of the potentially-slow rhnServerNeededPackageCache view.\n- Speed up scheduling of package updates through the SSM. (bsc#1076034)\n- Fix encoding/decoding of url_bounce with more parameters. (bsc#1075408)\n- After dry-run, sync channels back with the server. (bsc#1071468)\n- Fix message about package profile sync. (bsc#1073739)\n- On registration, assign server to the organization of the creator when activation key is empty. (bsc#1016377)\n- Fix logging issues when saving autoyast profiles. (bsc#1073474)\n- Add VM state as info gathered from VMware. (bsc#1063759)\n- Improve performance of token checking, when RPMs or metadata are downloaded from minions. (bsc#1061273)\n- Allow selecting unnamed context in kubeconfig. (bsc#1073482)\n- Fix action names and date formatting in system event history. (bsc#1073713)\n- Fix incorrect \u0027os-release\u0027 report after SP migration. (bsc#1071553)\n- Fix failed package installation when in RES 32 and 64 bit packages are installed together. (bsc#1071314)\n- Add user preferences in order to change items-per-page. (bsc#1055296)\n- Order salt formulas alphabetically. (bsc#1022077)\n- Improved error message. (bsc#1064258)\n- Display messages about wrong input more end-user friendly. (bsc#1015956)\n- Add api calls for content staging.\n- Fix content refresh when product keys change. (bsc#1069943)\n- Allow \u0027Package List Refresh\u0027 when package arch has changed. (bsc#1065259)\n- New API call for scheduling highstate application.\n- Adding initial version of web ui notifications.\n- Show the time on the event history page in the users preferred timezone.\n\nspacewalk-reports, spacewalk-search:\n\n- More rhnServerNetwork refactoring (bsc#1063419)\n\nspacewalk-utils:\n\n- Remove restrictions imposed on regex used in \u0027removelist\u0027 parameter passed to spacewalk-clone-by-date that allowed\n only exact match. (bsc#1075254)\n\nspacewalk-web:\n\n- Replace custom states with configuration channels.\n- Add \u0027yaml\u0027 option for Ace editor.\n- Add links to salt formula list and adjust behavior. (bsc#1022078)\n- Allow selecting unnamed context in kubeconfig. (bsc#1073482)\n- Add user preferences in order to change items-per-page. (bsc#1055296)\n- Fix main menu column height.\n- Adding initial version of web ui notifications.\n\nsusemanager:\n\n- Fix custom SERVER_KEY overriding. (bsc#1075862)\n- Detect subvolumes on /var even with newer btrfs tools. (bsc#1077076)\n- Notify admin that database backups need reconfiguration after db upgrade.\n- Add syslinux-x86_64 dependency for ppc64le. (bsc#1065023)\n- Do not try to force db encoding on db upgrade; use same value as for installation. (bsc#1077730)\n\nsusemanager-schema:\n\n- Make migration idempotent. (bsc#1078749)\n- Fix schema with proper extension. (bsc#1079820)\n- Migrate old custom states to state channels, assign systems to these new channels, delete old custom-state-to-system\n assignments, delete the custom states from the db; Before migrating, rename custom states with same name as existing\n configuration channel labels.\n- Update queries for global channels.\n- Check if channel is already subscribed even before checking if parent channel is subscribed or not. (bsc#1072797)\n- Support multiple FQDNs per system. (bsc#1063419)\n- Avoid use of the potentially-slow rhnServerNeededPackageCache view.\n- Handle duplicate serverpackage entries while fixing duplicate evr ids. (bsc#1075345)\n- Fix duplicate entries in channel listings.\n- Handle nevra not found case while fixing duplicate evr ids. (bsc#1074508)\n- Added a script which will remove existing server locks against minions. (bsc#1064258)\n- Add column to store the \u0027test\u0027 option for state apply actions.\n- Adding initial version of web ui notifications.\n\nsusemanager-sls:\n\n- Compare osmajorrelease in jinja always as integer.\n- Python3 compatibility fixes in modules and states.\n- Fix cleanup state error when deleting ssh-push minion. (bsc#1070161)\n- Fix image inspect when entrypoint is used by overwriting it. (bsc#1070782)\n\nsusemanager-sync-data:\n\n- Use TLS for mirroring OES2018 channels. (bsc#1074430)\n- Add SUSE Manager Server 3.0 and 3.1 channels for mirroring.\n\nvirtual-host-gatherer:\n\n- Add VM state as info gathered from VMware. (bsc#1063759)\n- Explore the entire tree of nodes from VMware. (bsc#1070597)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SUSE-Manager-Server-3.1-2018-361",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0552-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0552-2",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180552-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0552-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html"
},
{
"category": "self",
"summary": "SUSE Bug 1015956",
"url": "https://bugzilla.suse.com/1015956"
},
{
"category": "self",
"summary": "SUSE Bug 1016377",
"url": "https://bugzilla.suse.com/1016377"
},
{
"category": "self",
"summary": "SUSE Bug 1022077",
"url": "https://bugzilla.suse.com/1022077"
},
{
"category": "self",
"summary": "SUSE Bug 1022078",
"url": "https://bugzilla.suse.com/1022078"
},
{
"category": "self",
"summary": "SUSE Bug 1028285",
"url": "https://bugzilla.suse.com/1028285"
},
{
"category": "self",
"summary": "SUSE Bug 1031081",
"url": "https://bugzilla.suse.com/1031081"
},
{
"category": "self",
"summary": "SUSE Bug 1036302",
"url": "https://bugzilla.suse.com/1036302"
},
{
"category": "self",
"summary": "SUSE Bug 1045289",
"url": "https://bugzilla.suse.com/1045289"
},
{
"category": "self",
"summary": "SUSE Bug 1055296",
"url": "https://bugzilla.suse.com/1055296"
},
{
"category": "self",
"summary": "SUSE Bug 1061273",
"url": "https://bugzilla.suse.com/1061273"
},
{
"category": "self",
"summary": "SUSE Bug 1061574",
"url": "https://bugzilla.suse.com/1061574"
},
{
"category": "self",
"summary": "SUSE Bug 1063419",
"url": "https://bugzilla.suse.com/1063419"
},
{
"category": "self",
"summary": "SUSE Bug 1063759",
"url": "https://bugzilla.suse.com/1063759"
},
{
"category": "self",
"summary": "SUSE Bug 1064258",
"url": "https://bugzilla.suse.com/1064258"
},
{
"category": "self",
"summary": "SUSE Bug 1065023",
"url": "https://bugzilla.suse.com/1065023"
},
{
"category": "self",
"summary": "SUSE Bug 1065259",
"url": "https://bugzilla.suse.com/1065259"
},
{
"category": "self",
"summary": "SUSE Bug 1067608",
"url": "https://bugzilla.suse.com/1067608"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1069943",
"url": "https://bugzilla.suse.com/1069943"
},
{
"category": "self",
"summary": "SUSE Bug 1070161",
"url": "https://bugzilla.suse.com/1070161"
},
{
"category": "self",
"summary": "SUSE Bug 1070372",
"url": "https://bugzilla.suse.com/1070372"
},
{
"category": "self",
"summary": "SUSE Bug 1070597",
"url": "https://bugzilla.suse.com/1070597"
},
{
"category": "self",
"summary": "SUSE Bug 1070782",
"url": "https://bugzilla.suse.com/1070782"
},
{
"category": "self",
"summary": "SUSE Bug 1071314",
"url": "https://bugzilla.suse.com/1071314"
},
{
"category": "self",
"summary": "SUSE Bug 1071468",
"url": "https://bugzilla.suse.com/1071468"
},
{
"category": "self",
"summary": "SUSE Bug 1071526",
"url": "https://bugzilla.suse.com/1071526"
},
{
"category": "self",
"summary": "SUSE Bug 1071553",
"url": "https://bugzilla.suse.com/1071553"
},
{
"category": "self",
"summary": "SUSE Bug 1072153",
"url": "https://bugzilla.suse.com/1072153"
},
{
"category": "self",
"summary": "SUSE Bug 1072157",
"url": "https://bugzilla.suse.com/1072157"
},
{
"category": "self",
"summary": "SUSE Bug 1072160",
"url": "https://bugzilla.suse.com/1072160"
},
{
"category": "self",
"summary": "SUSE Bug 1072797",
"url": "https://bugzilla.suse.com/1072797"
},
{
"category": "self",
"summary": "SUSE Bug 1073474",
"url": "https://bugzilla.suse.com/1073474"
},
{
"category": "self",
"summary": "SUSE Bug 1073482",
"url": "https://bugzilla.suse.com/1073482"
},
{
"category": "self",
"summary": "SUSE Bug 1073619",
"url": "https://bugzilla.suse.com/1073619"
},
{
"category": "self",
"summary": "SUSE Bug 1073713",
"url": "https://bugzilla.suse.com/1073713"
},
{
"category": "self",
"summary": "SUSE Bug 1073739",
"url": "https://bugzilla.suse.com/1073739"
},
{
"category": "self",
"summary": "SUSE Bug 1074300",
"url": "https://bugzilla.suse.com/1074300"
},
{
"category": "self",
"summary": "SUSE Bug 1074430",
"url": "https://bugzilla.suse.com/1074430"
},
{
"category": "self",
"summary": "SUSE Bug 1074508",
"url": "https://bugzilla.suse.com/1074508"
},
{
"category": "self",
"summary": "SUSE Bug 1074854",
"url": "https://bugzilla.suse.com/1074854"
},
{
"category": "self",
"summary": "SUSE Bug 1075044",
"url": "https://bugzilla.suse.com/1075044"
},
{
"category": "self",
"summary": "SUSE Bug 1075254",
"url": "https://bugzilla.suse.com/1075254"
},
{
"category": "self",
"summary": "SUSE Bug 1075345",
"url": "https://bugzilla.suse.com/1075345"
},
{
"category": "self",
"summary": "SUSE Bug 1075408",
"url": "https://bugzilla.suse.com/1075408"
},
{
"category": "self",
"summary": "SUSE Bug 1075862",
"url": "https://bugzilla.suse.com/1075862"
},
{
"category": "self",
"summary": "SUSE Bug 1076034",
"url": "https://bugzilla.suse.com/1076034"
},
{
"category": "self",
"summary": "SUSE Bug 1076201",
"url": "https://bugzilla.suse.com/1076201"
},
{
"category": "self",
"summary": "SUSE Bug 1076578",
"url": "https://bugzilla.suse.com/1076578"
},
{
"category": "self",
"summary": "SUSE Bug 1077076",
"url": "https://bugzilla.suse.com/1077076"
},
{
"category": "self",
"summary": "SUSE Bug 1077730",
"url": "https://bugzilla.suse.com/1077730"
},
{
"category": "self",
"summary": "SUSE Bug 1078749",
"url": "https://bugzilla.suse.com/1078749"
},
{
"category": "self",
"summary": "SUSE Bug 1079820",
"url": "https://bugzilla.suse.com/1079820"
},
{
"category": "self",
"summary": "SUSE Bug 979616",
"url": "https://bugzilla.suse.com/979616"
},
{
"category": "self",
"summary": "SUSE Bug 979633",
"url": "https://bugzilla.suse.com/979633"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
}
],
"title": "Security update for SUSE Manager Server 3.1",
"tracking": {
"current_release_date": "2018-03-08T13:47:54Z",
"generator": {
"date": "2018-03-08T13:47:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0552-2",
"initial_release_date": "2018-03-08T13:47:54Z",
"revision_history": [
{
"date": "2018-03-08T13:47:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nutch-1.0-0.9.6.2.noarch",
"product": {
"name": "nutch-1.0-0.9.6.2.noarch",
"product_id": "nutch-1.0-0.9.6.2.noarch"
}
},
{
"category": "product_version",
"name": "osa-common-5.11.80.5-2.9.2.noarch",
"product": {
"name": "osa-common-5.11.80.5-2.9.2.noarch",
"product_id": "osa-common-5.11.80.5-2.9.2.noarch"
}
},
{
"category": "product_version",
"name": "osa-dispatcher-5.11.80.5-2.9.2.noarch",
"product": {
"name": "osa-dispatcher-5.11.80.5-2.9.2.noarch",
"product_id": "osa-dispatcher-5.11.80.5-2.9.2.noarch"
}
},
{
"category": "product_version",
"name": "pxe-default-image-3.1-0.13.3.3.noarch",
"product": {
"name": "pxe-default-image-3.1-0.13.3.3.noarch",
"product_id": "pxe-default-image-3.1-0.13.3.3.noarch"
}
},
{
"category": "product_version",
"name": "rhnlib-2.7.2.2-3.3.2.noarch",
"product": {
"name": "rhnlib-2.7.2.2-3.3.2.noarch",
"product_id": "rhnlib-2.7.2.2-3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-2.7.8.9-2.12.2.noarch",
"product": {
"name": "spacecmd-2.7.8.9-2.12.2.noarch",
"product_id": "spacecmd-2.7.8.9-2.12.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-app-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-applet-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-iss-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-libs-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-server-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-sql-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-tools-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"product": {
"name": "spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"product_id": "spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-base-2.7.1.14-2.12.3.noarch",
"product": {
"name": "spacewalk-base-2.7.1.14-2.12.3.noarch",
"product_id": "spacewalk-base-2.7.1.14-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"product": {
"name": "spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"product_id": "spacewalk-base-minimal-2.7.1.14-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"product": {
"name": "spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"product_id": "spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"product": {
"name": "spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"product_id": "spacewalk-client-tools-2.7.6.3-3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-html-2.7.1.14-2.12.3.noarch",
"product": {
"name": "spacewalk-html-2.7.1.14-2.12.3.noarch",
"product_id": "spacewalk-html-2.7.1.14-2.12.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-2.7.46.10-2.14.2.noarch",
"product": {
"name": "spacewalk-java-2.7.46.10-2.14.2.noarch",
"product_id": "spacewalk-java-2.7.46.10-2.14.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"product": {
"name": "spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"product_id": "spacewalk-java-config-2.7.46.10-2.14.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"product": {
"name": "spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"product_id": "spacewalk-java-lib-2.7.46.10-2.14.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"product": {
"name": "spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"product_id": "spacewalk-java-oracle-2.7.46.10-2.14.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"product": {
"name": "spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"product_id": "spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-reports-2.7.5.4-2.6.3.noarch",
"product": {
"name": "spacewalk-reports-2.7.5.4-2.6.3.noarch",
"product_id": "spacewalk-reports-2.7.5.4-2.6.3.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-search-2.7.3.4-2.9.7.noarch",
"product": {
"name": "spacewalk-search-2.7.3.4-2.9.7.noarch",
"product_id": "spacewalk-search-2.7.3.4-2.9.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"product": {
"name": "spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"product_id": "spacewalk-taskomatic-2.7.46.10-2.14.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-utils-2.7.10.6-2.6.3.noarch",
"product": {
"name": "spacewalk-utils-2.7.10.6-2.6.3.noarch",
"product_id": "spacewalk-utils-2.7.10.6-2.6.3.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-schema-3.1.15-2.16.1.noarch",
"product": {
"name": "susemanager-schema-3.1.15-2.16.1.noarch",
"product_id": "susemanager-schema-3.1.15-2.16.1.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-sls-3.1.15-2.16.2.noarch",
"product": {
"name": "susemanager-sls-3.1.15-2.16.2.noarch",
"product_id": "susemanager-sls-3.1.15-2.16.2.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-sync-data-3.1.10-2.14.2.noarch",
"product": {
"name": "susemanager-sync-data-3.1.10-2.14.2.noarch",
"product_id": "susemanager-sync-data-3.1.10-2.14.2.noarch"
}
},
{
"category": "product_version",
"name": "virtual-host-gatherer-1.0.16-2.9.3.noarch",
"product": {
"name": "virtual-host-gatherer-1.0.16-2.9.3.noarch",
"product_id": "virtual-host-gatherer-1.0.16-2.9.3.noarch"
}
},
{
"category": "product_version",
"name": "virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"product": {
"name": "virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"product_id": "virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch"
}
},
{
"category": "product_version",
"name": "virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch",
"product": {
"name": "virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch",
"product_id": "virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"product": {
"name": "spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"product_id": "spacewalk-branding-2.7.2.11-2.12.6.ppc64le"
}
},
{
"category": "product_version",
"name": "susemanager-3.1.12-2.12.3.ppc64le",
"product": {
"name": "susemanager-3.1.12-2.12.3.ppc64le",
"product_id": "susemanager-3.1.12-2.12.3.ppc64le"
}
},
{
"category": "product_version",
"name": "susemanager-tools-3.1.12-2.12.3.ppc64le",
"product": {
"name": "susemanager-tools-3.1.12-2.12.3.ppc64le",
"product_id": "susemanager-tools-3.1.12-2.12.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "spacewalk-branding-2.7.2.11-2.12.6.s390x",
"product": {
"name": "spacewalk-branding-2.7.2.11-2.12.6.s390x",
"product_id": "spacewalk-branding-2.7.2.11-2.12.6.s390x"
}
},
{
"category": "product_version",
"name": "susemanager-3.1.12-2.12.3.s390x",
"product": {
"name": "susemanager-3.1.12-2.12.3.s390x",
"product_id": "susemanager-3.1.12-2.12.3.s390x"
}
},
{
"category": "product_version",
"name": "susemanager-tools-3.1.12-2.12.3.s390x",
"product": {
"name": "susemanager-tools-3.1.12-2.12.3.s390x",
"product_id": "susemanager-tools-3.1.12-2.12.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"product": {
"name": "spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"product_id": "spacewalk-branding-2.7.2.11-2.12.6.x86_64"
}
},
{
"category": "product_version",
"name": "susemanager-3.1.12-2.12.3.x86_64",
"product": {
"name": "susemanager-3.1.12-2.12.3.x86_64",
"product_id": "susemanager-3.1.12-2.12.3.x86_64"
}
},
{
"category": "product_version",
"name": "susemanager-tools-3.1.12-2.12.3.x86_64",
"product": {
"name": "susemanager-tools-3.1.12-2.12.3.x86_64",
"product_id": "susemanager-tools-3.1.12-2.12.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Server 3.1",
"product": {
"name": "SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:3.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nutch-1.0-0.9.6.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch"
},
"product_reference": "nutch-1.0-0.9.6.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osa-common-5.11.80.5-2.9.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch"
},
"product_reference": "osa-common-5.11.80.5-2.9.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osa-dispatcher-5.11.80.5-2.9.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch"
},
"product_reference": "osa-dispatcher-5.11.80.5-2.9.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pxe-default-image-3.1-0.13.3.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch"
},
"product_reference": "pxe-default-image-3.1-0.13.3.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhnlib-2.7.2.2-3.3.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch"
},
"product_reference": "rhnlib-2.7.2.2-3.3.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-2.7.8.9-2.12.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch"
},
"product_reference": "spacecmd-2.7.8.9-2.12.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-app-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-applet-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-iss-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-libs-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-server-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-sql-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-tools-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch"
},
"product_reference": "spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-2.7.1.14-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch"
},
"product_reference": "spacewalk-base-2.7.1.14-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-minimal-2.7.1.14-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch"
},
"product_reference": "spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch"
},
"product_reference": "spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-branding-2.7.2.11-2.12.6.ppc64le as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le"
},
"product_reference": "spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-branding-2.7.2.11-2.12.6.s390x as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x"
},
"product_reference": "spacewalk-branding-2.7.2.11-2.12.6.s390x",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-branding-2.7.2.11-2.12.6.x86_64 as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64"
},
"product_reference": "spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-client-tools-2.7.6.3-3.3.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch"
},
"product_reference": "spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-html-2.7.1.14-2.12.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch"
},
"product_reference": "spacewalk-html-2.7.1.14-2.12.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-2.7.46.10-2.14.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch"
},
"product_reference": "spacewalk-java-2.7.46.10-2.14.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-config-2.7.46.10-2.14.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch"
},
"product_reference": "spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-lib-2.7.46.10-2.14.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch"
},
"product_reference": "spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-oracle-2.7.46.10-2.14.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch"
},
"product_reference": "spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch"
},
"product_reference": "spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-reports-2.7.5.4-2.6.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch"
},
"product_reference": "spacewalk-reports-2.7.5.4-2.6.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-search-2.7.3.4-2.9.7.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch"
},
"product_reference": "spacewalk-search-2.7.3.4-2.9.7.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-taskomatic-2.7.46.10-2.14.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch"
},
"product_reference": "spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-utils-2.7.10.6-2.6.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch"
},
"product_reference": "spacewalk-utils-2.7.10.6-2.6.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-3.1.12-2.12.3.ppc64le as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le"
},
"product_reference": "susemanager-3.1.12-2.12.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-3.1.12-2.12.3.s390x as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x"
},
"product_reference": "susemanager-3.1.12-2.12.3.s390x",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-3.1.12-2.12.3.x86_64 as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64"
},
"product_reference": "susemanager-3.1.12-2.12.3.x86_64",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-schema-3.1.15-2.16.1.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch"
},
"product_reference": "susemanager-schema-3.1.15-2.16.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-sls-3.1.15-2.16.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch"
},
"product_reference": "susemanager-sls-3.1.15-2.16.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-sync-data-3.1.10-2.14.2.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch"
},
"product_reference": "susemanager-sync-data-3.1.10-2.14.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-tools-3.1.12-2.12.3.ppc64le as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le"
},
"product_reference": "susemanager-tools-3.1.12-2.12.3.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-tools-3.1.12-2.12.3.s390x as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x"
},
"product_reference": "susemanager-tools-3.1.12-2.12.3.s390x",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-tools-3.1.12-2.12.3.x86_64 as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64"
},
"product_reference": "susemanager-tools-3.1.12-2.12.3.x86_64",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtual-host-gatherer-1.0.16-2.9.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch"
},
"product_reference": "virtual-host-gatherer-1.0.16-2.9.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch"
},
"product_reference": "virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
},
"product_reference": "virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T13:47:54Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T13:47:54Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Server 3.1:nutch-1.0-0.9.6.2.noarch",
"SUSE Manager Server 3.1:osa-common-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:osa-dispatcher-5.11.80.5-2.9.2.noarch",
"SUSE Manager Server 3.1:pxe-default-image-3.1-0.13.3.3.noarch",
"SUSE Manager Server 3.1:rhnlib-2.7.2.2-3.3.2.noarch",
"SUSE Manager Server 3.1:spacecmd-2.7.8.9-2.12.2.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.11-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.ppc64le",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.s390x",
"SUSE Manager Server 3.1:spacewalk-branding-2.7.2.11-2.12.6.x86_64",
"SUSE Manager Server 3.1:spacewalk-client-tools-2.7.6.3-3.3.3.noarch",
"SUSE Manager Server 3.1:spacewalk-html-2.7.1.14-2.12.3.noarch",
"SUSE Manager Server 3.1:spacewalk-java-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-reports-2.7.5.4-2.6.3.noarch",
"SUSE Manager Server 3.1:spacewalk-search-2.7.3.4-2.9.7.noarch",
"SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.10-2.14.2.noarch",
"SUSE Manager Server 3.1:spacewalk-utils-2.7.10.6-2.6.3.noarch",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:susemanager-schema-3.1.15-2.16.1.noarch",
"SUSE Manager Server 3.1:susemanager-sls-3.1.15-2.16.2.noarch",
"SUSE Manager Server 3.1:susemanager-sync-data-3.1.10-2.14.2.noarch",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.ppc64le",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.s390x",
"SUSE Manager Server 3.1:susemanager-tools-3.1.12-2.12.3.x86_64",
"SUSE Manager Server 3.1:virtual-host-gatherer-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-Kubernetes-1.0.16-2.9.3.noarch",
"SUSE Manager Server 3.1:virtual-host-gatherer-VMware-1.0.16-2.9.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-08T13:47:54Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
}
]
}
SUSE-SU-2018:1699-2
Vulnerability from csaf_suse - Published: 2018-10-18 12:46 - Updated: 2018-10-18 12:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes several issues.\n\nThis feature was added:\n\n- Added support for qemu monitor command \n\nThese security issues were fixed:\n\n- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).\n- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).\n\nThis non-security issue was fixed:\n\n- bsc#1086039 - Dom0 does not represent DomU cpu flags\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-1142",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1699-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1699-2",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181699-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1699-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1086039",
"url": "https://bugzilla.suse.com/1086039"
},
{
"category": "self",
"summary": "SUSE Bug 1092631",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-10-18T12:46:29Z",
"generator": {
"date": "2018-10-18T12:46:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1699-2",
"initial_release_date": "2018-10-18T12:46:29Z",
"revision_history": [
{
"date": "2018-10-18T12:46:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-doc-html-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-libs-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-libs-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-tools-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-tools-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-tools-domU-4.7.5_04-43.33.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:46:29Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:46:29Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:46:29Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:46:29Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:0838-1
Vulnerability from csaf_suse - Published: 2018-03-29 06:32 - Updated: 2018-03-29 06:32Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2017-5715: Fixes for speculative side channel attacks aka \u0027SpectreAttack\u0027 (var2) (bsc#1079869).\n- CVE-2018-1064: Fixed denial of service when reading from guest agent (bsc#1083625).\n- CVE-2018-5748: Fixed possible denial of service when reading from QEMU monitor (bsc#1076500).\n\n\nNon-security issues fixed:\n\n- bsc#1083061: Fixed \u0027dumpxml --migratable\u0027 exports domain id in output on SLES11 SP4.\n- bsc#1055365: Improve performance when listing hundreds of interfaces. \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-libvirt-13538,slessp4-libvirt-13538",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0838-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0838-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180838-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0838-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003852.html"
},
{
"category": "self",
"summary": "SUSE Bug 1055365",
"url": "https://bugzilla.suse.com/1055365"
},
{
"category": "self",
"summary": "SUSE Bug 1076500",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "self",
"summary": "SUSE Bug 1079869",
"url": "https://bugzilla.suse.com/1079869"
},
{
"category": "self",
"summary": "SUSE Bug 1083061",
"url": "https://bugzilla.suse.com/1083061"
},
{
"category": "self",
"summary": "SUSE Bug 1083625",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1064 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5748 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5748/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-03-29T06:32:22Z",
"generator": {
"date": "2018-03-29T06:32:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0838-1",
"initial_release_date": "2018-03-29T06:32:22Z",
"revision_history": [
{
"date": "2018-03-29T06:32:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-1.2.5-23.6.1.i586",
"product": {
"name": "libvirt-devel-1.2.5-23.6.1.i586",
"product_id": "libvirt-devel-1.2.5-23.6.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-1.2.5-23.6.1.i586",
"product": {
"name": "libvirt-1.2.5-23.6.1.i586",
"product_id": "libvirt-1.2.5-23.6.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-23.6.1.i586",
"product": {
"name": "libvirt-client-1.2.5-23.6.1.i586",
"product_id": "libvirt-client-1.2.5-23.6.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-23.6.1.i586",
"product": {
"name": "libvirt-doc-1.2.5-23.6.1.i586",
"product_id": "libvirt-doc-1.2.5-23.6.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"product_id": "libvirt-lock-sanlock-1.2.5-23.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-1.2.5-23.6.1.ia64",
"product": {
"name": "libvirt-devel-1.2.5-23.6.1.ia64",
"product_id": "libvirt-devel-1.2.5-23.6.1.ia64"
}
},
{
"category": "product_version",
"name": "libvirt-1.2.5-23.6.1.ia64",
"product": {
"name": "libvirt-1.2.5-23.6.1.ia64",
"product_id": "libvirt-1.2.5-23.6.1.ia64"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-23.6.1.ia64",
"product": {
"name": "libvirt-client-1.2.5-23.6.1.ia64",
"product_id": "libvirt-client-1.2.5-23.6.1.ia64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-23.6.1.ia64",
"product": {
"name": "libvirt-doc-1.2.5-23.6.1.ia64",
"product_id": "libvirt-doc-1.2.5-23.6.1.ia64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"product_id": "libvirt-lock-sanlock-1.2.5-23.6.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-1.2.5-23.6.1.ppc64",
"product": {
"name": "libvirt-devel-1.2.5-23.6.1.ppc64",
"product_id": "libvirt-devel-1.2.5-23.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "libvirt-1.2.5-23.6.1.ppc64",
"product": {
"name": "libvirt-1.2.5-23.6.1.ppc64",
"product_id": "libvirt-1.2.5-23.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-23.6.1.ppc64",
"product": {
"name": "libvirt-client-1.2.5-23.6.1.ppc64",
"product_id": "libvirt-client-1.2.5-23.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"product": {
"name": "libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"product_id": "libvirt-client-32bit-1.2.5-23.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-23.6.1.ppc64",
"product": {
"name": "libvirt-doc-1.2.5-23.6.1.ppc64",
"product_id": "libvirt-doc-1.2.5-23.6.1.ppc64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"product_id": "libvirt-lock-sanlock-1.2.5-23.6.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-1.2.5-23.6.1.s390x",
"product": {
"name": "libvirt-devel-1.2.5-23.6.1.s390x",
"product_id": "libvirt-devel-1.2.5-23.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-1.2.5-23.6.1.s390x",
"product": {
"name": "libvirt-1.2.5-23.6.1.s390x",
"product_id": "libvirt-1.2.5-23.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-23.6.1.s390x",
"product": {
"name": "libvirt-client-1.2.5-23.6.1.s390x",
"product_id": "libvirt-client-1.2.5-23.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-32bit-1.2.5-23.6.1.s390x",
"product": {
"name": "libvirt-client-32bit-1.2.5-23.6.1.s390x",
"product_id": "libvirt-client-32bit-1.2.5-23.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-23.6.1.s390x",
"product": {
"name": "libvirt-doc-1.2.5-23.6.1.s390x",
"product_id": "libvirt-doc-1.2.5-23.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"product_id": "libvirt-lock-sanlock-1.2.5-23.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-1.2.5-23.6.1.x86_64",
"product": {
"name": "libvirt-devel-1.2.5-23.6.1.x86_64",
"product_id": "libvirt-devel-1.2.5-23.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-devel-32bit-1.2.5-23.6.1.x86_64",
"product": {
"name": "libvirt-devel-32bit-1.2.5-23.6.1.x86_64",
"product_id": "libvirt-devel-32bit-1.2.5-23.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-1.2.5-23.6.1.x86_64",
"product": {
"name": "libvirt-1.2.5-23.6.1.x86_64",
"product_id": "libvirt-1.2.5-23.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-23.6.1.x86_64",
"product": {
"name": "libvirt-client-1.2.5-23.6.1.x86_64",
"product_id": "libvirt-client-1.2.5-23.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"product": {
"name": "libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"product_id": "libvirt-client-32bit-1.2.5-23.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-23.6.1.x86_64",
"product": {
"name": "libvirt-doc-1.2.5-23.6.1.x86_64",
"product_id": "libvirt-doc-1.2.5-23.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"product_id": "libvirt-lock-sanlock-1.2.5-23.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-1.2.5-23.6.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.i586"
},
"product_reference": "libvirt-devel-1.2.5-23.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-1.2.5-23.6.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ia64"
},
"product_reference": "libvirt-devel-1.2.5-23.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-1.2.5-23.6.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ppc64"
},
"product_reference": "libvirt-devel-1.2.5-23.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-1.2.5-23.6.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.s390x"
},
"product_reference": "libvirt-devel-1.2.5-23.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-1.2.5-23.6.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.x86_64"
},
"product_reference": "libvirt-devel-1.2.5-23.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-32bit-1.2.5-23.6.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-32bit-1.2.5-23.6.1.x86_64"
},
"product_reference": "libvirt-devel-32bit-1.2.5-23.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.i586"
},
"product_reference": "libvirt-1.2.5-23.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.6.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ia64"
},
"product_reference": "libvirt-1.2.5-23.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ppc64"
},
"product_reference": "libvirt-1.2.5-23.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.s390x"
},
"product_reference": "libvirt-1.2.5-23.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.x86_64"
},
"product_reference": "libvirt-1.2.5-23.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.i586"
},
"product_reference": "libvirt-client-1.2.5-23.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.6.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ia64"
},
"product_reference": "libvirt-client-1.2.5-23.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64"
},
"product_reference": "libvirt-client-1.2.5-23.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.s390x"
},
"product_reference": "libvirt-client-1.2.5-23.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64"
},
"product_reference": "libvirt-client-1.2.5-23.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.2.5-23.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64"
},
"product_reference": "libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.2.5-23.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x"
},
"product_reference": "libvirt-client-32bit-1.2.5-23.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.2.5-23.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64"
},
"product_reference": "libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.i586"
},
"product_reference": "libvirt-doc-1.2.5-23.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.6.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64"
},
"product_reference": "libvirt-doc-1.2.5-23.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64"
},
"product_reference": "libvirt-doc-1.2.5-23.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x"
},
"product_reference": "libvirt-doc-1.2.5-23.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64"
},
"product_reference": "libvirt-doc-1.2.5-23.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.6.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.i586"
},
"product_reference": "libvirt-1.2.5-23.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.6.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ia64"
},
"product_reference": "libvirt-1.2.5-23.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.6.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ppc64"
},
"product_reference": "libvirt-1.2.5-23.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.s390x"
},
"product_reference": "libvirt-1.2.5-23.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.x86_64"
},
"product_reference": "libvirt-1.2.5-23.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.6.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.i586"
},
"product_reference": "libvirt-client-1.2.5-23.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.6.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ia64"
},
"product_reference": "libvirt-client-1.2.5-23.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.6.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64"
},
"product_reference": "libvirt-client-1.2.5-23.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.s390x"
},
"product_reference": "libvirt-client-1.2.5-23.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64"
},
"product_reference": "libvirt-client-1.2.5-23.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.2.5-23.6.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64"
},
"product_reference": "libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.2.5-23.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x"
},
"product_reference": "libvirt-client-32bit-1.2.5-23.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.2.5-23.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64"
},
"product_reference": "libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.6.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.i586"
},
"product_reference": "libvirt-doc-1.2.5-23.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.6.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64"
},
"product_reference": "libvirt-doc-1.2.5-23.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.6.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64"
},
"product_reference": "libvirt-doc-1.2.5-23.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x"
},
"product_reference": "libvirt-doc-1.2.5-23.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64"
},
"product_reference": "libvirt-doc-1.2.5-23.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-32bit-1.2.5-23.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-32bit-1.2.5-23.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-32bit-1.2.5-23.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-29T06:32:22Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1064"
}
],
"notes": [
{
"category": "general",
"text": "libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-32bit-1.2.5-23.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1064",
"url": "https://www.suse.com/security/cve/CVE-2018-1064"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1088147"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-32bit-1.2.5-23.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-32bit-1.2.5-23.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-29T06:32:22Z",
"details": "moderate"
}
],
"title": "CVE-2018-1064"
},
{
"cve": "CVE-2018-5748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5748"
}
],
"notes": [
{
"category": "general",
"text": "qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-32bit-1.2.5-23.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5748",
"url": "https://www.suse.com/security/cve/CVE-2018-5748"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1087887"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-32bit-1.2.5-23.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-32bit-1.2.5-23.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-03-29T06:32:22Z",
"details": "low"
}
],
"title": "CVE-2018-5748"
}
]
}
SUSE-SU-2018:0180-1
Vulnerability from csaf_suse - Published: 2018-01-23 12:59 - Updated: 2018-01-23 12:59Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP4 realtime kernel was updated to receive\nvarious security and bugfixes.\n\nThis update adds mitigations for various side channel attacks against\nmodern CPUs that could disclose content of otherwise unreadable memory\n(bnc#1068032).\n\n- CVE-2017-5753: Local attackers on systems with modern CPUs featuring\n deep instruction pipelining could use attacker controllable speculative\n execution over code patterns in the Linux Kernel to leak content from\n otherwise not readable memory in the same address space, allowing\n retrieval of passwords, cryptographic keys and other secrets.\n\n This problem is mitigated by adding speculative fencing on affected\n code paths throughout the Linux kernel.\n\n- CVE-2017-5715: Local attackers on systems with modern CPUs featuring\n branch prediction could use mispredicted branches to speculatively execute\n code patterns that in turn could be made to leak other non-readable\n content in the same address space, an attack similar to CVE-2017-5753.\n\n This problem is mitigated by disabling predictive branches, depending\n on CPU architecture either by firmware updates and/or fixes in the\n user-kernel privilege boundaries.\n\n This is done with help of Linux Kernel fixes on the Intel/AMD x86_64\n architectures.\n On x86_64, this requires also updates of the CPU microcode packages,\n delivered in seperate updates.\n\n As this feature can have a performance impact, it can be disabled\n using the \u0027nospec\u0027 kernel commandline option.\n\n\n- CVE-2017-5754: Local attackers on systems with modern CPUs featuring\n deep instruction pipelining could use code patterns in userspace to\n speculative executive code that would read otherwise read protected\n memory, an attack similar to CVE-2017-5753.\n\n This problem is mitigated by unmapping the Linux Kernel from the user\n address space during user code execution, following a approach called\n \u0027KAISER\u0027. The terms used here are \u0027KAISER\u0027 / \u0027Kernel Address Isolation\u0027\n and \u0027PTI\u0027 / \u0027Page Table Isolation\u0027.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).\n- CVE-2017-13167: An elevation of privilege vulnerability in the kernel sound timer was fixed. (bnc#1072876).\n- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).\n- CVE-2017-15102: The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel allowed local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference (bnc#1066705).\n- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).\n- CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel did not ensure that an l2cap socket is available, which allowed local users to gain privileges via a crafted application (bnc#1071470).\n- CVE-2017-16525: The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup (bnc#1066618).\n- CVE-2017-16527: sound/usb/mixer.c in the Linux kernel allowed local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066625).\n- CVE-2017-16529: The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066650).\n- CVE-2017-16531: drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor (bnc#1066671).\n- CVE-2017-16534: The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066693).\n- CVE-2017-16535: The usb_get_bos_descriptor function in drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066700).\n- CVE-2017-16536: The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066606).\n- CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066573).\n- CVE-2017-16538: drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel allowed local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner) (bnc#1066569).\n- CVE-2017-16649: The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel allowed local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067085).\n- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).\n- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695).\n- CVE-2017-17558: The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel did not consider the maximum number of configurations and interfaces before attempting to release resources, which allowed local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device (bnc#1072561).\n- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).\n- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).\n- CVE-2017-7472: The KEYS subsystem in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).\n- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).\n\nThe following non-security bugs were fixed:\n\n- Add upstream RT preemption points to block/blk-iopoll.c and net/core/dev.c\n- adm80211: return an error if adm8211_alloc_rings() fails (bsc#1048185).\n- alsa: core: Fix unexpected error at replacing user TLV (bsc#1045538).\n- alsa: hda/ca0132 - Fix memory leak at error path (bsc#1045538).\n- alsa: timer: Add missing mutex lock for compat ioctls (bsc#1045538).\n- asm alternatives: remove incorrect alignment notes.\n- audit: Fix use after free in audit_remove_watch_rule() (bsc#1045205).\n- autofs: do not fail mount for transient error (bsc#1065180).\n- autofs: fix careless error in recent commit (bsc#1065180).\n- blacklist.conf: Add PCI ASPM fix to blacklist (bsc#1045538)\n- blacklist.conf: Blacklisted commit 2b1be689f3aadcfe0 (\u0027printk/console: Always disable boot consoles that use init memory before it is freed\u0027)\n- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).\n- carl9170: prevent speculative execution (bnc#1068032).\n- dm bufio: fix integer overflow when limiting maximum cache size (git-fixes).\n- ecryptfs: fix dereference of NULL user_key_payload (bsc#1013018).\n- eCryptfs: use after free in ecryptfs_release_messaging() (bsc#1013018).\n- fnic: Use the local variable instead of I/O flag to acquire io_req_lock in fnic_queuecommand() to avoid deadloack (bsc#1067816).\n- fs/9p: Compare qid.path in v9fs_test_inode (bsc#1013018).\n- fs-cache: fix dereference of NULL user_key_payload (git-fixes).\n- fs: prevent speculative execution (bnc#1068032). [jkosina@suse.cz: hack around kABI; this should be done in separate patch in patches.kabi eventually]\n- isa: Prevent NULL dereference in isa_bus driver callbacks (bsc#1045538).\n- kabi fix for new hash_cred function (bsc#1012917).\n- kabi: silence spurious kabi error in net/sctp/socket.c (bsc#1068671).\n- kaiser: add \u0027nokaiser\u0027 boot option, using ALTERNATIVE.\n- kaiser: fix ldt freeing.\n- kaiser: Kernel Address Isolation.\n- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.\n- kaiser: work around kABI.\n- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).\n- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).\n- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).\n- lpfc: check for valid scsi cmnd in lpfc_scsi_cmd_iocb_cmpl() (bsc#1051133).\n- mac80211: do not compare TKIP TX MIC key in reinstall prevention (bsc#1066472).\n- media: cx231xx-cards: fix NULL-deref at probe (bsc#1050431).\n- mm/madvise.c: fix madvise() infinite loop under special circumstances (bnc#1070964).\n- mm/mmu_context, sched/core: Fix mmu_context.h assumption.\n- nfs: Fix ugly referral attributes (git-fixes).\n- nfs: improve shinking of access cache (bsc#1012917).\n- p54: prevent speculative execution (bnc#1068032).\n- powerpc/barrier: add gmb.\n- powerpc: Correct instruction code for xxlor instruction (bsc#1064861, git-fixes).\n- powerpc: Fix emulation of mfocrf in emulate_step() (bsc#1064861, git-fixes).\n- powerpc/mm: Fix check of multiple 16G pages from device tree (bsc#1064861, git-fixes).\n- powerpc/pseries/vio: Dispose of virq mapping on vdevice unregister (bsc#1067888, git-fixes f2ab6219969f).\n- powerpc-rfi-flush.patch: disable due to boot failure\n- powerpc: Secure memory rfi flush (bsc#1068032).\n- pti: unbreak EFI (bsc#1074709).\n- ptrace: Add a new thread access check (bsc#1068032).\n- qeth: check not more than 16 SBALEs on the completion queue (bnc#1072457, LTC#148203).\n- Revert \u0027mac80211: accept key reinstall without changing anything\u0027\n- s390: add ppa to system call and program check path (bsc#1068032).\n- s390/disassembler: correct disassembly lines alignment (bnc#1066973, LTC#161577).\n- s390/disassembler: increase show_code buffer size (bnc#1066973, LTC#161577).\n- s390: fix transactional execution control register handling (bnc#1072457, LTC#162116).\n- s390: introduce CPU alternatives.\n- s390: introduce CPU alternatives (bsc#1068032).\n- s390/spinlock: add gmb memory barrier.\n- s390/spinlock: add gmb memory barrier (bsc#1068032).\n- s390/spinlock: add ppa to system call path.\n- sched/core: Add switch_mm_irqs_off() and use it in the scheduler.\n- sched/core: Idle_task_exit() shouldn\u0027t use switch_mm_irqs_off().\n- scsi_scan: Exit loop if TUR to LUN0 fails with 0x05/0x25 (bsc#1063043). This is specific to FUJITSU ETERNUS_DX* targets. They can return \u0027Illegal Request - Logical unit not supported\u0027 and processing should leave the timeout loop in this case.\n- scsi: zfcp: fix erp_action use-before-initialize in REC action trace (bnc#1066973, LTC#160081).\n- sunrpc: add auth_unix hash_cred() function (bsc#1012917).\n- sunrpc: add generic_auth hash_cred() function (bsc#1012917).\n- sunrpc: add hash_cred() function to rpc_authops struct (bsc#1012917).\n- sunrpc: add RPCSEC_GSS hash_cred() function (bsc#1012917).\n- sunrpc: replace generic auth_cred hash with auth-specific function (bsc#1012917).\n- sunrpc: use supplimental groups in auth hash (bsc#1012917).\n- temporary fix (bsc#1068032).\n- udf: prevent speculative execution (bnc#1068032).\n- usb: host: fix incorrect updating of offset (bsc#1047487).\n- usb-serial: check for NULL private data in pl2303_suse_disconnect (bsc#1064803).\n- usb: uas: fix bug in handling of alternate settings (bsc#1071074).\n- uvcvideo: prevent speculative execution (bnc#1068032).\n- video: udlfb: Fix read EDID timeout (bsc#1045538).\n- watchdog: hpwdt: add support for iLO5 (bsc#1024612).\n- watchdog/hpwdt: Check source of NMI (bsc#1024612).\n- x86-64: Give vvars their own page.\n- x86-64: Map the HPET NX.\n- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).\n- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).\n- x86/alternatives: Add instruction padding.\n- x86/alternatives: Cleanup DPRINTK macro.\n- x86/alternatives: Make JMPs more robust.\n- x86/alternatives: Use optimized NOPs for padding.\n- x86/boot: Add early cmdline parsing for options with arguments.\n- x86, boot: Carve out early cmdline parsing function.\n- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).\n- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).\n- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).\n- x86/CPU: Check speculation control CPUID bit (bsc#1068032).\n- x86/cpu: Fix bootup crashes by sanitizing the argument of the \u0027clearcpuid=\u0027 command-line option (bsc#1065600).\n- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).\n- x86/entry: Add a function to overwrite the RSB (bsc#1068032).\n- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).\n- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).\n- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).\n- x86/idle: Toggle IBRS when going idle (bsc#1068032).\n- x86/kaiser: Check boottime cmdline params.\n- x86/kaiser: disable vmstat accounting.\n- x86/kaiser: Move feature detection up (bsc#1068032).\n- x86/kaiser: propagate info to /proc/cpuinfo.\n- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.\n- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).\n- x86/kvm: Flush IBP when switching VMs (bsc#1068032).\n- x86/kvm: Pad RSB on VM transition (bsc#1068032).\n- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).\n- x86: Make alternative instruction pointers relative.\n- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).\n- x86/microcode/intel: Disable late loading on model 79 (bsc#1054305).\n- x86/mm/64: Fix reboot interaction with CR4.PCIDE.\n- x86/mm: Add a \u0027noinvpcid\u0027 boot option to turn off INVPCID.\n- x86/mm: Add INVPCID helpers.\n- x86/mm: Add the \u0027nopcid\u0027 boot option to turn off PCID.\n- x86/mm: Build arch/x86/mm/tlb.c even on !SMP.\n- x86/mm: Disable PCID on 32-bit kernels.\n- x86/mm: Enable CR4.PCIDE on supported systems.\n- x86/mm: fix bad backport to disable PCID on Xen.\n- x86/mm: Fix INVPCID asm constraint.\n- x86/mm: If INVPCID is available, use it to flush global mappings.\n- x86/mm/kaiser: re-enable vsyscalls.\n- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).\n- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.\n- x86/mm, sched/core: Turn off IRQs in switch_mm().\n- x86/mm, sched/core: Uninline switch_mm().\n- x86/mm: Set IBPB upon context switch (bsc#1068032).\n- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).\n- x86/spec: Add IBRS control functions (bsc#1068032).\n- x86/spec: Add \u0027nospec\u0027 chicken bit (bsc#1068032).\n- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).\n- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).\n- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).\n- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).\n- x86/svm: Add code to clear registers on VM exit (bsc#1068032).\n- x86/svm: Clobber the RSB on VM exit (bsc#1068032).\n- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).\n- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).\n- xen/kaiser: add \u0027nokaiser\u0027 boot option, using ALTERNATIVE.\n- xen/KAISER: Kernel Address Isolation.\n- xen/kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.\n- xen/kaiser: work around kABI.\n- xen/x86-64: Give vvars their own page.\n- xen/x86-64: Map the HPET NX.\n- xen/x86/alternatives: Add instruction padding.\n- xen/x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.\n- xen/x86/mm: Enable CR4.PCIDE on supported systems.\n- xen/x86/mm/kaiser: re-enable vsyscalls.\n- xen/x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.\n- xen: x86/mm, sched/core: Turn off IRQs in switch_mm().\n- xen: x86/mm, sched/core: Uninline switch_mm().\n- zd1211rw: fix NULL-deref at probe (bsc#1045479).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slertesp4-kernel-rt-20180111-13432",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0180-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0180-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180180-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0180-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012917",
"url": "https://bugzilla.suse.com/1012917"
},
{
"category": "self",
"summary": "SUSE Bug 1013018",
"url": "https://bugzilla.suse.com/1013018"
},
{
"category": "self",
"summary": "SUSE Bug 1024612",
"url": "https://bugzilla.suse.com/1024612"
},
{
"category": "self",
"summary": "SUSE Bug 1034862",
"url": "https://bugzilla.suse.com/1034862"
},
{
"category": "self",
"summary": "SUSE Bug 1045205",
"url": "https://bugzilla.suse.com/1045205"
},
{
"category": "self",
"summary": "SUSE Bug 1045479",
"url": "https://bugzilla.suse.com/1045479"
},
{
"category": "self",
"summary": "SUSE Bug 1045538",
"url": "https://bugzilla.suse.com/1045538"
},
{
"category": "self",
"summary": "SUSE Bug 1047487",
"url": "https://bugzilla.suse.com/1047487"
},
{
"category": "self",
"summary": "SUSE Bug 1048185",
"url": "https://bugzilla.suse.com/1048185"
},
{
"category": "self",
"summary": "SUSE Bug 1050231",
"url": "https://bugzilla.suse.com/1050231"
},
{
"category": "self",
"summary": "SUSE Bug 1050431",
"url": "https://bugzilla.suse.com/1050431"
},
{
"category": "self",
"summary": "SUSE Bug 1051133",
"url": "https://bugzilla.suse.com/1051133"
},
{
"category": "self",
"summary": "SUSE Bug 1054305",
"url": "https://bugzilla.suse.com/1054305"
},
{
"category": "self",
"summary": "SUSE Bug 1056982",
"url": "https://bugzilla.suse.com/1056982"
},
{
"category": "self",
"summary": "SUSE Bug 1063043",
"url": "https://bugzilla.suse.com/1063043"
},
{
"category": "self",
"summary": "SUSE Bug 1064803",
"url": "https://bugzilla.suse.com/1064803"
},
{
"category": "self",
"summary": "SUSE Bug 1064861",
"url": "https://bugzilla.suse.com/1064861"
},
{
"category": "self",
"summary": "SUSE Bug 1065180",
"url": "https://bugzilla.suse.com/1065180"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1066471",
"url": "https://bugzilla.suse.com/1066471"
},
{
"category": "self",
"summary": "SUSE Bug 1066472",
"url": "https://bugzilla.suse.com/1066472"
},
{
"category": "self",
"summary": "SUSE Bug 1066569",
"url": "https://bugzilla.suse.com/1066569"
},
{
"category": "self",
"summary": "SUSE Bug 1066573",
"url": "https://bugzilla.suse.com/1066573"
},
{
"category": "self",
"summary": "SUSE Bug 1066606",
"url": "https://bugzilla.suse.com/1066606"
},
{
"category": "self",
"summary": "SUSE Bug 1066618",
"url": "https://bugzilla.suse.com/1066618"
},
{
"category": "self",
"summary": "SUSE Bug 1066625",
"url": "https://bugzilla.suse.com/1066625"
},
{
"category": "self",
"summary": "SUSE Bug 1066650",
"url": "https://bugzilla.suse.com/1066650"
},
{
"category": "self",
"summary": "SUSE Bug 1066671",
"url": "https://bugzilla.suse.com/1066671"
},
{
"category": "self",
"summary": "SUSE Bug 1066693",
"url": "https://bugzilla.suse.com/1066693"
},
{
"category": "self",
"summary": "SUSE Bug 1066700",
"url": "https://bugzilla.suse.com/1066700"
},
{
"category": "self",
"summary": "SUSE Bug 1066705",
"url": "https://bugzilla.suse.com/1066705"
},
{
"category": "self",
"summary": "SUSE Bug 1066973",
"url": "https://bugzilla.suse.com/1066973"
},
{
"category": "self",
"summary": "SUSE Bug 1067085",
"url": "https://bugzilla.suse.com/1067085"
},
{
"category": "self",
"summary": "SUSE Bug 1067816",
"url": "https://bugzilla.suse.com/1067816"
},
{
"category": "self",
"summary": "SUSE Bug 1067888",
"url": "https://bugzilla.suse.com/1067888"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068671",
"url": "https://bugzilla.suse.com/1068671"
},
{
"category": "self",
"summary": "SUSE Bug 1068984",
"url": "https://bugzilla.suse.com/1068984"
},
{
"category": "self",
"summary": "SUSE Bug 1069702",
"url": "https://bugzilla.suse.com/1069702"
},
{
"category": "self",
"summary": "SUSE Bug 1070771",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "self",
"summary": "SUSE Bug 1070964",
"url": "https://bugzilla.suse.com/1070964"
},
{
"category": "self",
"summary": "SUSE Bug 1071074",
"url": "https://bugzilla.suse.com/1071074"
},
{
"category": "self",
"summary": "SUSE Bug 1071470",
"url": "https://bugzilla.suse.com/1071470"
},
{
"category": "self",
"summary": "SUSE Bug 1071695",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "self",
"summary": "SUSE Bug 1072457",
"url": "https://bugzilla.suse.com/1072457"
},
{
"category": "self",
"summary": "SUSE Bug 1072561",
"url": "https://bugzilla.suse.com/1072561"
},
{
"category": "self",
"summary": "SUSE Bug 1072876",
"url": "https://bugzilla.suse.com/1072876"
},
{
"category": "self",
"summary": "SUSE Bug 1073792",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "self",
"summary": "SUSE Bug 1073874",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "self",
"summary": "SUSE Bug 1074709",
"url": "https://bugzilla.suse.com/1074709"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11600 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13167 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14106 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15102 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15115 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15868 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16525 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16525/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16527 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16527/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16529 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16529/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16531 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16531/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16534 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16534/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16535 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16535/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16536 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16536/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16537 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16538 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16538/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16649 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16649/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16939 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16939/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17558 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17805 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17806 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7472 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7472/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8824 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8824/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-01-23T12:59:47Z",
"generator": {
"date": "2018-01-23T12:59:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0180-1",
"initial_release_date": "2018-01-23T12:59:47Z",
"revision_history": [
{
"date": "2018-01-23T12:59:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"product": {
"name": "kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"product_id": "kernel-rt-3.0.101.rt130-69.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"product": {
"name": "kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"product_id": "kernel-rt-base-3.0.101.rt130-69.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"product": {
"name": "kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"product_id": "kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"product": {
"name": "kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"product_id": "kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"product": {
"name": "kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"product_id": "kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"product": {
"name": "kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"product_id": "kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"product": {
"name": "kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"product_id": "kernel-source-rt-3.0.101.rt130-69.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64",
"product": {
"name": "kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64",
"product_id": "kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-3.0.101.rt130-69.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64"
},
"product_reference": "kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-3.0.101.rt130-69.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64"
},
"product_reference": "kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64"
},
"product_reference": "kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64"
},
"product_reference": "kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64"
},
"product_reference": "kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64"
},
"product_reference": "kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-3.0.101.rt130-69.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64"
},
"product_reference": "kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
},
"product_reference": "kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-11600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11600"
}
],
"notes": [
{
"category": "general",
"text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11600",
"url": "https://www.suse.com/security/cve/CVE-2017-11600"
},
{
"category": "external",
"summary": "SUSE Bug 1050231 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1050231"
},
{
"category": "external",
"summary": "SUSE Bug 1096564 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1096564"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "important"
}
],
"title": "CVE-2017-11600"
},
{
"cve": "CVE-2017-13167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13167"
}
],
"notes": [
{
"category": "general",
"text": "An elevation of privilege vulnerability in the kernel sound timer. Product: Android. Versions: Android kernel. Android ID A-37240993.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13167",
"url": "https://www.suse.com/security/cve/CVE-2017-13167"
},
{
"category": "external",
"summary": "SUSE Bug 1072876 for CVE-2017-13167",
"url": "https://bugzilla.suse.com/1072876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "low"
}
],
"title": "CVE-2017-13167"
},
{
"cve": "CVE-2017-14106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14106"
}
],
"notes": [
{
"category": "general",
"text": "The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14106",
"url": "https://www.suse.com/security/cve/CVE-2017-14106"
},
{
"category": "external",
"summary": "SUSE Bug 1056982 for CVE-2017-14106",
"url": "https://bugzilla.suse.com/1056982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-14106"
},
{
"cve": "CVE-2017-15102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15102"
}
],
"notes": [
{
"category": "general",
"text": "The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel before 4.8.1 allows local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15102",
"url": "https://www.suse.com/security/cve/CVE-2017-15102"
},
{
"category": "external",
"summary": "SUSE Bug 1066705 for CVE-2017-15102",
"url": "https://bugzilla.suse.com/1066705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-15102"
},
{
"cve": "CVE-2017-15115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15115"
}
],
"notes": [
{
"category": "general",
"text": "The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15115",
"url": "https://www.suse.com/security/cve/CVE-2017-15115"
},
{
"category": "external",
"summary": "SUSE Bug 1068671 for CVE-2017-15115",
"url": "https://bugzilla.suse.com/1068671"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15115",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-15115"
},
{
"cve": "CVE-2017-15868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15868"
}
],
"notes": [
{
"category": "general",
"text": "The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel before 3.19 does not ensure that an l2cap socket is available, which allows local users to gain privileges via a crafted application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15868",
"url": "https://www.suse.com/security/cve/CVE-2017-15868"
},
{
"category": "external",
"summary": "SUSE Bug 1071470 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1071470"
},
{
"category": "external",
"summary": "SUSE Bug 1071471 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1071471"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "important"
}
],
"title": "CVE-2017-15868"
},
{
"cve": "CVE-2017-16525",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16525"
}
],
"notes": [
{
"category": "general",
"text": "The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16525",
"url": "https://www.suse.com/security/cve/CVE-2017-16525"
},
{
"category": "external",
"summary": "SUSE Bug 1066618 for CVE-2017-16525",
"url": "https://bugzilla.suse.com/1066618"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16525",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-16525"
},
{
"cve": "CVE-2017-16527",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16527"
}
],
"notes": [
{
"category": "general",
"text": "sound/usb/mixer.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16527",
"url": "https://www.suse.com/security/cve/CVE-2017-16527"
},
{
"category": "external",
"summary": "SUSE Bug 1066625 for CVE-2017-16527",
"url": "https://bugzilla.suse.com/1066625"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16527",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16527",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-16527"
},
{
"cve": "CVE-2017-16529",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16529"
}
],
"notes": [
{
"category": "general",
"text": "The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16529",
"url": "https://www.suse.com/security/cve/CVE-2017-16529"
},
{
"category": "external",
"summary": "SUSE Bug 1066650 for CVE-2017-16529",
"url": "https://bugzilla.suse.com/1066650"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16529",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16529",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-16529"
},
{
"cve": "CVE-2017-16531",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16531"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/core/config.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16531",
"url": "https://www.suse.com/security/cve/CVE-2017-16531"
},
{
"category": "external",
"summary": "SUSE Bug 1066671 for CVE-2017-16531",
"url": "https://bugzilla.suse.com/1066671"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16531",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16531",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-16531"
},
{
"cve": "CVE-2017-16534",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16534"
}
],
"notes": [
{
"category": "general",
"text": "The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16534",
"url": "https://www.suse.com/security/cve/CVE-2017-16534"
},
{
"category": "external",
"summary": "SUSE Bug 1066693 for CVE-2017-16534",
"url": "https://bugzilla.suse.com/1066693"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16534",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-16534"
},
{
"cve": "CVE-2017-16535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16535"
}
],
"notes": [
{
"category": "general",
"text": "The usb_get_bos_descriptor function in drivers/usb/core/config.c in the Linux kernel before 4.13.10 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16535",
"url": "https://www.suse.com/security/cve/CVE-2017-16535"
},
{
"category": "external",
"summary": "SUSE Bug 1066700 for CVE-2017-16535",
"url": "https://bugzilla.suse.com/1066700"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16535",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16535",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-16535"
},
{
"cve": "CVE-2017-16536",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16536"
}
],
"notes": [
{
"category": "general",
"text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16536",
"url": "https://www.suse.com/security/cve/CVE-2017-16536"
},
{
"category": "external",
"summary": "SUSE Bug 1066606 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1066606"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-16536"
},
{
"cve": "CVE-2017-16537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16537"
}
],
"notes": [
{
"category": "general",
"text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16537",
"url": "https://www.suse.com/security/cve/CVE-2017-16537"
},
{
"category": "external",
"summary": "SUSE Bug 1066573 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1066573"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-16537"
},
{
"cve": "CVE-2017-16538",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16538"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16538",
"url": "https://www.suse.com/security/cve/CVE-2017-16538"
},
{
"category": "external",
"summary": "SUSE Bug 1066569 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1066569"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-16538"
},
{
"cve": "CVE-2017-16649",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16649"
}
],
"notes": [
{
"category": "general",
"text": "The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16649",
"url": "https://www.suse.com/security/cve/CVE-2017-16649"
},
{
"category": "external",
"summary": "SUSE Bug 1067085 for CVE-2017-16649",
"url": "https://bugzilla.suse.com/1067085"
},
{
"category": "external",
"summary": "SUSE Bug 1067115 for CVE-2017-16649",
"url": "https://bugzilla.suse.com/1067115"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16649",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-16649"
},
{
"cve": "CVE-2017-16939",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16939"
}
],
"notes": [
{
"category": "general",
"text": "The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16939",
"url": "https://www.suse.com/security/cve/CVE-2017-16939"
},
{
"category": "external",
"summary": "SUSE Bug 1069702 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1069702"
},
{
"category": "external",
"summary": "SUSE Bug 1069708 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1069708"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1120260 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1120260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-16939"
},
{
"cve": "CVE-2017-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17450"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17450",
"url": "https://www.suse.com/security/cve/CVE-2017-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1071695 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "external",
"summary": "SUSE Bug 1074033 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1074033"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-17450"
},
{
"cve": "CVE-2017-17558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17558"
}
],
"notes": [
{
"category": "general",
"text": "The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17558",
"url": "https://www.suse.com/security/cve/CVE-2017-17558"
},
{
"category": "external",
"summary": "SUSE Bug 1072561 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1072561"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-17558"
},
{
"cve": "CVE-2017-17805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17805"
}
],
"notes": [
{
"category": "general",
"text": "The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17805",
"url": "https://www.suse.com/security/cve/CVE-2017-17805"
},
{
"category": "external",
"summary": "SUSE Bug 1073792 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "important"
}
],
"title": "CVE-2017-17805"
},
{
"cve": "CVE-2017-17806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17806"
}
],
"notes": [
{
"category": "general",
"text": "The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17806",
"url": "https://www.suse.com/security/cve/CVE-2017-17806"
},
{
"category": "external",
"summary": "SUSE Bug 1073874 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "low"
}
],
"title": "CVE-2017-17806"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-7472",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7472"
}
],
"notes": [
{
"category": "general",
"text": "The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7472",
"url": "https://www.suse.com/security/cve/CVE-2017-7472"
},
{
"category": "external",
"summary": "SUSE Bug 1034862 for CVE-2017-7472",
"url": "https://bugzilla.suse.com/1034862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-7472"
},
{
"cve": "CVE-2017-8824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8824"
}
],
"notes": [
{
"category": "general",
"text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8824",
"url": "https://www.suse.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "SUSE Bug 1070771 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "external",
"summary": "SUSE Bug 1076734 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1076734"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.14.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-23T12:59:47Z",
"details": "important"
}
],
"title": "CVE-2017-8824"
}
]
}
SUSE-SU-2018:0525-1
Vulnerability from csaf_suse - Published: 2018-02-22 17:05 - Updated: 2018-02-22 17:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative\n execution and indirect branch prediction may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis (bnc#1068032).\n\n The previous fix using CPU Microcode has been complemented by building\n the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2017-18079: drivers/input/serio/i8042.c allowed attackers to cause a\n denial of service (NULL pointer dereference and system crash) or possibly have\n unspecified other impact because the port-\u003eexists value can change after it\n is validated (bnc#1077922).\n- CVE-2015-1142857: Prevent guests from sending ethernet flow control pause\n frames via the PF (bnc#1077355).\n- CVE-2017-17741: KVM allowed attackers to obtain potentially sensitive\n information from kernel memory, aka a write_mmio stack-based out-of-bounds read\n (bnc#1073311).\n- CVE-2017-13215: Prevent elevation of privilege (bnc#1075908).\n- CVE-2018-1000004: Prevent race condition in the sound system, this could have\n lead a deadlock and denial of service condition (bnc#1076017).\n- CVE-2017-17806: The HMAC implementation did not validate that the underlying\n cryptographic hash algorithm is unkeyed, allowing a local attacker able to use\n the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3\n hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by\n executing a crafted sequence of system calls that encounter a missing SHA-3\n initialization (bnc#1073874).\n- CVE-2017-17805: The Salsa20 encryption algorithm did not correctly handle\n zero-length inputs, allowing a local attacker able to use the AF_ALG-based\n skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of\n service (uninitialized-memory free and kernel crash) or have unspecified other\n impact by executing a crafted sequence of system calls that use the\n blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c)\n and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were\n vulnerable (bnc#1073792).\n\nThe following non-security bugs were fixed:\n\n- NFS: only invalidate dentrys that are clearly invalid (bsc#1047118).\n- bcache.txt: standardize document format (bsc#1076110).\n- bcache: Abstract out stuff needed for sorting (bsc#1076110).\n- bcache: Add a cond_resched() call to gc (bsc#1076110).\n- bcache: Add a real GC_MARK_RECLAIMABLE (bsc#1076110).\n- bcache: Add bch_bkey_equal_header() (bsc#1076110).\n- bcache: Add bch_btree_keys_u64s_remaining() (bsc#1076110).\n- bcache: Add bch_keylist_init_single() (bsc#1047626).\n- bcache: Add btree_insert_node() (bnc#951638).\n- bcache: Add btree_map() functions (bsc#1047626).\n- bcache: Add btree_node_write_sync() (bsc#1076110).\n- bcache: Add explicit keylist arg to btree_insert() (bnc#951638).\n- bcache: Add make_btree_freeing_key() (bsc#1076110).\n- bcache: Add on error panic/unregister setting (bsc#1047626).\n- bcache: Add struct bset_sort_state (bsc#1076110).\n- bcache: Add struct btree_keys (bsc#1076110).\n- bcache: Allocate bounce buffers with GFP_NOWAIT (bsc#1076110).\n- bcache: Avoid deadlocking in garbage collection (bsc#1076110).\n- bcache: Avoid nested function definition (bsc#1076110).\n- bcache: Better alloc tracepoints (bsc#1076110).\n- bcache: Better full stripe scanning (bsc#1076110).\n- bcache: Bkey indexing renaming (bsc#1076110).\n- bcache: Break up struct search (bsc#1076110).\n- bcache: Btree verify code improvements (bsc#1076110).\n- bcache: Bypass torture test (bsc#1076110).\n- bcache: Change refill_dirty() to always scan entire disk if necessary (bsc#1076110).\n- bcache: Clean up cache_lookup_fn (bsc#1076110).\n- bcache: Clean up keylist code (bnc#951638).\n- bcache: Convert bch_btree_insert() to bch_btree_map_leaf_nodes() (bsc#1076110).\n- bcache: Convert bch_btree_read_async() to bch_btree_map_keys() (bsc#1076110).\n- bcache: Convert btree_insert_check_key() to btree_insert_node() (bnc#951638).\n- bcache: Convert btree_iter to struct btree_keys (bsc#1076110).\n- bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638).\n- bcache: Convert debug code to btree_keys (bsc#1076110).\n- bcache: Convert gc to a kthread (bsc#1047626).\n- bcache: Convert sorting to btree_keys (bsc#1076110).\n- bcache: Convert try_wait to wait_queue_head_t (bnc#951638).\n- bcache: Convert writeback to a kthread (bsc#1076110).\n- bcache: Correct return value for sysfs attach errors (bsc#1076110).\n- bcache: Debug code improvements (bsc#1076110).\n- bcache: Delete some slower inline asm (bsc#1047626).\n- bcache: Do bkey_put() in btree_split() error path (bsc#1076110).\n- bcache: Do not bother with bucket refcount for btree node allocations (bsc#1076110).\n- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).\n- bcache: Do not return -EINTR when insert finished (bsc#1076110).\n- bcache: Do not touch bucket gen for dirty ptrs (bsc#1076110).\n- bcache: Do not use op-\u003einsert_collision (bsc#1076110).\n- bcache: Drop some closure stuff (bsc#1076110).\n- bcache: Drop unneeded blk_sync_queue() calls (bsc#1047626).\n- bcache: Explicitly track btree node\u0027s parent (bnc#951638).\n- bcache: Fix a bug recovering from unclean shutdown (bsc#1047626).\n- bcache: Fix a bug when detaching (bsc#951638).\n- bcache: Fix a journal replay bug (bsc#1076110).\n- bcache: Fix a journalling performance bug (bnc#893777).\n- bcache: Fix a journalling reclaim after recovery bug (bsc#1047626).\n- bcache: Fix a lockdep splat (bnc#893777).\n- bcache: Fix a lockdep splat in an error path (bnc#951638).\n- bcache: Fix a null ptr deref in journal replay (bsc#1047626).\n- bcache: Fix a race when freeing btree nodes (bsc#1076110).\n- bcache: Fix a shutdown bug (bsc#951638).\n- bcache: Fix an infinite loop in journal replay (bsc#1047626).\n- bcache: Fix another bug recovering from unclean shutdown (bsc#1076110).\n- bcache: Fix another compiler warning on m68k (bsc#1076110).\n- bcache: Fix auxiliary search trees for key size greater than cacheline size (bsc#1076110).\n- bcache: Fix bch_ptr_bad() (bsc#1047626).\n- bcache: Fix building error on MIPS (bsc#1076110).\n- bcache: Fix dirty_data accounting (bsc#1076110).\n- bcache: Fix discard granularity (bsc#1047626).\n- bcache: Fix flash_dev_cache_miss() for real this time (bsc#1076110).\n- bcache: Fix for can_attach_cache() (bsc#1047626).\n- bcache: Fix heap_peek() macro (bsc#1047626).\n- bcache: Fix leak of bdev reference (bsc#1076110).\n- bcache: Fix more early shutdown bugs (bsc#951638).\n- bcache: Fix moving_gc deadlocking with a foreground write (bsc#1076110).\n- bcache: Fix moving_pred() (bsc#1047626).\n- bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).\n- bcache: Fix to remove the rcu_sched stalls (bsc#1047626).\n- bcache: Have btree_split() insert into parent directly (bsc#1076110).\n- bcache: Improve bucket_prio() calculation (bsc#1047626).\n- bcache: Improve priority_stats (bsc#1047626).\n- bcache: Incremental gc (bsc#1076110).\n- bcache: Insert multiple keys at a time (bnc#951638).\n- bcache: Kill bch_next_recurse_key() (bsc#1076110).\n- bcache: Kill btree_io_wq (bsc#1076110).\n- bcache: Kill bucket-\u003egc_gen (bsc#1076110).\n- bcache: Kill dead cgroup code (bsc#1076110).\n- bcache: Kill op-\u003ecl (bsc#1076110).\n- bcache: Kill op-\u003ereplace (bsc#1076110).\n- bcache: Kill sequential_merge option (bsc#1076110).\n- bcache: Kill unaligned bvec hack (bsc#1076110).\n- bcache: Kill unused freelist (bsc#1076110).\n- bcache: Make bch_keylist_realloc() take u64s, not nptrs (bsc#1076110).\n- bcache: Make gc wakeup sane, remove set_task_state() (bsc#1076110).\n- bcache: Minor btree cache fix (bsc#1047626).\n- bcache: Minor fixes from kbuild robot (bsc#1076110).\n- bcache: Move insert_fixup() to btree_keys_ops (bsc#1076110).\n- bcache: Move keylist out of btree_op (bsc#1047626).\n- bcache: Move sector allocator to alloc.c (bsc#1076110).\n- bcache: Move some stuff to btree.c (bsc#1076110).\n- bcache: Move spinlock into struct time_stats (bsc#1076110).\n- bcache: New writeback PD controller (bsc#1047626).\n- bcache: PRECEDING_KEY() (bsc#1047626).\n- bcache: Performance fix for when journal entry is full (bsc#1047626).\n- bcache: Prune struct btree_op (bsc#1076110).\n- bcache: Pull on disk data structures out into a separate header (bsc#1076110).\n- bcache: RESERVE_PRIO is too small by one when prio_buckets() is a power of two (bsc#1076110).\n- bcache: Really show state of work pending bit (bsc#1076110).\n- bcache: Refactor bset_tree sysfs stats (bsc#1076110).\n- bcache: Refactor journalling flow control (bnc#951638).\n- bcache: Refactor read request code a bit (bsc#1076110).\n- bcache: Refactor request_write() (bnc#951638).\n- bcache: Remove deprecated create_workqueue (bsc#1076110).\n- bcache: Remove redundant block_size assignment (bsc#1047626).\n- bcache: Remove redundant parameter for cache_alloc() (bsc#1047626).\n- bcache: Remove redundant set_capacity (bsc#1076110).\n- bcache: Remove unnecessary check in should_split() (bsc#1076110).\n- bcache: Remove/fix some header dependencies (bsc#1047626).\n- bcache: Rename/shuffle various code around (bsc#1076110).\n- bcache: Rework allocator reserves (bsc#1076110).\n- bcache: Rework btree cache reserve handling (bsc#1076110).\n- bcache: Split out sort_extent_cmp() (bsc#1076110).\n- bcache: Stripe size isn\u0027t necessarily a power of two (bnc#893949).\n- bcache: Trivial error handling fix (bsc#1047626).\n- bcache: Update continue_at() documentation (bsc#1076110).\n- bcache: Use a mempool for mergesort temporary space (bsc#1076110).\n- bcache: Use blkdev_issue_discard() (bnc#951638).\n- bcache: Use ida for bcache block dev minor (bsc#1047626).\n- bcache: Use uninterruptible sleep in writeback (bsc#1076110).\n- bcache: Zero less memory (bsc#1076110).\n- bcache: add a comment in journal bucket reading (bsc#1076110).\n- bcache: add mutex lock for bch_is_open (bnc#902893).\n- bcache: allows use of register in udev to avoid \u0027device_busy\u0027 error (bsc#1047626).\n- bcache: bcache_write tracepoint was crashing (bsc#1076110).\n- bcache: bch_(btree|extent)_ptr_invalid() (bsc#1076110).\n- bcache: bch_allocator_thread() is not freezable (bsc#1047626).\n- bcache: bch_gc_thread() is not freezable (bsc#1047626).\n- bcache: bch_writeback_thread() is not freezable (bsc#1076110).\n- bcache: btree locking rework (bsc#1076110).\n- bcache: bugfix - gc thread now gets woken when cache is full (bsc#1047626).\n- bcache: bugfix - moving_gc now moves only correct buckets (bsc#1047626).\n- bcache: bugfix for race between moving_gc and bucket_invalidate (bsc#1076110).\n- bcache: check ca-\u003ealloc_thread initialized before wake up it (bsc#1076110).\n- bcache: check return value of register_shrinker (bsc#1076110).\n- bcache: cleaned up error handling around register_cache() (bsc#1047626).\n- bcache: clear BCACHE_DEV_UNLINK_DONE flag when attaching a backing device (bsc#1047626).\n- bcache: correct cache_dirty_target in __update_writeback_rate() (bsc#1076110).\n- bcache: defensively handle format strings (bsc#1047626).\n- bcache: do not embed \u0027return\u0027 statements in closure macros (bsc#1076110).\n- bcache: do not subtract sectors_to_gc for bypassed IO (bsc#1076110).\n- bcache: do not write back data if reading it failed (bsc#1076110).\n- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).\n- bcache: documentation updates and corrections (bsc#1076110).\n- bcache: explicitly destroy mutex while exiting (bsc#1076110).\n- bcache: fix BUG_ON due to integer overflow with GC_SECTORS_USED (bsc#1047626).\n- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).\n- bcache: fix a livelock when we cause a huge number of cache misses (bsc#1047626).\n- bcache: fix bch_hprint crash and improve output (bsc#1076110).\n- bcache: fix crash in bcache_btree_node_alloc_fail tracepoint (bsc#1047626).\n- bcache: fix crash on shutdown in passthrough mode (bsc#1076110).\n- bcache: fix for gc and write-back race (bsc#1076110).\n- bcache: fix for gc and writeback race (bsc#1047626).\n- bcache: fix for gc crashing when no sectors are used (bsc#1047626).\n- bcache: fix race of writeback thread starting before complete initialization (bsc#1076110).\n- bcache: fix sequential large write IO bypass (bsc#1076110).\n- bcache: fix sparse non static symbol warning (bsc#1076110).\n- bcache: fix typo in bch_bkey_equal_header (bsc#1076110).\n- bcache: fix uninterruptible sleep in writeback thread (bsc#1076110).\n- bcache: fix use-after-free in btree_gc_coalesce() (bsc#1076110).\n- bcache: fix wrong cache_misses statistics (bsc#1076110).\n- bcache: gc does not work when triggering by manual command (bsc#1076110).\n- bcache: implement PI controller for writeback rate (bsc#1076110).\n- bcache: increase the number of open buckets (bsc#1076110).\n- bcache: initialize dirty stripes in flash_dev_run() (bsc#1076110).\n- bcache: kill closure locking code (bsc#1076110).\n- bcache: kill closure locking usage (bnc#951638).\n- bcache: kill index() (bsc#1047626).\n- bcache: kthread do not set writeback task to INTERUPTIBLE (bsc#1076110).\n- bcache: only permit to recovery read error when cache device is clean (bsc#1076110).\n- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110).\n- bcache: pr_err: more meaningful error message when nr_stripes is invalid (bsc#1076110).\n- bcache: prevent crash on changing writeback_running (bsc#1076110).\n- bcache: rearrange writeback main thread ratelimit (bsc#1076110).\n- bcache: recover data from backing when data is clean (bsc#1076110).\n- bcache: register_bcache(): call blkdev_put() when cache_alloc() fails (bsc#1047626).\n- bcache: remove nested function usage (bsc#1076110).\n- bcache: remove unused parameter (bsc#1076110).\n- bcache: rewrite multiple partitions support (bsc#1076110).\n- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).\n- bcache: silence static checker warning (bsc#1076110).\n- bcache: smooth writeback rate control (bsc#1076110).\n- bcache: stop moving_gc marking buckets that can\u0027t be moved (bsc#1047626).\n- bcache: try to set b-\u003eparent properly (bsc#1076110).\n- bcache: update bch_bkey_try_merge (bsc#1076110).\n- bcache: update bio-\u003ebi_opf bypass/writeback REQ_ flag hints (bsc#1076110).\n- bcache: update bucket_in_use in real time (bsc#1076110).\n- bcache: update document info (bsc#1076110).\n- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).\n- bcache: use kvfree() in various places (bsc#1076110).\n- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).\n- bcache: wait for buckets when allocating new btree root (bsc#1076110).\n- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).\n- bcache: writeback rate shouldn\u0027t artifically clamp (bsc#1076110).\n- block: bump BLK_DEF_MAX_SECTORS to 2560 (bsc#1073246)\n- fork: clear thread stack upon allocation (bsc#1077560). \n- gcov: disable for COMPILE_TEST (bnc#1012382).\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076278).\n- md: more open-coded offset_in_page() (bsc#1076110).\n- nfsd: do not share group_info among threads (bsc@1070623).\n- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1077182).\n- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1077182).\n- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1077182).\n- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1077182).\n- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032, bsc#1077182).\n- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1077182).\n- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1077182).\n- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1077182).\n- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1077182).\n- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).\n- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1077182).\n- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032, bsc#1077182).\n- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags \u003e wrapper (bsc#1068032, bsc#1077182).\n- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032, bsc#1077182).\n- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1077182).\n- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1077182).\n- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1077182).\n- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1077182).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1077182).\n- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075411).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).\n- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).\n- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-6-2018-348,SUSE-SLE-Module-Public-Cloud-12-2018-348,SUSE-SLE-SAP-12-SP1-2018-348,SUSE-SLE-SERVER-12-SP1-2018-348",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0525-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0525-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180525-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0525-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-February/003750.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1047118",
"url": "https://bugzilla.suse.com/1047118"
},
{
"category": "self",
"summary": "SUSE Bug 1047626",
"url": "https://bugzilla.suse.com/1047626"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1070623",
"url": "https://bugzilla.suse.com/1070623"
},
{
"category": "self",
"summary": "SUSE Bug 1073246",
"url": "https://bugzilla.suse.com/1073246"
},
{
"category": "self",
"summary": "SUSE Bug 1073311",
"url": "https://bugzilla.suse.com/1073311"
},
{
"category": "self",
"summary": "SUSE Bug 1073792",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "self",
"summary": "SUSE Bug 1073874",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "self",
"summary": "SUSE Bug 1074709",
"url": "https://bugzilla.suse.com/1074709"
},
{
"category": "self",
"summary": "SUSE Bug 1075091",
"url": "https://bugzilla.suse.com/1075091"
},
{
"category": "self",
"summary": "SUSE Bug 1075411",
"url": "https://bugzilla.suse.com/1075411"
},
{
"category": "self",
"summary": "SUSE Bug 1075908",
"url": "https://bugzilla.suse.com/1075908"
},
{
"category": "self",
"summary": "SUSE Bug 1075994",
"url": "https://bugzilla.suse.com/1075994"
},
{
"category": "self",
"summary": "SUSE Bug 1076017",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "self",
"summary": "SUSE Bug 1076110",
"url": "https://bugzilla.suse.com/1076110"
},
{
"category": "self",
"summary": "SUSE Bug 1076154",
"url": "https://bugzilla.suse.com/1076154"
},
{
"category": "self",
"summary": "SUSE Bug 1076278",
"url": "https://bugzilla.suse.com/1076278"
},
{
"category": "self",
"summary": "SUSE Bug 1077182",
"url": "https://bugzilla.suse.com/1077182"
},
{
"category": "self",
"summary": "SUSE Bug 1077355",
"url": "https://bugzilla.suse.com/1077355"
},
{
"category": "self",
"summary": "SUSE Bug 1077560",
"url": "https://bugzilla.suse.com/1077560"
},
{
"category": "self",
"summary": "SUSE Bug 1077922",
"url": "https://bugzilla.suse.com/1077922"
},
{
"category": "self",
"summary": "SUSE Bug 1081317",
"url": "https://bugzilla.suse.com/1081317"
},
{
"category": "self",
"summary": "SUSE Bug 893777",
"url": "https://bugzilla.suse.com/893777"
},
{
"category": "self",
"summary": "SUSE Bug 893949",
"url": "https://bugzilla.suse.com/893949"
},
{
"category": "self",
"summary": "SUSE Bug 902893",
"url": "https://bugzilla.suse.com/902893"
},
{
"category": "self",
"summary": "SUSE Bug 951638",
"url": "https://bugzilla.suse.com/951638"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1142857 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1142857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13215 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17741 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17805 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17806 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18079 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-02-22T17:05:19Z",
"generator": {
"date": "2018-02-22T17:05:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0525-1",
"initial_release_date": "2018-02-22T17:05:19Z",
"revision_history": [
{
"date": "2018-02-22T17:05:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.74-60.64.82.1.noarch",
"product": {
"name": "kernel-devel-3.12.74-60.64.82.1.noarch",
"product_id": "kernel-devel-3.12.74-60.64.82.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.74-60.64.82.1.noarch",
"product": {
"name": "kernel-macros-3.12.74-60.64.82.1.noarch",
"product_id": "kernel-macros-3.12.74-60.64.82.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.74-60.64.82.1.noarch",
"product": {
"name": "kernel-source-3.12.74-60.64.82.1.noarch",
"product_id": "kernel-source-3.12.74-60.64.82.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.82.1.ppc64le",
"product": {
"name": "kernel-default-3.12.74-60.64.82.1.ppc64le",
"product_id": "kernel-default-3.12.74-60.64.82.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"product_id": "kernel-default-base-3.12.74-60.64.82.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"product_id": "kernel-default-devel-3.12.74-60.64.82.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.82.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.74-60.64.82.1.ppc64le",
"product_id": "kernel-syms-3.12.74-60.64.82.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.82.1.s390x",
"product": {
"name": "kernel-default-3.12.74-60.64.82.1.s390x",
"product_id": "kernel-default-3.12.74-60.64.82.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.82.1.s390x",
"product": {
"name": "kernel-default-base-3.12.74-60.64.82.1.s390x",
"product_id": "kernel-default-base-3.12.74-60.64.82.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.82.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.82.1.s390x",
"product_id": "kernel-default-devel-3.12.74-60.64.82.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.74-60.64.82.1.s390x",
"product": {
"name": "kernel-default-man-3.12.74-60.64.82.1.s390x",
"product_id": "kernel-default-man-3.12.74-60.64.82.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.82.1.s390x",
"product": {
"name": "kernel-syms-3.12.74-60.64.82.1.s390x",
"product_id": "kernel-syms-3.12.74-60.64.82.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.82.1.x86_64",
"product": {
"name": "kernel-default-3.12.74-60.64.82.1.x86_64",
"product_id": "kernel-default-3.12.74-60.64.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.82.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.74-60.64.82.1.x86_64",
"product_id": "kernel-default-base-3.12.74-60.64.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"product_id": "kernel-default-devel-3.12.74-60.64.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.82.1.x86_64",
"product": {
"name": "kernel-syms-3.12.74-60.64.82.1.x86_64",
"product_id": "kernel-syms-3.12.74-60.64.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.74-60.64.82.1.x86_64",
"product": {
"name": "kernel-xen-3.12.74-60.64.82.1.x86_64",
"product_id": "kernel-xen-3.12.74-60.64.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"product_id": "kernel-xen-base-3.12.74-60.64.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"product_id": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.12.74-60.64.82.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.74-60.64.82.1.x86_64",
"product_id": "kernel-ec2-3.12.74-60.64.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.74-60.64.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.74-60.64.82.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 6",
"product": {
"name": "SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.82.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.82.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.82.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.82.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.82.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.82.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.82.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.82.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.82.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.82.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.82.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.82.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le"
},
"product_reference": "kernel-default-3.12.74-60.64.82.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.82.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.82.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.82.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.82.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.82.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.82.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.74-60.64.82.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le"
},
"product_reference": "kernel-default-3.12.74-60.64.82.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.82.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x"
},
"product_reference": "kernel-default-3.12.74-60.64.82.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.82.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x"
},
"product_reference": "kernel-default-base-3.12.74-60.64.82.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.82.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.82.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.74-60.64.82.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x"
},
"product_reference": "kernel-default-man-3.12.74-60.64.82.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.82.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.82.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.82.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.82.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.82.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.82.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.74-60.64.82.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.82.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x"
},
"product_reference": "kernel-syms-3.12.74-60.64.82.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-1142857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1142857"
}
],
"notes": [
{
"category": "general",
"text": "On multiple SR-IOV cars it is possible for VF\u0027s assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1142857",
"url": "https://www.suse.com/security/cve/CVE-2015-1142857"
},
{
"category": "external",
"summary": "SUSE Bug 1077355 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1077355"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1105108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-22T17:05:19Z",
"details": "moderate"
}
],
"title": "CVE-2015-1142857"
},
{
"cve": "CVE-2017-13215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13215"
}
],
"notes": [
{
"category": "general",
"text": "A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13215",
"url": "https://www.suse.com/security/cve/CVE-2017-13215"
},
{
"category": "external",
"summary": "SUSE Bug 1075908 for CVE-2017-13215",
"url": "https://bugzilla.suse.com/1075908"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-13215",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-22T17:05:19Z",
"details": "moderate"
}
],
"title": "CVE-2017-13215"
},
{
"cve": "CVE-2017-17741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17741"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17741",
"url": "https://www.suse.com/security/cve/CVE-2017-17741"
},
{
"category": "external",
"summary": "SUSE Bug 1073311 for CVE-2017-17741",
"url": "https://bugzilla.suse.com/1073311"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-17741",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-22T17:05:19Z",
"details": "important"
}
],
"title": "CVE-2017-17741"
},
{
"cve": "CVE-2017-17805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17805"
}
],
"notes": [
{
"category": "general",
"text": "The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17805",
"url": "https://www.suse.com/security/cve/CVE-2017-17805"
},
{
"category": "external",
"summary": "SUSE Bug 1073792 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-22T17:05:19Z",
"details": "important"
}
],
"title": "CVE-2017-17805"
},
{
"cve": "CVE-2017-17806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17806"
}
],
"notes": [
{
"category": "general",
"text": "The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17806",
"url": "https://www.suse.com/security/cve/CVE-2017-17806"
},
{
"category": "external",
"summary": "SUSE Bug 1073874 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-22T17:05:19Z",
"details": "low"
}
],
"title": "CVE-2017-17806"
},
{
"cve": "CVE-2017-18079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18079"
}
],
"notes": [
{
"category": "general",
"text": "drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-\u003eexists value can change after it is validated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18079",
"url": "https://www.suse.com/security/cve/CVE-2017-18079"
},
{
"category": "external",
"summary": "SUSE Bug 1077922 for CVE-2017-18079",
"url": "https://bugzilla.suse.com/1077922"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18079",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-22T17:05:19Z",
"details": "low"
}
],
"title": "CVE-2017-18079"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-22T17:05:19Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch",
"SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64",
"SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-22T17:05:19Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
}
]
}
SUSE-SU-2018:0437-1
Vulnerability from csaf_suse - Published: 2018-02-13 14:24 - Updated: 2018-02-13 14:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative\n execution and indirect branch prediction may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis (bnc#1068032).\n\n The previous fix using CPU Microcode has been complemented by building\n the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2017-18079: drivers/input/serio/i8042.c allowed attackers to cause a\n denial of service (NULL pointer dereference and system crash) or possibly have\n unspecified other impact because the port-\u003eexists value can change after it is\n validated (bnc#1077922)\n- CVE-2015-1142857: Prevent guests from sending ethernet flow control pause\n frames via the PF (bnc#1077355)\n- CVE-2017-17741: KVM allowed attackers to obtain potentially sensitive\n information from kernel memory, aka a write_mmio stack-based out-of-bounds read\n (bnc#1073311)\n- CVE-2017-13215: Prevent elevation of privilege (bnc#1075908)\n- CVE-2018-1000004: Prevent race condition in the sound system, this could have\n lead a deadlock and denial of service condition (bnc#1076017)\n- CVE-2017-17806: The HMAC implementation did not validate that the underlying\n cryptographic hash algorithm is unkeyed, allowing a local attacker able to use\n the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3\n hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by\n executing a crafted sequence of system calls that encounter a missing SHA-3\n initialization (bnc#1073874)\n- CVE-2017-17805: The Salsa20 encryption algorithm did not correctly handle\n zero-length inputs, allowing a local attacker able to use the AF_ALG-based\n skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of\n service (uninitialized-memory free and kernel crash) or have unspecified other\n impact by executing a crafted sequence of system calls that use the\n blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c)\n and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were\n vulnerable (bnc#1073792)\n\nThe following non-security bugs were fixed:\n\n- bcache allocator: send discards with correct size (bsc#1047626).\n- bcache.txt: standardize document format (bsc#1076110).\n- bcache: Abstract out stuff needed for sorting (bsc#1076110).\n- bcache: Add a cond_resched() call to gc (bsc#1076110).\n- bcache: Add a real GC_MARK_RECLAIMABLE (bsc#1076110).\n- bcache: Add bch_bkey_equal_header() (bsc#1076110).\n- bcache: Add bch_btree_keys_u64s_remaining() (bsc#1076110).\n- bcache: Add bch_keylist_init_single() (bsc#1047626).\n- bcache: Add btree_insert_node() (bnc#951638).\n- bcache: Add btree_map() functions (bsc#1047626).\n- bcache: Add btree_node_write_sync() (bsc#1076110).\n- bcache: Add explicit keylist arg to btree_insert() (bnc#951638).\n- bcache: Add make_btree_freeing_key() (bsc#1076110).\n- bcache: Add on error panic/unregister setting (bsc#1047626).\n- bcache: Add struct bset_sort_state (bsc#1076110).\n- bcache: Add struct btree_keys (bsc#1076110).\n- bcache: Allocate bounce buffers with GFP_NOWAIT (bsc#1076110).\n- bcache: Avoid deadlocking in garbage collection (bsc#1076110).\n- bcache: Avoid nested function definition (bsc#1076110).\n- bcache: Better alloc tracepoints (bsc#1076110).\n- bcache: Better full stripe scanning (bsc#1076110).\n- bcache: Bkey indexing renaming (bsc#1076110).\n- bcache: Break up struct search (bsc#1076110).\n- bcache: Btree verify code improvements (bsc#1076110).\n- bcache: Bypass torture test (bsc#1076110).\n- bcache: Change refill_dirty() to always scan entire disk if necessary (bsc#1076110).\n- bcache: Clean up cache_lookup_fn (bsc#1076110).\n- bcache: Clean up keylist code (bnc#951638).\n- bcache: Convert bch_btree_insert() to bch_btree_map_leaf_nodes() (bsc#1076110).\n- bcache: Convert bch_btree_read_async() to bch_btree_map_keys() (bsc#1076110).\n- bcache: Convert btree_insert_check_key() to btree_insert_node() (bnc#951638).\n- bcache: Convert btree_iter to struct btree_keys (bsc#1076110).\n- bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638).\n- bcache: Convert debug code to btree_keys (bsc#1076110).\n- bcache: Convert gc to a kthread (bsc#1047626).\n- bcache: Convert sorting to btree_keys (bsc#1076110).\n- bcache: Convert try_wait to wait_queue_head_t (bnc#951638).\n- bcache: Convert writeback to a kthread (bsc#1076110).\n- bcache: Correct return value for sysfs attach errors (bsc#1076110).\n- bcache: Debug code improvements (bsc#1076110).\n- bcache: Delete some slower inline asm (bsc#1047626).\n- bcache: Do bkey_put() in btree_split() error path (bsc#1076110).\n- bcache: Do not bother with bucket refcount for btree node allocations (bsc#1076110).\n- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).\n- bcache: Do not return -EINTR when insert finished (bsc#1076110).\n- bcache: Do not touch bucket gen for dirty ptrs (bsc#1076110).\n- bcache: Do not use op-\u003einsert_collision (bsc#1076110).\n- bcache: Drop some closure stuff (bsc#1076110).\n- bcache: Drop unneeded blk_sync_queue() calls (bsc#1047626).\n- bcache: Explicitly track btree node\u0027s parent (bnc#951638).\n- bcache: Fix a bug recovering from unclean shutdown (bsc#1047626).\n- bcache: Fix a bug when detaching (bsc#951638).\n- bcache: Fix a journal replay bug (bsc#1076110).\n- bcache: Fix a journalling performance bug (bnc#893777).\n- bcache: Fix a journalling reclaim after recovery bug (bsc#1047626).\n- bcache: Fix a lockdep splat (bnc#893777).\n- bcache: Fix a lockdep splat in an error path (bnc#951638).\n- bcache: Fix a null ptr deref in journal replay (bsc#1047626).\n- bcache: Fix a race when freeing btree nodes (bsc#1076110).\n- bcache: Fix a shutdown bug (bsc#951638).\n- bcache: Fix an infinite loop in journal replay (bsc#1047626).\n- bcache: Fix another bug recovering from unclean shutdown (bsc#1076110).\n- bcache: Fix another compiler warning on m68k (bsc#1076110).\n- bcache: Fix auxiliary search trees for key size \u003e cacheline size (bsc#1076110).\n- bcache: Fix bch_ptr_bad() (bsc#1047626).\n- bcache: Fix building error on MIPS (bsc#1076110).\n- bcache: Fix dirty_data accounting (bsc#1076110).\n- bcache: Fix discard granularity (bsc#1047626).\n- bcache: Fix flash_dev_cache_miss() for real this time (bsc#1076110).\n- bcache: Fix for can_attach_cache() (bsc#1047626).\n- bcache: Fix heap_peek() macro (bsc#1047626).\n- bcache: Fix leak of bdev reference (bsc#1076110).\n- bcache: Fix more early shutdown bugs (bsc#951638).\n- bcache: Fix moving_gc deadlocking with a foreground write (bsc#1076110).\n- bcache: Fix moving_pred() (bsc#1047626).\n- bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).\n- bcache: Fix to remove the rcu_sched stalls (bsc#1047626).\n- bcache: Have btree_split() insert into parent directly (bsc#1076110).\n- bcache: Improve bucket_prio() calculation (bsc#1047626).\n- bcache: Improve priority_stats (bsc#1047626).\n- bcache: Incremental gc (bsc#1076110).\n- bcache: Insert multiple keys at a time (bnc#951638).\n- bcache: Kill bch_next_recurse_key() (bsc#1076110).\n- bcache: Kill btree_io_wq (bsc#1076110).\n- bcache: Kill bucket-\u003egc_gen (bsc#1076110).\n- bcache: Kill dead cgroup code (bsc#1076110).\n- bcache: Kill op-\u003ecl (bsc#1076110).\n- bcache: Kill op-\u003ereplace (bsc#1076110).\n- bcache: Kill sequential_merge option (bsc#1076110).\n- bcache: Kill unaligned bvec hack (bsc#1076110).\n- bcache: Kill unused freelist (bsc#1076110).\n- bcache: Make bch_keylist_realloc() take u64s, not nptrs (bsc#1076110).\n- bcache: Make gc wakeup sane, remove set_task_state() (bsc#1076110).\n- bcache: Minor btree cache fix (bsc#1047626).\n- bcache: Minor fixes from kbuild robot (bsc#1076110).\n- bcache: Move insert_fixup() to btree_keys_ops (bsc#1076110).\n- bcache: Move keylist out of btree_op (bsc#1047626).\n- bcache: Move sector allocator to alloc.c (bsc#1076110).\n- bcache: Move some stuff to btree.c (bsc#1076110).\n- bcache: Move spinlock into struct time_stats (bsc#1076110).\n- bcache: New writeback PD controller (bsc#1047626).\n- bcache: PRECEDING_KEY() (bsc#1047626).\n- bcache: Performance fix for when journal entry is full (bsc#1047626).\n- bcache: Prune struct btree_op (bsc#1076110).\n- bcache: Pull on disk data structures out into a separate header (bsc#1076110).\n- bcache: RESERVE_PRIO is too small by one when prio_buckets() is a power of two (bsc#1076110).\n- bcache: Really show state of work pending bit (bsc#1076110).\n- bcache: Refactor bset_tree sysfs stats (bsc#1076110).\n- bcache: Refactor journalling flow control (bnc#951638).\n- bcache: Refactor read request code a bit (bsc#1076110).\n- bcache: Refactor request_write() (bnc#951638).\n- bcache: Remove deprecated create_workqueue (bsc#1076110).\n- bcache: Remove redundant block_size assignment (bsc#1047626).\n- bcache: Remove redundant parameter for cache_alloc() (bsc#1047626).\n- bcache: Remove redundant set_capacity (bsc#1076110).\n- bcache: Remove unnecessary check in should_split() (bsc#1076110).\n- bcache: Remove/fix some header dependencies (bsc#1047626).\n- bcache: Rename/shuffle various code around (bsc#1076110).\n- bcache: Rework allocator reserves (bsc#1076110).\n- bcache: Rework btree cache reserve handling (bsc#1076110).\n- bcache: Split out sort_extent_cmp() (bsc#1076110).\n- bcache: Stripe size isn\u0027t necessarily a power of two (bnc#893949).\n- bcache: Trivial error handling fix (bsc#1047626).\n- bcache: Update continue_at() documentation (bsc#1076110).\n- bcache: Use a mempool for mergesort temporary space (bsc#1076110).\n- bcache: Use blkdev_issue_discard() (bnc#951638).\n- bcache: Use ida for bcache block dev minor (bsc#1047626).\n- bcache: Use uninterruptible sleep in writeback (bsc#1076110).\n- bcache: Zero less memory (bsc#1076110).\n- bcache: add a comment in journal bucket reading (bsc#1076110).\n- bcache: add mutex lock for bch_is_open (bnc#902893).\n- bcache: allows use of register in udev to avoid \u0027device_busy\u0027 error (bsc#1047626).\n- bcache: bcache_write tracepoint was crashing (bsc#1076110).\n- bcache: bch_(btree|extent)_ptr_invalid() (bsc#1076110).\n- bcache: bch_allocator_thread() is not freezable (bsc#1047626).\n- bcache: bch_gc_thread() is not freezable (bsc#1047626).\n- bcache: bch_writeback_thread() is not freezable (bsc#1076110).\n- bcache: btree locking rework (bsc#1076110).\n- bcache: bugfix - gc thread now gets woken when cache is full (bsc#1047626).\n- bcache: bugfix - moving_gc now moves only correct buckets (bsc#1047626).\n- bcache: bugfix for race between moving_gc and bucket_invalidate (bsc#1076110).\n- bcache: check ca-\u003ealloc_thread initialized before wake up it (bsc#1076110).\n- bcache: check return value of register_shrinker (bsc#1076110).\n- bcache: cleaned up error handling around register_cache() (bsc#1047626).\n- bcache: clear BCACHE_DEV_UNLINK_DONE flag when attaching a backing device (bsc#1047626).\n- bcache: correct cache_dirty_target in __update_writeback_rate() (bsc#1076110).\n- bcache: defensively handle format strings (bsc#1047626).\n- bcache: do not embed \u0027return\u0027 statements in closure macros (bsc#1076110).\n- bcache: do not subtract sectors_to_gc for bypassed IO (bsc#1076110).\n- bcache: do not write back data if reading it failed (bsc#1076110).\n- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).\n- bcache: documentation updates and corrections (bsc#1076110).\n- bcache: explicitly destroy mutex while exiting (bsc#1076110).\n- bcache: fix BUG_ON due to integer overflow with GC_SECTORS_USED (bsc#1047626).\n- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).\n- bcache: fix a livelock when we cause a huge number of cache misses (bsc#1047626).\n- bcache: fix bch_hprint crash and improve output (bsc#1076110).\n- bcache: fix crash in bcache_btree_node_alloc_fail tracepoint (bsc#1047626).\n- bcache: fix crash on shutdown in passthrough mode (bsc#1076110).\n- bcache: fix for gc and write-back race (bsc#1076110).\n- bcache: fix for gc and writeback race (bsc#1047626).\n- bcache: fix for gc crashing when no sectors are used (bsc#1047626).\n- bcache: fix lockdep warnings on shutdown (bsc#1047626).\n- bcache: fix race of writeback thread starting before complete initialization (bsc#1076110).\n- bcache: fix sequential large write IO bypass (bsc#1076110).\n- bcache: fix sparse non static symbol warning (bsc#1076110).\n- bcache: fix typo in bch_bkey_equal_header (bsc#1076110).\n- bcache: fix uninterruptible sleep in writeback thread (bsc#1076110).\n- bcache: fix use-after-free in btree_gc_coalesce() (bsc#1076110).\n- bcache: fix wrong cache_misses statistics (bsc#1076110).\n- bcache: gc does not work when triggering by manual command (bsc#1076110).\n- bcache: implement PI controller for writeback rate (bsc#1076110).\n- bcache: increase the number of open buckets (bsc#1076110).\n- bcache: initialize dirty stripes in flash_dev_run() (bsc#1076110).\n- bcache: kill closure locking code (bsc#1076110).\n- bcache: kill closure locking usage (bnc#951638).\n- bcache: kill index() (bsc#1047626).\n- bcache: kthread do not set writeback task to INTERUPTIBLE (bsc#1076110).\n- bcache: only permit to recovery read error when cache device is clean (bsc#1076110).\n- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110).\n- bcache: pr_err: more meaningful error message when nr_stripes is invalid (bsc#1076110).\n- bcache: prevent crash on changing writeback_running (bsc#1076110).\n- bcache: rearrange writeback main thread ratelimit (bsc#1076110).\n- bcache: recover data from backing when data is clean (bsc#1076110).\n- bcache: register_bcache(): call blkdev_put() when cache_alloc() fails (bsc#1047626).\n- bcache: remove nested function usage (bsc#1076110).\n- bcache: remove unused parameter (bsc#1076110).\n- bcache: rewrite multiple partitions support (bsc#1076110).\n- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).\n- bcache: silence static checker warning (bsc#1076110).\n- bcache: smooth writeback rate control (bsc#1076110).\n- bcache: stop moving_gc marking buckets that can\u0027t be moved (bsc#1047626).\n- bcache: try to set b-\u003eparent properly (bsc#1076110).\n- bcache: update bch_bkey_try_merge (bsc#1076110).\n- bcache: update bio-\u003ebi_opf bypass/writeback REQ_ flag hints (bsc#1076110).\n- bcache: update bucket_in_use in real time (bsc#1076110).\n- bcache: update document info (bsc#1076110).\n- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).\n- bcache: use kvfree() in various places (bsc#1076110).\n- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).\n- bcache: wait for buckets when allocating new btree root (bsc#1076110).\n- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).\n- bcache: writeback rate shouldn\u0027t artifically clamp (bsc#1076110).\n- fork: clear thread stack upon allocation (bsc#1077560). \n- gcov: disable for COMPILE_TEST (bnc#1012382).\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076154).\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076278).\n- md: more open-coded offset_in_page() (bsc#1076110).\n- nfsd: do not share group_info among threads (bsc@1070623).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).\n- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).\n- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Public-Cloud-12-2018-301,SUSE-SLE-SERVER-12-2018-301",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0437-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0437-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180437-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0437-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2018-February/007939.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1047626",
"url": "https://bugzilla.suse.com/1047626"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1070623",
"url": "https://bugzilla.suse.com/1070623"
},
{
"category": "self",
"summary": "SUSE Bug 1073311",
"url": "https://bugzilla.suse.com/1073311"
},
{
"category": "self",
"summary": "SUSE Bug 1073792",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "self",
"summary": "SUSE Bug 1073874",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "self",
"summary": "SUSE Bug 1075091",
"url": "https://bugzilla.suse.com/1075091"
},
{
"category": "self",
"summary": "SUSE Bug 1075908",
"url": "https://bugzilla.suse.com/1075908"
},
{
"category": "self",
"summary": "SUSE Bug 1075994",
"url": "https://bugzilla.suse.com/1075994"
},
{
"category": "self",
"summary": "SUSE Bug 1076017",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "self",
"summary": "SUSE Bug 1076110",
"url": "https://bugzilla.suse.com/1076110"
},
{
"category": "self",
"summary": "SUSE Bug 1076154",
"url": "https://bugzilla.suse.com/1076154"
},
{
"category": "self",
"summary": "SUSE Bug 1076278",
"url": "https://bugzilla.suse.com/1076278"
},
{
"category": "self",
"summary": "SUSE Bug 1077355",
"url": "https://bugzilla.suse.com/1077355"
},
{
"category": "self",
"summary": "SUSE Bug 1077560",
"url": "https://bugzilla.suse.com/1077560"
},
{
"category": "self",
"summary": "SUSE Bug 1077922",
"url": "https://bugzilla.suse.com/1077922"
},
{
"category": "self",
"summary": "SUSE Bug 893777",
"url": "https://bugzilla.suse.com/893777"
},
{
"category": "self",
"summary": "SUSE Bug 893949",
"url": "https://bugzilla.suse.com/893949"
},
{
"category": "self",
"summary": "SUSE Bug 902893",
"url": "https://bugzilla.suse.com/902893"
},
{
"category": "self",
"summary": "SUSE Bug 951638",
"url": "https://bugzilla.suse.com/951638"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1142857 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1142857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13215 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17741 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17805 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17806 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18079 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-02-13T14:24:07Z",
"generator": {
"date": "2018-02-13T14:24:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0437-1",
"initial_release_date": "2018-02-13T14:24:07Z",
"revision_history": [
{
"date": "2018-02-13T14:24:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.61-52.119.1.noarch",
"product": {
"name": "kernel-devel-3.12.61-52.119.1.noarch",
"product_id": "kernel-devel-3.12.61-52.119.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.61-52.119.1.noarch",
"product": {
"name": "kernel-macros-3.12.61-52.119.1.noarch",
"product_id": "kernel-macros-3.12.61-52.119.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.61-52.119.1.noarch",
"product": {
"name": "kernel-source-3.12.61-52.119.1.noarch",
"product_id": "kernel-source-3.12.61-52.119.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.119.1.ppc64le",
"product": {
"name": "kernel-default-3.12.61-52.119.1.ppc64le",
"product_id": "kernel-default-3.12.61-52.119.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.119.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.61-52.119.1.ppc64le",
"product_id": "kernel-default-base-3.12.61-52.119.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.119.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.61-52.119.1.ppc64le",
"product_id": "kernel-default-devel-3.12.61-52.119.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.119.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.61-52.119.1.ppc64le",
"product_id": "kernel-syms-3.12.61-52.119.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.119.1.s390x",
"product": {
"name": "kernel-default-3.12.61-52.119.1.s390x",
"product_id": "kernel-default-3.12.61-52.119.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.119.1.s390x",
"product": {
"name": "kernel-default-base-3.12.61-52.119.1.s390x",
"product_id": "kernel-default-base-3.12.61-52.119.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.119.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.61-52.119.1.s390x",
"product_id": "kernel-default-devel-3.12.61-52.119.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.61-52.119.1.s390x",
"product": {
"name": "kernel-default-man-3.12.61-52.119.1.s390x",
"product_id": "kernel-default-man-3.12.61-52.119.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.119.1.s390x",
"product": {
"name": "kernel-syms-3.12.61-52.119.1.s390x",
"product_id": "kernel-syms-3.12.61-52.119.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-ec2-3.12.61-52.119.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.61-52.119.1.x86_64",
"product_id": "kernel-ec2-3.12.61-52.119.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.61-52.119.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.61-52.119.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.119.1.x86_64",
"product": {
"name": "kernel-default-3.12.61-52.119.1.x86_64",
"product_id": "kernel-default-3.12.61-52.119.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.119.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.61-52.119.1.x86_64",
"product_id": "kernel-default-base-3.12.61-52.119.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.119.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.61-52.119.1.x86_64",
"product_id": "kernel-default-devel-3.12.61-52.119.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.119.1.x86_64",
"product": {
"name": "kernel-syms-3.12.61-52.119.1.x86_64",
"product_id": "kernel-syms-3.12.61-52.119.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.61-52.119.1.x86_64",
"product": {
"name": "kernel-xen-3.12.61-52.119.1.x86_64",
"product_id": "kernel-xen-3.12.61-52.119.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.61-52.119.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.61-52.119.1.x86_64",
"product_id": "kernel-xen-base-3.12.61-52.119.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.61-52.119.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.61-52.119.1.x86_64",
"product_id": "kernel-xen-devel-3.12.61-52.119.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.61-52.119.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.119.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le"
},
"product_reference": "kernel-default-3.12.61-52.119.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.119.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x"
},
"product_reference": "kernel-default-3.12.61-52.119.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64"
},
"product_reference": "kernel-default-3.12.61-52.119.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.119.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.61-52.119.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.119.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x"
},
"product_reference": "kernel-default-base-3.12.61-52.119.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.61-52.119.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.119.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.61-52.119.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.119.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.61-52.119.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.61-52.119.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.61-52.119.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x"
},
"product_reference": "kernel-default-man-3.12.61-52.119.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.61-52.119.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch"
},
"product_reference": "kernel-devel-3.12.61-52.119.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.61-52.119.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch"
},
"product_reference": "kernel-macros-3.12.61-52.119.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.61-52.119.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch"
},
"product_reference": "kernel-source-3.12.61-52.119.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.119.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.61-52.119.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.119.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x"
},
"product_reference": "kernel-syms-3.12.61-52.119.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64"
},
"product_reference": "kernel-syms-3.12.61-52.119.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64"
},
"product_reference": "kernel-xen-3.12.61-52.119.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.61-52.119.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.61-52.119.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-1142857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1142857"
}
],
"notes": [
{
"category": "general",
"text": "On multiple SR-IOV cars it is possible for VF\u0027s assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1142857",
"url": "https://www.suse.com/security/cve/CVE-2015-1142857"
},
{
"category": "external",
"summary": "SUSE Bug 1077355 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1077355"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2015-1142857",
"url": "https://bugzilla.suse.com/1105108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-13T14:24:07Z",
"details": "moderate"
}
],
"title": "CVE-2015-1142857"
},
{
"cve": "CVE-2017-13215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13215"
}
],
"notes": [
{
"category": "general",
"text": "A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13215",
"url": "https://www.suse.com/security/cve/CVE-2017-13215"
},
{
"category": "external",
"summary": "SUSE Bug 1075908 for CVE-2017-13215",
"url": "https://bugzilla.suse.com/1075908"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-13215",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-13T14:24:07Z",
"details": "moderate"
}
],
"title": "CVE-2017-13215"
},
{
"cve": "CVE-2017-17741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17741"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17741",
"url": "https://www.suse.com/security/cve/CVE-2017-17741"
},
{
"category": "external",
"summary": "SUSE Bug 1073311 for CVE-2017-17741",
"url": "https://bugzilla.suse.com/1073311"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-17741",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-13T14:24:07Z",
"details": "important"
}
],
"title": "CVE-2017-17741"
},
{
"cve": "CVE-2017-17805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17805"
}
],
"notes": [
{
"category": "general",
"text": "The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17805",
"url": "https://www.suse.com/security/cve/CVE-2017-17805"
},
{
"category": "external",
"summary": "SUSE Bug 1073792 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-13T14:24:07Z",
"details": "important"
}
],
"title": "CVE-2017-17805"
},
{
"cve": "CVE-2017-17806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17806"
}
],
"notes": [
{
"category": "general",
"text": "The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17806",
"url": "https://www.suse.com/security/cve/CVE-2017-17806"
},
{
"category": "external",
"summary": "SUSE Bug 1073874 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-13T14:24:07Z",
"details": "low"
}
],
"title": "CVE-2017-17806"
},
{
"cve": "CVE-2017-18079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18079"
}
],
"notes": [
{
"category": "general",
"text": "drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-\u003eexists value can change after it is validated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18079",
"url": "https://www.suse.com/security/cve/CVE-2017-18079"
},
{
"category": "external",
"summary": "SUSE Bug 1077922 for CVE-2017-18079",
"url": "https://bugzilla.suse.com/1077922"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-18079",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-13T14:24:07Z",
"details": "low"
}
],
"title": "CVE-2017-18079"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-13T14:24:07Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-02-13T14:24:07Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
}
]
}
SUSE-SU-2018:1376-1
Vulnerability from csaf_suse - Published: 2018-05-22 11:15 - Updated: 2018-05-22 11:15Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3639: Information leaks using \u0027Memory Disambiguation\u0027 feature\n in modern CPUs were mitigated, aka \u0027Spectre Variant 4\u0027 (bnc#1087082).\n\n A new boot commandline option was introduced,\n \u0027spec_store_bypass_disable\u0027, which can have following values:\n\n - auto: Kernel detects whether your CPU model contains an implementation\n of Speculative Store Bypass and picks the most appropriate mitigation.\n - on: disable Speculative Store Bypass\n - off: enable Speculative Store Bypass\n - prctl: Control Speculative Store Bypass per thread via\n prctl. Speculative Store Bypass is enabled for a process by default. The\n state of the control is inherited on fork.\n - seccomp: Same as \u0027prctl\u0027 above, but all seccomp threads will disable\n SSB unless they explicitly opt out.\n\n The default is \u0027seccomp\u0027, meaning programs need explicit opt-in into the mitigation.\n\n Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:\n\n - \u0027Vulnerable\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl and seccomp\u0027\n\n- CVE-2018-1000199: An address corruption flaw was discovered while\n modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an\n unprivileged user/process could use this flaw to crash the system kernel\n resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)\n- CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy.c allowed\n local users to cause a denial of service (use-after-free) or possibly\n have unspecified other impact via crafted system calls (bnc#1091755).\n- CVE-2017-5715: The retpoline mitigation for Spectre v2 has been enabled also for 32bit x86.\n- CVE-2017-5753: Spectre v1 mitigations have been improved by the versions\n merged from the upstream kernel.\n\nThe following non-security bugs were fixed:\n\n- Update config files. Set CONFIG_RETPOLINE=y for i386.\n- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).\n- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-kernel-20180512-13616,slessp3-kernel-20180512-13616,slexsp3-kernel-20180512-13616",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1376-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1376-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181376-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1376-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046610",
"url": "https://bugzilla.suse.com/1046610"
},
{
"category": "self",
"summary": "SUSE Bug 1085279",
"url": "https://bugzilla.suse.com/1085279"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1089895",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "self",
"summary": "SUSE Bug 1091755",
"url": "https://bugzilla.suse.com/1091755"
},
{
"category": "self",
"summary": "SUSE Bug 1092497",
"url": "https://bugzilla.suse.com/1092497"
},
{
"category": "self",
"summary": "SUSE Bug 1094019",
"url": "https://bugzilla.suse.com/1094019"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000199 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10675 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10675/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-05-22T11:15:06Z",
"generator": {
"date": "2018-05-22T11:15:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1376-1",
"initial_release_date": "2018-05-22T11:15:06Z",
"revision_history": [
{
"date": "2018-05-22T11:15:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-default-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-default-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-default-base-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-default-devel-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-ec2-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-ec2-base-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-pae-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-pae-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-pae-base-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-pae-devel-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-source-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-source-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-syms-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-syms-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-trace-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-trace-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-trace-base-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-trace-devel-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-xen-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-xen-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-xen-base-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-xen-devel-3.0.101-0.47.106.29.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-default-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-default-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-default-base-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-default-devel-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-default-man-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-source-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-source-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-syms-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-trace-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-trace-base-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-0.47.106.29.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-default-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-default-base-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-ec2-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-source-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-syms-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-trace-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-xen-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-default-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-pae-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-source-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-xen-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-default-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-default-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-pae-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-source-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-source-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-xen-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:15:06Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:15:06Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2018-1000199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000199"
}
],
"notes": [
{
"category": "general",
"text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000199",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199"
},
{
"category": "external",
"summary": "SUSE Bug 1089895 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "external",
"summary": "SUSE Bug 1090036 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1090036"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:15:06Z",
"details": "important"
}
],
"title": "CVE-2018-1000199"
},
{
"cve": "CVE-2018-10675",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10675"
}
],
"notes": [
{
"category": "general",
"text": "The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10675",
"url": "https://www.suse.com/security/cve/CVE-2018-10675"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091755 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1091755"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:15:06Z",
"details": "moderate"
}
],
"title": "CVE-2018-10675"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:15:06Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:0020-1
Vulnerability from csaf_suse - Published: 2018-01-04 13:37 - Updated: 2018-01-04 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThis update for qemu fixes the following issues:\n\nA mitigation for a security flaw has been applied:\n\n- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from \n the host VM to the CPU, to allow enabling/disabling branch prediction features in the\n Intel CPU. (bsc#1068032)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-2018-19",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0020-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0020-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180020-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0020-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003572.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-01-04T13:37:22Z",
"generator": {
"date": "2018-01-04T13:37:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0020-1",
"initial_release_date": "2018-01-04T13:37:22Z",
"revision_history": [
{
"date": "2018-01-04T13:37:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-48.37.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-48.37.1.noarch",
"product_id": "qemu-ipxe-1.0.0-48.37.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.7.4-48.37.1.noarch",
"product": {
"name": "qemu-seabios-1.7.4-48.37.1.noarch",
"product_id": "qemu-seabios-1.7.4-48.37.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-48.37.1.noarch",
"product": {
"name": "qemu-sgabios-8-48.37.1.noarch",
"product_id": "qemu-sgabios-8-48.37.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.7.4-48.37.1.noarch",
"product": {
"name": "qemu-vgabios-1.7.4-48.37.1.noarch",
"product_id": "qemu-vgabios-1.7.4-48.37.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.37.1.ppc64le",
"product": {
"name": "qemu-2.0.2-48.37.1.ppc64le",
"product_id": "qemu-2.0.2-48.37.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.37.1.ppc64le",
"product": {
"name": "qemu-block-curl-2.0.2-48.37.1.ppc64le",
"product_id": "qemu-block-curl-2.0.2-48.37.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.37.1.ppc64le",
"product": {
"name": "qemu-guest-agent-2.0.2-48.37.1.ppc64le",
"product_id": "qemu-guest-agent-2.0.2-48.37.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.37.1.ppc64le",
"product": {
"name": "qemu-lang-2.0.2-48.37.1.ppc64le",
"product_id": "qemu-lang-2.0.2-48.37.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.0.2-48.37.1.ppc64le",
"product": {
"name": "qemu-ppc-2.0.2-48.37.1.ppc64le",
"product_id": "qemu-ppc-2.0.2-48.37.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.37.1.ppc64le",
"product": {
"name": "qemu-tools-2.0.2-48.37.1.ppc64le",
"product_id": "qemu-tools-2.0.2-48.37.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.37.1.s390x",
"product": {
"name": "qemu-2.0.2-48.37.1.s390x",
"product_id": "qemu-2.0.2-48.37.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.37.1.s390x",
"product": {
"name": "qemu-block-curl-2.0.2-48.37.1.s390x",
"product_id": "qemu-block-curl-2.0.2-48.37.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.37.1.s390x",
"product": {
"name": "qemu-guest-agent-2.0.2-48.37.1.s390x",
"product_id": "qemu-guest-agent-2.0.2-48.37.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.0.2-48.37.1.s390x",
"product": {
"name": "qemu-kvm-2.0.2-48.37.1.s390x",
"product_id": "qemu-kvm-2.0.2-48.37.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.37.1.s390x",
"product": {
"name": "qemu-lang-2.0.2-48.37.1.s390x",
"product_id": "qemu-lang-2.0.2-48.37.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.0.2-48.37.1.s390x",
"product": {
"name": "qemu-s390-2.0.2-48.37.1.s390x",
"product_id": "qemu-s390-2.0.2-48.37.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.37.1.s390x",
"product": {
"name": "qemu-tools-2.0.2-48.37.1.s390x",
"product_id": "qemu-tools-2.0.2-48.37.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.37.1.x86_64",
"product": {
"name": "qemu-2.0.2-48.37.1.x86_64",
"product_id": "qemu-2.0.2-48.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.37.1.x86_64",
"product": {
"name": "qemu-block-curl-2.0.2-48.37.1.x86_64",
"product_id": "qemu-block-curl-2.0.2-48.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.0.2-48.37.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.0.2-48.37.1.x86_64",
"product_id": "qemu-block-rbd-2.0.2-48.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.37.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.0.2-48.37.1.x86_64",
"product_id": "qemu-guest-agent-2.0.2-48.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.0.2-48.37.1.x86_64",
"product": {
"name": "qemu-kvm-2.0.2-48.37.1.x86_64",
"product_id": "qemu-kvm-2.0.2-48.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.37.1.x86_64",
"product": {
"name": "qemu-lang-2.0.2-48.37.1.x86_64",
"product_id": "qemu-lang-2.0.2-48.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.37.1.x86_64",
"product": {
"name": "qemu-tools-2.0.2-48.37.1.x86_64",
"product_id": "qemu-tools-2.0.2-48.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.0.2-48.37.1.x86_64",
"product": {
"name": "qemu-x86-2.0.2-48.37.1.x86_64",
"product_id": "qemu-x86-2.0.2-48.37.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.37.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.37.1.ppc64le"
},
"product_reference": "qemu-2.0.2-48.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.37.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.37.1.s390x"
},
"product_reference": "qemu-2.0.2-48.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.37.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.37.1.x86_64"
},
"product_reference": "qemu-2.0.2-48.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.37.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.37.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.0.2-48.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.37.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.37.1.s390x"
},
"product_reference": "qemu-block-curl-2.0.2-48.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.37.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.37.1.x86_64"
},
"product_reference": "qemu-block-curl-2.0.2-48.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.0.2-48.37.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.37.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.0.2-48.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.37.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.37.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.0.2-48.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.37.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.37.1.s390x"
},
"product_reference": "qemu-guest-agent-2.0.2-48.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.37.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.37.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.0.2-48.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-48.37.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.37.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-48.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.0.2-48.37.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.37.1.s390x"
},
"product_reference": "qemu-kvm-2.0.2-48.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.0.2-48.37.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.37.1.x86_64"
},
"product_reference": "qemu-kvm-2.0.2-48.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.37.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.37.1.ppc64le"
},
"product_reference": "qemu-lang-2.0.2-48.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.37.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.37.1.s390x"
},
"product_reference": "qemu-lang-2.0.2-48.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.37.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.37.1.x86_64"
},
"product_reference": "qemu-lang-2.0.2-48.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.0.2-48.37.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.37.1.ppc64le"
},
"product_reference": "qemu-ppc-2.0.2-48.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.0.2-48.37.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.37.1.s390x"
},
"product_reference": "qemu-s390-2.0.2-48.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.7.4-48.37.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.37.1.noarch"
},
"product_reference": "qemu-seabios-1.7.4-48.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-48.37.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.37.1.noarch"
},
"product_reference": "qemu-sgabios-8-48.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.37.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.37.1.ppc64le"
},
"product_reference": "qemu-tools-2.0.2-48.37.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.37.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.37.1.s390x"
},
"product_reference": "qemu-tools-2.0.2-48.37.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.37.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.37.1.x86_64"
},
"product_reference": "qemu-tools-2.0.2-48.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.7.4-48.37.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.37.1.noarch"
},
"product_reference": "qemu-vgabios-1.7.4-48.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.0.2-48.37.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.37.1.x86_64"
},
"product_reference": "qemu-x86-2.0.2-48.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.37.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.37.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.37.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.37.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.37.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.37.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.37.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.37.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.37.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.37.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.37.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.37.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.37.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.37.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.37.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.37.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.37.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.37.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-04T13:37:22Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:1759-1
Vulnerability from csaf_suse - Published: 2018-06-19 21:00 - Updated: 2018-06-19 21:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for microcode_ctl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for microcode_ctl fixes the following security issue:\n\n- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker\n with local user access caused by speculative execution and indirect branch\n prediction (bsc#1095735)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slessp4-microcode_ctl-13664",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1759-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1759-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181759-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1759-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004203.html"
},
{
"category": "self",
"summary": "SUSE Bug 1095735",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for microcode_ctl",
"tracking": {
"current_release_date": "2018-06-19T21:00:52Z",
"generator": {
"date": "2018-06-19T21:00:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1759-1",
"initial_release_date": "2018-06-19T21:00:52Z",
"revision_history": [
{
"date": "2018-06-19T21:00:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "microcode_ctl-1.17-102.83.21.1.i586",
"product": {
"name": "microcode_ctl-1.17-102.83.21.1.i586",
"product_id": "microcode_ctl-1.17-102.83.21.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "microcode_ctl-1.17-102.83.21.1.x86_64",
"product": {
"name": "microcode_ctl-1.17-102.83.21.1.x86_64",
"product_id": "microcode_ctl-1.17-102.83.21.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.21.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.21.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.21.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.21.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.21.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.21.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.21.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.21.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.21.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.21.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-19T21:00:52Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:1784-1
Vulnerability from csaf_suse - Published: 2018-06-22 11:42 - Updated: 2018-06-22 11:42Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel modules packages",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe following kernel modules were rebuild with \u0027retpoline\u0027 enablement\nto allow full mitigation of the Spectre Variant 2 (CVE-2017-5715, bsc#1068032)\n\nOFED was adjusted to add an entry to control the loading/unloading of cxgb4 to\n/etc/sysconf/infiniband (bsc#926856).\n\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-kmps-20180611-13671,slertesp4-kmps-20180611-13671,slessp4-kmps-20180611-13671",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1784-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1784-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181784-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1784-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004215.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 926856",
"url": "https://bugzilla.suse.com/926856"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for kernel modules packages",
"tracking": {
"current_release_date": "2018-06-22T11:42:48Z",
"generator": {
"date": "2018-06-22T11:42:48Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1784-1",
"initial_release_date": "2018-06-22T11:42:48Z",
"revision_history": [
{
"date": "2018-06-22T11:42:48Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ofed-devel-1.5.4.1-22.3.1.i586",
"product": {
"name": "ofed-devel-1.5.4.1-22.3.1.i586",
"product_id": "ofed-devel-1.5.4.1-22.3.1.i586"
}
},
{
"category": "product_version",
"name": "iscsitarget-1.4.20-0.43.2.1.i586",
"product": {
"name": "iscsitarget-1.4.20-0.43.2.1.i586",
"product_id": "iscsitarget-1.4.20-0.43.2.1.i586"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"product": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"product_id": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"product": {
"name": "iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"product_id": "iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"product": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"product_id": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"product": {
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"product_id": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586"
}
},
{
"category": "product_version",
"name": "ofed-1.5.4.1-22.3.1.i586",
"product": {
"name": "ofed-1.5.4.1-22.3.1.i586",
"product_id": "ofed-1.5.4.1-22.3.1.i586"
}
},
{
"category": "product_version",
"name": "ofed-doc-1.5.4.1-22.3.1.i586",
"product": {
"name": "ofed-doc-1.5.4.1-22.3.1.i586",
"product_id": "ofed-doc-1.5.4.1-22.3.1.i586"
}
},
{
"category": "product_version",
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"product": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"product_id": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586"
}
},
{
"category": "product_version",
"name": "ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"product": {
"name": "ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"product_id": "ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586"
}
},
{
"category": "product_version",
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"product": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"product_id": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "ofed-devel-1.5.4.1-22.3.1.ia64",
"product": {
"name": "ofed-devel-1.5.4.1-22.3.1.ia64",
"product_id": "ofed-devel-1.5.4.1-22.3.1.ia64"
}
},
{
"category": "product_version",
"name": "iscsitarget-1.4.20-0.43.2.1.ia64",
"product": {
"name": "iscsitarget-1.4.20-0.43.2.1.ia64",
"product_id": "iscsitarget-1.4.20-0.43.2.1.ia64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"product": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"product_id": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"product": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"product_id": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64"
}
},
{
"category": "product_version",
"name": "ofed-1.5.4.1-22.3.1.ia64",
"product": {
"name": "ofed-1.5.4.1-22.3.1.ia64",
"product_id": "ofed-1.5.4.1-22.3.1.ia64"
}
},
{
"category": "product_version",
"name": "ofed-doc-1.5.4.1-22.3.1.ia64",
"product": {
"name": "ofed-doc-1.5.4.1-22.3.1.ia64",
"product_id": "ofed-doc-1.5.4.1-22.3.1.ia64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"product": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"product_id": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"product": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"product_id": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ofed-devel-1.5.4.1-22.3.1.ppc64",
"product": {
"name": "ofed-devel-1.5.4.1-22.3.1.ppc64",
"product_id": "ofed-devel-1.5.4.1-22.3.1.ppc64"
}
},
{
"category": "product_version",
"name": "iscsitarget-1.4.20-0.43.2.1.ppc64",
"product": {
"name": "iscsitarget-1.4.20-0.43.2.1.ppc64",
"product_id": "iscsitarget-1.4.20-0.43.2.1.ppc64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"product": {
"name": "iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"product_id": "iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"product": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"product_id": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"product": {
"name": "iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"product_id": "iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"product": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"product_id": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64"
}
},
{
"category": "product_version",
"name": "ofed-1.5.4.1-22.3.1.ppc64",
"product": {
"name": "ofed-1.5.4.1-22.3.1.ppc64",
"product_id": "ofed-1.5.4.1-22.3.1.ppc64"
}
},
{
"category": "product_version",
"name": "ofed-doc-1.5.4.1-22.3.1.ppc64",
"product": {
"name": "ofed-doc-1.5.4.1-22.3.1.ppc64",
"product_id": "ofed-doc-1.5.4.1-22.3.1.ppc64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"product": {
"name": "ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"product_id": "ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"product": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"product_id": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"product": {
"name": "ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"product_id": "ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"product": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"product_id": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "iscsitarget-1.4.20-0.43.2.1.s390x",
"product": {
"name": "iscsitarget-1.4.20-0.43.2.1.s390x",
"product_id": "iscsitarget-1.4.20-0.43.2.1.s390x"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"product": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"product_id": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"product": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"product_id": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x"
}
},
{
"category": "product_version",
"name": "ofed-1.5.4.1-22.3.1.s390x",
"product": {
"name": "ofed-1.5.4.1-22.3.1.s390x",
"product_id": "ofed-1.5.4.1-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "ofed-doc-1.5.4.1-22.3.1.s390x",
"product": {
"name": "ofed-doc-1.5.4.1-22.3.1.s390x",
"product_id": "ofed-doc-1.5.4.1-22.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ofed-devel-1.5.4.1-22.3.1.x86_64",
"product": {
"name": "ofed-devel-1.5.4.1-22.3.1.x86_64",
"product_id": "ofed-devel-1.5.4.1-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64",
"product": {
"name": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64",
"product_id": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64",
"product": {
"name": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64",
"product_id": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64",
"product": {
"name": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64",
"product_id": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64",
"product": {
"name": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64",
"product_id": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "iscsitarget-1.4.20-0.43.2.1.x86_64",
"product": {
"name": "iscsitarget-1.4.20-0.43.2.1.x86_64",
"product_id": "iscsitarget-1.4.20-0.43.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"product": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"product_id": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"product": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"product_id": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"product": {
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"product_id": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "ofed-1.5.4.1-22.3.1.x86_64",
"product": {
"name": "ofed-1.5.4.1-22.3.1.x86_64",
"product_id": "ofed-1.5.4.1-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ofed-doc-1.5.4.1-22.3.1.x86_64",
"product": {
"name": "ofed-doc-1.5.4.1-22.3.1.x86_64",
"product_id": "ofed-doc-1.5.4.1-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"product": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"product_id": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"product": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"product_id": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-devel-1.5.4.1-22.3.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.i586"
},
"product_reference": "ofed-devel-1.5.4.1-22.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-devel-1.5.4.1-22.3.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.ia64"
},
"product_reference": "ofed-devel-1.5.4.1-22.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-devel-1.5.4.1-22.3.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.ppc64"
},
"product_reference": "ofed-devel-1.5.4.1-22.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-devel-1.5.4.1-22.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.x86_64"
},
"product_reference": "ofed-devel-1.5.4.1-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64"
},
"product_reference": "iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64"
},
"product_reference": "iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64"
},
"product_reference": "ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64"
},
"product_reference": "ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.i586"
},
"product_reference": "iscsitarget-1.4.20-0.43.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.ia64"
},
"product_reference": "iscsitarget-1.4.20-0.43.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.ppc64"
},
"product_reference": "iscsitarget-1.4.20-0.43.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.s390x"
},
"product_reference": "iscsitarget-1.4.20-0.43.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.x86_64"
},
"product_reference": "iscsitarget-1.4.20-0.43.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64"
},
"product_reference": "iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586"
},
"product_reference": "iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64"
},
"product_reference": "iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586"
},
"product_reference": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64"
},
"product_reference": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.3.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.i586"
},
"product_reference": "ofed-1.5.4.1-22.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.3.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.ia64"
},
"product_reference": "ofed-1.5.4.1-22.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.3.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.ppc64"
},
"product_reference": "ofed-1.5.4.1-22.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.3.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.s390x"
},
"product_reference": "ofed-1.5.4.1-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.x86_64"
},
"product_reference": "ofed-1.5.4.1-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.3.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.i586"
},
"product_reference": "ofed-doc-1.5.4.1-22.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.3.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.ia64"
},
"product_reference": "ofed-doc-1.5.4.1-22.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.3.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.ppc64"
},
"product_reference": "ofed-doc-1.5.4.1-22.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.3.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.s390x"
},
"product_reference": "ofed-doc-1.5.4.1-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.x86_64"
},
"product_reference": "ofed-doc-1.5.4.1-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64"
},
"product_reference": "ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586"
},
"product_reference": "ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64"
},
"product_reference": "ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.i586"
},
"product_reference": "iscsitarget-1.4.20-0.43.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.ia64"
},
"product_reference": "iscsitarget-1.4.20-0.43.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.ppc64"
},
"product_reference": "iscsitarget-1.4.20-0.43.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.s390x"
},
"product_reference": "iscsitarget-1.4.20-0.43.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-1.4.20-0.43.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.x86_64"
},
"product_reference": "iscsitarget-1.4.20-0.43.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64"
},
"product_reference": "iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64"
},
"product_reference": "iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586"
},
"product_reference": "iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64"
},
"product_reference": "iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64"
},
"product_reference": "iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586"
},
"product_reference": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64"
},
"product_reference": "iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.3.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.i586"
},
"product_reference": "ofed-1.5.4.1-22.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.3.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.ia64"
},
"product_reference": "ofed-1.5.4.1-22.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.3.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.ppc64"
},
"product_reference": "ofed-1.5.4.1-22.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.s390x"
},
"product_reference": "ofed-1.5.4.1-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-1.5.4.1-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.x86_64"
},
"product_reference": "ofed-1.5.4.1-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.3.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.i586"
},
"product_reference": "ofed-doc-1.5.4.1-22.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.3.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.ia64"
},
"product_reference": "ofed-doc-1.5.4.1-22.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.3.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.ppc64"
},
"product_reference": "ofed-doc-1.5.4.1-22.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.s390x"
},
"product_reference": "ofed-doc-1.5.4.1-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-doc-1.5.4.1-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.x86_64"
},
"product_reference": "ofed-doc-1.5.4.1-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64"
},
"product_reference": "ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64"
},
"product_reference": "ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586"
},
"product_reference": "ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64"
},
"product_reference": "ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64"
},
"product_reference": "ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.24-0.43.2.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.24-22.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-1.4.20-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:ofed-1.5.4.1-22.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:ofed-doc-1.5.4.1-22.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-1.4.20-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-1.5.4.1-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-doc-1.5.4.1-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ofed-devel-1.5.4.1-22.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-22T11:42:48Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
SUSE-SU-2018:0040-1
Vulnerability from csaf_suse - Published: 2018-01-08 16:02 - Updated: 2018-01-08 16:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThis update adds mitigations for various side channel attacks against\nmodern CPUs that could disclose content of otherwise unreadable memory\n(bnc#1068032).\n\n- CVE-2017-5753: Local attackers on systems with modern CPUs featuring\n deep instruction pipelining could use attacker controllable speculative\n execution over code patterns in the Linux Kernel to leak content from\n otherwise not readable memory in the same address space, allowing\n retrieval of passwords, cryptographic keys and other secrets.\n\n This problem is mitigated by adding speculative fencing on affected\n code paths throughout the Linux kernel.\n\n\n- CVE-2017-5715: Local attackers on systems with modern CPUs featuring\n branch prediction could use mispredicted branches to speculatively execute\n code patterns that in turn could be made to leak other non-readable\n content in the same address space, an attack similar to CVE-2017-5753.\n\n This problem is mitigated by disabling predictive branches, depending\n on CPU architecture either by firmware updates and/or fixes in the\n user-kernel privilege boundaries.\n\n Please contact your CPU / hardware vendor for potential microcode\n or BIOS updates needed for this fix.\n\n As this feature can have a performance impact, it can be disabled\n using the \u0027nospec\u0027 kernel commandline option.\n\n\n- CVE-2017-5754: Local attackers on systems with modern CPUs featuring\n deep instruction pipelining could use code patterns in userspace to\n speculative executive code that would read otherwise read protected\n memory, an attack similar to CVE-2017-5753.\n\n This problem is mitigated by unmapping the Linux Kernel from the user\n address space during user code execution, following a approach called\n \u0027KAISER\u0027. The terms used here are \u0027KAISER\u0027 / \u0027Kernel Address Isolation\u0027\n and \u0027PTI\u0027 / \u0027Page Table Isolation\u0027.\n\n This feature is disabled on unaffected architectures.\n\n This feature can be enabled / disabled by the \u0027pti=[on|off|auto]\u0027 or\n \u0027nopti\u0027 commandline options.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ) was vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space (bnc#1057389).\n- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).\n- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bnc#1063667).\n- CVE-2017-13167: An elevation of privilege vulnerability in the kernel sound timer was fixed. (bnc#1072876).\n- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).\n- CVE-2017-14140: The move_pages system call in mm/migrate.c in the Linux kernel didn\u0027t check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR (bnc#1057179).\n- CVE-2017-14340: The XFS_IS_REALTIME_INODE macro in fs/xfs/xfs_linux.h in the Linux kernel did not verify that a filesystem has a realtime device, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via vectors related to setting an RHINHERIT flag on a directory (bnc#1058524).\n- CVE-2017-15102: The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel allowed local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference (bnc#1066705).\n- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).\n- CVE-2017-15265: Race condition in the ALSA subsystem in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c (bnc#1062520).\n- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192 (bnc#1045327).\n- CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel did not ensure that an l2cap socket is available, which allowed local users to gain privileges via a crafted application (bnc#1071470).\n- CVE-2017-16525: The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup (bnc#1066618).\n- CVE-2017-16527: sound/usb/mixer.c in the Linux kernel allowed local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066625).\n- CVE-2017-16529: The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066650).\n- CVE-2017-16531: drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor (bnc#1066671).\n- CVE-2017-16534: The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066693).\n- CVE-2017-16535: The usb_get_bos_descriptor function in drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066700).\n- CVE-2017-16536: The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066606).\n- CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066573).\n- CVE-2017-16538: drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel allowed local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner) (bnc#1066569).\n- CVE-2017-16649: The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel allowed local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067085).\n- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702 1069708).\n- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695 1074033).\n- CVE-2017-17558: The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel did not consider the maximum number of configurations and interfaces before attempting to release resources, which allowed local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device (bnc#1072561).\n- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).\n- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).\n- CVE-2017-7472: The KEYS subsystem in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).\n- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).\n\nThe following non-security bugs were fixed:\n\n- asm alternatives: remove incorrect alignment notes.\n- getcwd: Close race with d_move called by lustre (bsc#1052593).\n- kabi: silence spurious kabi error in net/sctp/socket.c (bsc#1068671).\n- kaiser: add \u0027nokaiser\u0027 boot option, using ALTERNATIVE.\n- kaiser: fix ldt freeing.\n- kaiser: Kernel Address Isolation.\n- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.\n- kaiser: work around kABI.\n- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).\n- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).\n- mac80211: do not compare TKIP TX MIC key in reinstall prevention (bsc#1066472).\n- mm/mmu_context, sched/core: Fix mmu_context.h assumption.\n- nfs: Remove asserts from the NFS XDR code (bsc#1063544).\n- ptrace: Add a new thread access check (bsc#1068032).\n- Revert \u0027mac80211: accept key reinstall without changing anything\u0027 This reverts commit 1def0d4e1446974356bacd9f4be06eee32b66473.\n- s390: add ppa to system call and program check path (bsc#1068032).\n- s390: introduce CPU alternatives (bsc#1068032).\n- s390/spinlock: add gmb memory barrier (bsc#1068032).\n- sched/core: Add switch_mm_irqs_off() and use it in the scheduler.\n- sched/core: Idle_task_exit() shouldn\u0027t use switch_mm_irqs_off().\n- scsi: mpt2sas: fix cleanup on controller resource mapping failure (bsc#999245).\n- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).\n- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).\n- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).\n- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).\n- temporary fix (bsc#1068032).\n- usb: uas: fix bug in handling of alternate settings (bsc#1071074).\n- x86-64: Give vvars their own page.\n- x86-64: Map the HPET NX.\n- x86/alternatives: Add instruction padding.\n- x86/alternatives: Cleanup DPRINTK macro.\n- x86/alternatives: Make JMPs more robust.\n- x86/alternatives: Use optimized NOPs for padding.\n- x86/boot: Add early cmdline parsing for options with arguments.\n- x86, boot: Carve out early cmdline parsing function.\n- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).\n- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).\n- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).\n- x86/CPU: Check speculation control CPUID bit (bsc#1068032).\n- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).\n- x86/entry: Add a function to overwrite the RSB (bsc#1068032).\n- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).\n- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).\n- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).\n- x86/idle: Toggle IBRS when going idle (bsc#1068032).\n- x86/kaiser: Check boottime cmdline params.\n- x86/kaiser: disable vmstat accounting.\n- x86/kaiser: Move feature detection up (bsc#1068032).\n- x86/kaiser: propagate info to /proc/cpuinfo.\n- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.\n- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).\n- x86/kvm: Flush IBP when switching VMs (bsc#1068032).\n- x86/kvm: Pad RSB on VM transition (bsc#1068032).\n- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).\n- x86: Make alternative instruction pointers relative.\n- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).\n- x86/mm/64: Fix reboot interaction with CR4.PCIDE.\n- x86/mm: Add a \u0027noinvpcid\u0027 boot option to turn off INVPCID.\n- x86/mm: Add INVPCID helpers.\n- x86/mm: Add the \u0027nopcid\u0027 boot option to turn off PCID.\n- x86/mm: Build arch/x86/mm/tlb.c even on !SMP.\n- x86/mm: Disable PCID on 32-bit kernels.\n- x86/mm: Enable CR4.PCIDE on supported systems.\n- x86/mm: fix bad backport to disable PCID on Xen.\n- x86/mm: Fix INVPCID asm constraint.\n- x86/mm: If INVPCID is available, use it to flush global mappings.\n- x86/mm/kaiser: re-enable vsyscalls.\n- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).\n- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.\n- x86/mm, sched/core: Turn off IRQs in switch_mm().\n- x86/mm, sched/core: Uninline switch_mm().\n- x86/mm: Set IBPB upon context switch (bsc#1068032).\n- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).\n- x86/spec: Add IBRS control functions (bsc#1068032).\n- x86/spec: Add \u0027nospec\u0027 chicken bit (bsc#1068032).\n- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).\n- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).\n- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).\n- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).\n- x86/svm: Add code to clear registers on VM exit (bsc#1068032).\n- x86/svm: Clobber the RSB on VM exit (bsc#1068032).\n- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).\n- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).\n- xen/kaiser: add \u0027nokaiser\u0027 boot option, using ALTERNATIVE.\n- xen/KAISER: Kernel Address Isolation.\n- xen/kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.\n- xen/kaiser: work around kABI.\n- xen/x86-64: Give vvars their own page.\n- xen/x86-64: Map the HPET NX.\n- xen/x86/alternatives: Add instruction padding.\n- xen/x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.\n- xen/x86/mm: Enable CR4.PCIDE on supported systems.\n- xen/x86/mm/kaiser: re-enable vsyscalls.\n- xen/x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.\n- xen: x86/mm, sched/core: Turn off IRQs in switch_mm().\n- xen: x86/mm, sched/core: Uninline switch_mm().\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-kernel-20170109-13398,slessp3-kernel-20170109-13398,slexsp3-kernel-20170109-13398",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0040-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0040-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180040-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0040-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html"
},
{
"category": "self",
"summary": "SUSE Bug 1010175",
"url": "https://bugzilla.suse.com/1010175"
},
{
"category": "self",
"summary": "SUSE Bug 1034862",
"url": "https://bugzilla.suse.com/1034862"
},
{
"category": "self",
"summary": "SUSE Bug 1045327",
"url": "https://bugzilla.suse.com/1045327"
},
{
"category": "self",
"summary": "SUSE Bug 1050231",
"url": "https://bugzilla.suse.com/1050231"
},
{
"category": "self",
"summary": "SUSE Bug 1052593",
"url": "https://bugzilla.suse.com/1052593"
},
{
"category": "self",
"summary": "SUSE Bug 1056982",
"url": "https://bugzilla.suse.com/1056982"
},
{
"category": "self",
"summary": "SUSE Bug 1057179",
"url": "https://bugzilla.suse.com/1057179"
},
{
"category": "self",
"summary": "SUSE Bug 1057389",
"url": "https://bugzilla.suse.com/1057389"
},
{
"category": "self",
"summary": "SUSE Bug 1058524",
"url": "https://bugzilla.suse.com/1058524"
},
{
"category": "self",
"summary": "SUSE Bug 1062520",
"url": "https://bugzilla.suse.com/1062520"
},
{
"category": "self",
"summary": "SUSE Bug 1063544",
"url": "https://bugzilla.suse.com/1063544"
},
{
"category": "self",
"summary": "SUSE Bug 1063667",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "self",
"summary": "SUSE Bug 1066295",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "self",
"summary": "SUSE Bug 1066472",
"url": "https://bugzilla.suse.com/1066472"
},
{
"category": "self",
"summary": "SUSE Bug 1066569",
"url": "https://bugzilla.suse.com/1066569"
},
{
"category": "self",
"summary": "SUSE Bug 1066573",
"url": "https://bugzilla.suse.com/1066573"
},
{
"category": "self",
"summary": "SUSE Bug 1066606",
"url": "https://bugzilla.suse.com/1066606"
},
{
"category": "self",
"summary": "SUSE Bug 1066618",
"url": "https://bugzilla.suse.com/1066618"
},
{
"category": "self",
"summary": "SUSE Bug 1066625",
"url": "https://bugzilla.suse.com/1066625"
},
{
"category": "self",
"summary": "SUSE Bug 1066650",
"url": "https://bugzilla.suse.com/1066650"
},
{
"category": "self",
"summary": "SUSE Bug 1066671",
"url": "https://bugzilla.suse.com/1066671"
},
{
"category": "self",
"summary": "SUSE Bug 1066693",
"url": "https://bugzilla.suse.com/1066693"
},
{
"category": "self",
"summary": "SUSE Bug 1066700",
"url": "https://bugzilla.suse.com/1066700"
},
{
"category": "self",
"summary": "SUSE Bug 1066705",
"url": "https://bugzilla.suse.com/1066705"
},
{
"category": "self",
"summary": "SUSE Bug 1067085",
"url": "https://bugzilla.suse.com/1067085"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068671",
"url": "https://bugzilla.suse.com/1068671"
},
{
"category": "self",
"summary": "SUSE Bug 1069702",
"url": "https://bugzilla.suse.com/1069702"
},
{
"category": "self",
"summary": "SUSE Bug 1069708",
"url": "https://bugzilla.suse.com/1069708"
},
{
"category": "self",
"summary": "SUSE Bug 1070771",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "self",
"summary": "SUSE Bug 1071074",
"url": "https://bugzilla.suse.com/1071074"
},
{
"category": "self",
"summary": "SUSE Bug 1071470",
"url": "https://bugzilla.suse.com/1071470"
},
{
"category": "self",
"summary": "SUSE Bug 1071695",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "self",
"summary": "SUSE Bug 1072561",
"url": "https://bugzilla.suse.com/1072561"
},
{
"category": "self",
"summary": "SUSE Bug 1072876",
"url": "https://bugzilla.suse.com/1072876"
},
{
"category": "self",
"summary": "SUSE Bug 1073792",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "self",
"summary": "SUSE Bug 1073874",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "self",
"summary": "SUSE Bug 1074033",
"url": "https://bugzilla.suse.com/1074033"
},
{
"category": "self",
"summary": "SUSE Bug 999245",
"url": "https://bugzilla.suse.com/999245"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000251 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000251/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11600 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13167 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14106 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14140 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14340 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14340/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15102 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15115 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15265 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15274 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15274/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15868 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16525 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16525/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16527 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16527/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16529 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16529/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16531 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16531/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16534 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16534/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16535 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16535/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16536 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16536/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16537 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16538 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16538/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16649 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16649/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16939 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16939/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17558 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17805 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17806 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7472 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7472/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8824 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8824/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-01-08T16:02:54Z",
"generator": {
"date": "2018-01-08T16:02:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0040-1",
"initial_release_date": "2018-01-08T16:02:54Z",
"revision_history": [
{
"date": "2018-01-08T16:02:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-default-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-default-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-default-base-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-default-devel-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-ec2-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-ec2-base-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-pae-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-pae-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-pae-base-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-pae-devel-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-source-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-source-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-syms-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-syms-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-trace-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-trace-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-trace-base-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-trace-devel-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-xen-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-xen-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-xen-base-3.0.101-0.47.106.11.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"product_id": "kernel-xen-devel-3.0.101-0.47.106.11.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.106.11.1.s390x",
"product": {
"name": "kernel-default-3.0.101-0.47.106.11.1.s390x",
"product_id": "kernel-default-3.0.101-0.47.106.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"product_id": "kernel-default-base-3.0.101-0.47.106.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"product_id": "kernel-default-devel-3.0.101-0.47.106.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"product_id": "kernel-default-man-3.0.101-0.47.106.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.106.11.1.s390x",
"product": {
"name": "kernel-source-3.0.101-0.47.106.11.1.s390x",
"product_id": "kernel-source-3.0.101-0.47.106.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.106.11.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-0.47.106.11.1.s390x",
"product_id": "kernel-syms-3.0.101-0.47.106.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.106.11.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-0.47.106.11.1.s390x",
"product_id": "kernel-trace-3.0.101-0.47.106.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"product_id": "kernel-trace-base-3.0.101-0.47.106.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-0.47.106.11.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-default-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-default-base-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-ec2-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-source-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-syms-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-trace-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-xen-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-0.47.106.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-default-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-pae-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-source-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-xen-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-default-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x"
},
"product_reference": "kernel-default-3.0.101-0.47.106.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-0.47.106.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-pae-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-source-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x"
},
"product_reference": "kernel-source-3.0.101-0.47.106.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-xen-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.106.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-1000251",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000251"
}
],
"notes": [
{
"category": "general",
"text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000251",
"url": "https://www.suse.com/security/cve/CVE-2017-1000251"
},
{
"category": "external",
"summary": "SUSE Bug 1057389 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1057389"
},
{
"category": "external",
"summary": "SUSE Bug 1057950 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1057950"
},
{
"category": "external",
"summary": "SUSE Bug 1070535 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1070535"
},
{
"category": "external",
"summary": "SUSE Bug 1072117 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1072117"
},
{
"category": "external",
"summary": "SUSE Bug 1072162 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1072162"
},
{
"category": "external",
"summary": "SUSE Bug 1120758 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1120758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "important"
}
],
"title": "CVE-2017-1000251"
},
{
"cve": "CVE-2017-11600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11600"
}
],
"notes": [
{
"category": "general",
"text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11600",
"url": "https://www.suse.com/security/cve/CVE-2017-11600"
},
{
"category": "external",
"summary": "SUSE Bug 1050231 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1050231"
},
{
"category": "external",
"summary": "SUSE Bug 1096564 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1096564"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-11600",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "important"
}
],
"title": "CVE-2017-11600"
},
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-13167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13167"
}
],
"notes": [
{
"category": "general",
"text": "An elevation of privilege vulnerability in the kernel sound timer. Product: Android. Versions: Android kernel. Android ID A-37240993.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13167",
"url": "https://www.suse.com/security/cve/CVE-2017-13167"
},
{
"category": "external",
"summary": "SUSE Bug 1072876 for CVE-2017-13167",
"url": "https://bugzilla.suse.com/1072876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "low"
}
],
"title": "CVE-2017-13167"
},
{
"cve": "CVE-2017-14106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14106"
}
],
"notes": [
{
"category": "general",
"text": "The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14106",
"url": "https://www.suse.com/security/cve/CVE-2017-14106"
},
{
"category": "external",
"summary": "SUSE Bug 1056982 for CVE-2017-14106",
"url": "https://bugzilla.suse.com/1056982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-14106"
},
{
"cve": "CVE-2017-14140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14140"
}
],
"notes": [
{
"category": "general",
"text": "The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn\u0027t check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14140",
"url": "https://www.suse.com/security/cve/CVE-2017-14140"
},
{
"category": "external",
"summary": "SUSE Bug 1057179 for CVE-2017-14140",
"url": "https://bugzilla.suse.com/1057179"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "low"
}
],
"title": "CVE-2017-14140"
},
{
"cve": "CVE-2017-14340",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14340"
}
],
"notes": [
{
"category": "general",
"text": "The XFS_IS_REALTIME_INODE macro in fs/xfs/xfs_linux.h in the Linux kernel before 4.13.2 does not verify that a filesystem has a realtime device, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via vectors related to setting an RHINHERIT flag on a directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14340",
"url": "https://www.suse.com/security/cve/CVE-2017-14340"
},
{
"category": "external",
"summary": "SUSE Bug 1058524 for CVE-2017-14340",
"url": "https://bugzilla.suse.com/1058524"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-14340"
},
{
"cve": "CVE-2017-15102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15102"
}
],
"notes": [
{
"category": "general",
"text": "The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel before 4.8.1 allows local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15102",
"url": "https://www.suse.com/security/cve/CVE-2017-15102"
},
{
"category": "external",
"summary": "SUSE Bug 1066705 for CVE-2017-15102",
"url": "https://bugzilla.suse.com/1066705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-15102"
},
{
"cve": "CVE-2017-15115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15115"
}
],
"notes": [
{
"category": "general",
"text": "The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15115",
"url": "https://www.suse.com/security/cve/CVE-2017-15115"
},
{
"category": "external",
"summary": "SUSE Bug 1068671 for CVE-2017-15115",
"url": "https://bugzilla.suse.com/1068671"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15115",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-15115"
},
{
"cve": "CVE-2017-15265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15265"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15265",
"url": "https://www.suse.com/security/cve/CVE-2017-15265"
},
{
"category": "external",
"summary": "SUSE Bug 1062520 for CVE-2017-15265",
"url": "https://bugzilla.suse.com/1062520"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15265",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "low"
}
],
"title": "CVE-2017-15265"
},
{
"cve": "CVE-2017-15274",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15274"
}
],
"notes": [
{
"category": "general",
"text": "security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15274",
"url": "https://www.suse.com/security/cve/CVE-2017-15274"
},
{
"category": "external",
"summary": "SUSE Bug 1045327 for CVE-2017-15274",
"url": "https://bugzilla.suse.com/1045327"
},
{
"category": "external",
"summary": "SUSE Bug 1062471 for CVE-2017-15274",
"url": "https://bugzilla.suse.com/1062471"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "low"
}
],
"title": "CVE-2017-15274"
},
{
"cve": "CVE-2017-15868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15868"
}
],
"notes": [
{
"category": "general",
"text": "The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel before 3.19 does not ensure that an l2cap socket is available, which allows local users to gain privileges via a crafted application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15868",
"url": "https://www.suse.com/security/cve/CVE-2017-15868"
},
{
"category": "external",
"summary": "SUSE Bug 1071470 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1071470"
},
{
"category": "external",
"summary": "SUSE Bug 1071471 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1071471"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15868",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "important"
}
],
"title": "CVE-2017-15868"
},
{
"cve": "CVE-2017-16525",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16525"
}
],
"notes": [
{
"category": "general",
"text": "The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16525",
"url": "https://www.suse.com/security/cve/CVE-2017-16525"
},
{
"category": "external",
"summary": "SUSE Bug 1066618 for CVE-2017-16525",
"url": "https://bugzilla.suse.com/1066618"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16525",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-16525"
},
{
"cve": "CVE-2017-16527",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16527"
}
],
"notes": [
{
"category": "general",
"text": "sound/usb/mixer.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16527",
"url": "https://www.suse.com/security/cve/CVE-2017-16527"
},
{
"category": "external",
"summary": "SUSE Bug 1066625 for CVE-2017-16527",
"url": "https://bugzilla.suse.com/1066625"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16527",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16527",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-16527"
},
{
"cve": "CVE-2017-16529",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16529"
}
],
"notes": [
{
"category": "general",
"text": "The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16529",
"url": "https://www.suse.com/security/cve/CVE-2017-16529"
},
{
"category": "external",
"summary": "SUSE Bug 1066650 for CVE-2017-16529",
"url": "https://bugzilla.suse.com/1066650"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16529",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16529",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-16529"
},
{
"cve": "CVE-2017-16531",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16531"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/core/config.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16531",
"url": "https://www.suse.com/security/cve/CVE-2017-16531"
},
{
"category": "external",
"summary": "SUSE Bug 1066671 for CVE-2017-16531",
"url": "https://bugzilla.suse.com/1066671"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16531",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16531",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-16531"
},
{
"cve": "CVE-2017-16534",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16534"
}
],
"notes": [
{
"category": "general",
"text": "The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16534",
"url": "https://www.suse.com/security/cve/CVE-2017-16534"
},
{
"category": "external",
"summary": "SUSE Bug 1066693 for CVE-2017-16534",
"url": "https://bugzilla.suse.com/1066693"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16534",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-16534"
},
{
"cve": "CVE-2017-16535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16535"
}
],
"notes": [
{
"category": "general",
"text": "The usb_get_bos_descriptor function in drivers/usb/core/config.c in the Linux kernel before 4.13.10 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16535",
"url": "https://www.suse.com/security/cve/CVE-2017-16535"
},
{
"category": "external",
"summary": "SUSE Bug 1066700 for CVE-2017-16535",
"url": "https://bugzilla.suse.com/1066700"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16535",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16535",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-16535"
},
{
"cve": "CVE-2017-16536",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16536"
}
],
"notes": [
{
"category": "general",
"text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16536",
"url": "https://www.suse.com/security/cve/CVE-2017-16536"
},
{
"category": "external",
"summary": "SUSE Bug 1066606 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1066606"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-16536"
},
{
"cve": "CVE-2017-16537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16537"
}
],
"notes": [
{
"category": "general",
"text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16537",
"url": "https://www.suse.com/security/cve/CVE-2017-16537"
},
{
"category": "external",
"summary": "SUSE Bug 1066573 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1066573"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-16537"
},
{
"cve": "CVE-2017-16538",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16538"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16538",
"url": "https://www.suse.com/security/cve/CVE-2017-16538"
},
{
"category": "external",
"summary": "SUSE Bug 1066569 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1066569"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16538",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-16538"
},
{
"cve": "CVE-2017-16649",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16649"
}
],
"notes": [
{
"category": "general",
"text": "The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16649",
"url": "https://www.suse.com/security/cve/CVE-2017-16649"
},
{
"category": "external",
"summary": "SUSE Bug 1067085 for CVE-2017-16649",
"url": "https://bugzilla.suse.com/1067085"
},
{
"category": "external",
"summary": "SUSE Bug 1067115 for CVE-2017-16649",
"url": "https://bugzilla.suse.com/1067115"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16649",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-16649"
},
{
"cve": "CVE-2017-16939",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16939"
}
],
"notes": [
{
"category": "general",
"text": "The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16939",
"url": "https://www.suse.com/security/cve/CVE-2017-16939"
},
{
"category": "external",
"summary": "SUSE Bug 1069702 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1069702"
},
{
"category": "external",
"summary": "SUSE Bug 1069708 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1069708"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1120260 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1120260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-16939"
},
{
"cve": "CVE-2017-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17450"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17450",
"url": "https://www.suse.com/security/cve/CVE-2017-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1071695 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "external",
"summary": "SUSE Bug 1074033 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1074033"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-17450"
},
{
"cve": "CVE-2017-17558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17558"
}
],
"notes": [
{
"category": "general",
"text": "The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17558",
"url": "https://www.suse.com/security/cve/CVE-2017-17558"
},
{
"category": "external",
"summary": "SUSE Bug 1072561 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1072561"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-17558",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-17558"
},
{
"cve": "CVE-2017-17805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17805"
}
],
"notes": [
{
"category": "general",
"text": "The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17805",
"url": "https://www.suse.com/security/cve/CVE-2017-17805"
},
{
"category": "external",
"summary": "SUSE Bug 1073792 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1073792"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17805",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "important"
}
],
"title": "CVE-2017-17805"
},
{
"cve": "CVE-2017-17806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17806"
}
],
"notes": [
{
"category": "general",
"text": "The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17806",
"url": "https://www.suse.com/security/cve/CVE-2017-17806"
},
{
"category": "external",
"summary": "SUSE Bug 1073874 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1073874"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17806",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "low"
}
],
"title": "CVE-2017-17806"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-7472",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7472"
}
],
"notes": [
{
"category": "general",
"text": "The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7472",
"url": "https://www.suse.com/security/cve/CVE-2017-7472"
},
{
"category": "external",
"summary": "SUSE Bug 1034862 for CVE-2017-7472",
"url": "https://bugzilla.suse.com/1034862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-7472"
},
{
"cve": "CVE-2017-8824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8824"
}
],
"notes": [
{
"category": "general",
"text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8824",
"url": "https://www.suse.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "SUSE Bug 1070771 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "external",
"summary": "SUSE Bug 1076734 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1076734"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.11.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-08T16:02:54Z",
"details": "important"
}
],
"title": "CVE-2017-8824"
}
]
}
SUSE-SU-2018:2631-2
Vulnerability from csaf_suse - Published: 2018-10-18 12:49 - Updated: 2018-10-18 12:49Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\nThis new feature was added:\n\n- bsc#1094325, bsc#1094725: libxl: Enable virsh blockresize for XEN guests\n\nThis security issue was fixed:\n\n- CVE-2017-5715: Additional fixes for the Spectre patches (bsc#1079869)\n\nThese non-security issues were fixed:\n\n- bsc#1100112: schema: allow any strings in smbios entry qemu: escape smbios entry strings \n- bsc#1091427: libxl: fix segfault in libxlReconnectDomain \n- bsc#959329: libxl: don\u0027t set hasManagedSave when performing save \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-1843",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2631-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2631-2",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182631-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2631-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004709.html"
},
{
"category": "self",
"summary": "SUSE Bug 1079869",
"url": "https://bugzilla.suse.com/1079869"
},
{
"category": "self",
"summary": "SUSE Bug 1091427",
"url": "https://bugzilla.suse.com/1091427"
},
{
"category": "self",
"summary": "SUSE Bug 1094325",
"url": "https://bugzilla.suse.com/1094325"
},
{
"category": "self",
"summary": "SUSE Bug 1094725",
"url": "https://bugzilla.suse.com/1094725"
},
{
"category": "self",
"summary": "SUSE Bug 1100112",
"url": "https://bugzilla.suse.com/1100112"
},
{
"category": "self",
"summary": "SUSE Bug 959329",
"url": "https://bugzilla.suse.com/959329"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-10-18T12:49:24Z",
"generator": {
"date": "2018-10-18T12:49:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2631-2",
"initial_release_date": "2018-10-18T12:49:24Z",
"revision_history": [
{
"date": "2018-10-18T12:49:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-client-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-client-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-doc-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-doc-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-nss-2.0.0-27.45.1.x86_64",
"product": {
"name": "libvirt-nss-2.0.0-27.45.1.x86_64",
"product_id": "libvirt-nss-2.0.0-27.45.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-client-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-client-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-xen-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-doc-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-doc-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-nss-2.0.0-27.45.1.x86_64"
},
"product_reference": "libvirt-nss-2.0.0-27.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-nss-2.0.0-27.45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-nss-2.0.0-27.45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-client-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-interface-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-libxl-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-network-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nodedev-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nwfilter-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-secret-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-storage-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-hooks-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-lxc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-qemu-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-xen-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-doc-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-lock-sanlock-2.0.0-27.45.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-nss-2.0.0-27.45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:49:24Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
}
]
}
OPENSUSE-SU-2025:14786-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-mellanox-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-mellanox-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14786",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14786-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-mellanox-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14786-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-mellanox-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-mellanox-20250206-1.1.aarch64",
"product_id": "kernel-firmware-mellanox-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-mellanox-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-mellanox-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-mellanox-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-mellanox-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-mellanox-20250206-1.1.s390x",
"product_id": "kernel-firmware-mellanox-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-mellanox-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-mellanox-20250206-1.1.x86_64",
"product_id": "kernel-firmware-mellanox-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-mellanox-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-mellanox-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-mellanox-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-mellanox-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-mellanox-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-mellanox-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-mellanox-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-mellanox-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mellanox-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14772-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-ath12k-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-ath12k-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14772",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14772-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26345 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23820 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23820/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20526 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20592 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-ath12k-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14772-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ath12k-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-ath12k-20250206-1.1.aarch64",
"product_id": "kernel-firmware-ath12k-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ath12k-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-ath12k-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-ath12k-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ath12k-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-ath12k-20250206-1.1.s390x",
"product_id": "kernel-firmware-ath12k-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ath12k-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-ath12k-20250206-1.1.x86_64",
"product_id": "kernel-firmware-ath12k-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ath12k-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-ath12k-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ath12k-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-ath12k-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ath12k-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-ath12k-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ath12k-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-ath12k-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26345"
}
],
"notes": [
{
"category": "general",
"text": "Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26345",
"url": "https://www.suse.com/security/cve/CVE-2021-26345"
},
{
"category": "external",
"summary": "SUSE Bug 1215831 for CVE-2021-26345",
"url": "https://bugzilla.suse.com/1215831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 1.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-26345"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2022-23820",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23820"
}
],
"notes": [
{
"category": "general",
"text": "Failure to validate the AMD SMM communication buffer\nmay allow an attacker to corrupt the SMRAM potentially leading to arbitrary\ncode execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23820",
"url": "https://www.suse.com/security/cve/CVE-2022-23820"
},
{
"category": "external",
"summary": "SUSE Bug 1215831 for CVE-2022-23820",
"url": "https://bugzilla.suse.com/1215831"
},
{
"category": "external",
"summary": "SUSE Bug 1217557 for CVE-2022-23820",
"url": "https://bugzilla.suse.com/1217557"
},
{
"category": "external",
"summary": "SUSE Bug 1220057 for CVE-2022-23820",
"url": "https://bugzilla.suse.com/1220057"
},
{
"category": "external",
"summary": "SUSE Bug 1220058 for CVE-2022-23820",
"url": "https://bugzilla.suse.com/1220058"
},
{
"category": "external",
"summary": "SUSE Bug 1221588 for CVE-2022-23820",
"url": "https://bugzilla.suse.com/1221588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-23820"
},
{
"cve": "CVE-2023-20526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20526"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20526",
"url": "https://www.suse.com/security/cve/CVE-2023-20526"
},
{
"category": "external",
"summary": "SUSE Bug 1215831 for CVE-2023-20526",
"url": "https://bugzilla.suse.com/1215831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 1.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-20526"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20592"
}
],
"notes": [
{
"category": "general",
"text": "Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20592",
"url": "https://www.suse.com/security/cve/CVE-2023-20592"
},
{
"category": "external",
"summary": "SUSE Bug 1215823 for CVE-2023-20592",
"url": "https://bugzilla.suse.com/1215823"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20592"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath12k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14792-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-prestera-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-prestera-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14792",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14792-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-prestera-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14792-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-prestera-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-prestera-20250206-1.1.aarch64",
"product_id": "kernel-firmware-prestera-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-prestera-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-prestera-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-prestera-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-prestera-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-prestera-20250206-1.1.s390x",
"product_id": "kernel-firmware-prestera-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-prestera-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-prestera-20250206-1.1.x86_64",
"product_id": "kernel-firmware-prestera-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-prestera-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-prestera-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-prestera-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-prestera-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-prestera-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-prestera-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-prestera-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-prestera-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-prestera-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14794-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-qlogic-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-qlogic-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14794",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14794-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-qlogic-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14794-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-qlogic-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-qlogic-20250206-1.1.aarch64",
"product_id": "kernel-firmware-qlogic-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-qlogic-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-qlogic-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-qlogic-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-qlogic-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-qlogic-20250206-1.1.s390x",
"product_id": "kernel-firmware-qlogic-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-qlogic-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-qlogic-20250206-1.1.x86_64",
"product_id": "kernel-firmware-qlogic-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-qlogic-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-qlogic-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-qlogic-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-qlogic-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-qlogic-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-qlogic-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-qlogic-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-qlogic-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qlogic-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14776-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-brcm-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-brcm-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14776",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14776-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14776-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VY6LKWXFA5DZKFFJWA52HJLZ3GJXUDB/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14776-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VY6LKWXFA5DZKFFJWA52HJLZ3GJXUDB/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-brcm-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14776-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-brcm-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-brcm-20250206-1.1.aarch64",
"product_id": "kernel-firmware-brcm-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-brcm-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-brcm-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-brcm-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-brcm-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-brcm-20250206-1.1.s390x",
"product_id": "kernel-firmware-brcm-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-brcm-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-brcm-20250206-1.1.x86_64",
"product_id": "kernel-firmware-brcm-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-brcm-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-brcm-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-brcm-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-brcm-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-brcm-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-brcm-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-brcm-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-brcm-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-brcm-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14799-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-ti-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-ti-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14799",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14799-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-ti-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14799-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ti-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-ti-20250206-1.1.aarch64",
"product_id": "kernel-firmware-ti-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ti-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-ti-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-ti-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ti-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-ti-20250206-1.1.s390x",
"product_id": "kernel-firmware-ti-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ti-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-ti-20250206-1.1.x86_64",
"product_id": "kernel-firmware-ti-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ti-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-ti-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ti-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-ti-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ti-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-ti-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ti-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-ti-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ti-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2024:10633-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "arm-trusted-firmware-2.5-2.3 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the arm-trusted-firmware-2.5-2.3 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10633",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10633-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "arm-trusted-firmware-2.5-2.3 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10633-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "arm-trusted-firmware-2.5-2.3.aarch64",
"product": {
"name": "arm-trusted-firmware-2.5-2.3.aarch64",
"product_id": "arm-trusted-firmware-2.5-2.3.aarch64"
}
},
{
"category": "product_version",
"name": "arm-trusted-firmware-tools-2.5-2.3.aarch64",
"product": {
"name": "arm-trusted-firmware-tools-2.5-2.3.aarch64",
"product_id": "arm-trusted-firmware-tools-2.5-2.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "arm-trusted-firmware-2.5-2.3.ppc64le",
"product": {
"name": "arm-trusted-firmware-2.5-2.3.ppc64le",
"product_id": "arm-trusted-firmware-2.5-2.3.ppc64le"
}
},
{
"category": "product_version",
"name": "arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"product": {
"name": "arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"product_id": "arm-trusted-firmware-tools-2.5-2.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "arm-trusted-firmware-2.5-2.3.s390x",
"product": {
"name": "arm-trusted-firmware-2.5-2.3.s390x",
"product_id": "arm-trusted-firmware-2.5-2.3.s390x"
}
},
{
"category": "product_version",
"name": "arm-trusted-firmware-tools-2.5-2.3.s390x",
"product": {
"name": "arm-trusted-firmware-tools-2.5-2.3.s390x",
"product_id": "arm-trusted-firmware-tools-2.5-2.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "arm-trusted-firmware-2.5-2.3.x86_64",
"product": {
"name": "arm-trusted-firmware-2.5-2.3.x86_64",
"product_id": "arm-trusted-firmware-2.5-2.3.x86_64"
}
},
{
"category": "product_version",
"name": "arm-trusted-firmware-tools-2.5-2.3.x86_64",
"product": {
"name": "arm-trusted-firmware-tools-2.5-2.3.x86_64",
"product_id": "arm-trusted-firmware-tools-2.5-2.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-2.5-2.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.aarch64"
},
"product_reference": "arm-trusted-firmware-2.5-2.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-2.5-2.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.ppc64le"
},
"product_reference": "arm-trusted-firmware-2.5-2.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-2.5-2.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.s390x"
},
"product_reference": "arm-trusted-firmware-2.5-2.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-2.5-2.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.x86_64"
},
"product_reference": "arm-trusted-firmware-2.5-2.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-tools-2.5-2.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.aarch64"
},
"product_reference": "arm-trusted-firmware-tools-2.5-2.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-tools-2.5-2.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.ppc64le"
},
"product_reference": "arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-tools-2.5-2.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.s390x"
},
"product_reference": "arm-trusted-firmware-tools-2.5-2.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-tools-2.5-2.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.x86_64"
},
"product_reference": "arm-trusted-firmware-tools-2.5-2.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.x86_64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.x86_64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.x86_64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.x86_64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.x86_64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.x86_64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
OPENSUSE-SU-2025:14795-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-radeon-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-radeon-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14795",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14795-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-radeon-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14795-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-radeon-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-radeon-20250206-1.1.aarch64",
"product_id": "kernel-firmware-radeon-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-radeon-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-radeon-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-radeon-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-radeon-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-radeon-20250206-1.1.s390x",
"product_id": "kernel-firmware-radeon-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-radeon-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-radeon-20250206-1.1.x86_64",
"product_id": "kernel-firmware-radeon-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-radeon-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-radeon-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-radeon-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-radeon-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-radeon-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-radeon-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-radeon-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-radeon-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-radeon-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14774-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-bluetooth-20250208-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-bluetooth-20250208-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14774",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14774-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-bluetooth-20250208-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14774-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-bluetooth-20250208-1.1.aarch64",
"product": {
"name": "kernel-firmware-bluetooth-20250208-1.1.aarch64",
"product_id": "kernel-firmware-bluetooth-20250208-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"product": {
"name": "kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"product_id": "kernel-firmware-bluetooth-20250208-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-bluetooth-20250208-1.1.s390x",
"product": {
"name": "kernel-firmware-bluetooth-20250208-1.1.s390x",
"product_id": "kernel-firmware-bluetooth-20250208-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-bluetooth-20250208-1.1.x86_64",
"product": {
"name": "kernel-firmware-bluetooth-20250208-1.1.x86_64",
"product_id": "kernel-firmware-bluetooth-20250208-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-bluetooth-20250208-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64"
},
"product_reference": "kernel-firmware-bluetooth-20250208-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-bluetooth-20250208-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le"
},
"product_reference": "kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-bluetooth-20250208-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x"
},
"product_reference": "kernel-firmware-bluetooth-20250208-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-bluetooth-20250208-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
},
"product_reference": "kernel-firmware-bluetooth-20250208-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bluetooth-20250208-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14788-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-network-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-network-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14788",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14788-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-network-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14788-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-network-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-network-20250206-1.1.aarch64",
"product_id": "kernel-firmware-network-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-network-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-network-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-network-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-network-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-network-20250206-1.1.s390x",
"product_id": "kernel-firmware-network-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-network-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-network-20250206-1.1.x86_64",
"product_id": "kernel-firmware-network-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-network-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-network-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-network-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-network-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-network-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-network-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-network-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-network-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14783-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-marvell-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-marvell-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14783",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14783-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-marvell-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14783-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-marvell-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-marvell-20250206-1.1.aarch64",
"product_id": "kernel-firmware-marvell-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-marvell-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-marvell-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-marvell-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-marvell-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-marvell-20250206-1.1.s390x",
"product_id": "kernel-firmware-marvell-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-marvell-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-marvell-20250206-1.1.x86_64",
"product_id": "kernel-firmware-marvell-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-marvell-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-marvell-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-marvell-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-marvell-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-marvell-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-marvell-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-marvell-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-marvell-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-marvell-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2024:13704-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-devel-longterm-6.6.17-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13704",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13704-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3695 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000251 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000251/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12153 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14051 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14051/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15129 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15265 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16536 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16536/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16537 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16645 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16646 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16647 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16648 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16996 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17448 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17449 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17852 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17853 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17853/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17854 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17854/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17855 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17856 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17857 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17862 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5123 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7541 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7542 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8824 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8831 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10322 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10323 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1068 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1118 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12232 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12714 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13053 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18710 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19824 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5332 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5333 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5333/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8043 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8087 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8822 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10207 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14615 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14896 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15030 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15031 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15098 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15099 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15290 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15504 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15504/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15902 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16231 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18808 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18812 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18813 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19252 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19332 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19338 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3016 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3882 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3887 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-6974 page",
"url": "https://www.suse.com/security/cve/CVE-2019-6974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7221 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7222 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8564 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8912 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9500 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10135 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10766 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10766/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10767 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10768 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12351 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12352 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12352/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14331 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25639 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25656 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25668 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2732 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29660 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29661 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29661/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8648 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8694 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8694/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26708 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28971 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32606 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3653 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3656 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3753 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3759 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38166 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43976 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0185 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0330 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0330/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0847 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0847/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0886 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1462 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1462/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1516 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1679 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1729 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1852 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1966 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1972 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1973 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22942 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2308 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2308/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24958 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24958/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2588 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2590 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2590/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26490 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28388 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28389 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28390 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28893 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29900 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29901 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29968 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29968/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3424 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-34918 page",
"url": "https://www.suse.com/security/cve/CVE-2022-34918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40982 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41674 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42719 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42720 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42721 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42722 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42722/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4379 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-44032 page",
"url": "https://www.suse.com/security/cve/CVE-2022-44032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-44033 page",
"url": "https://www.suse.com/security/cve/CVE-2022-44033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-44034 page",
"url": "https://www.suse.com/security/cve/CVE-2022-44034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45884 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45885 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45886 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45887 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45888 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45888/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45919 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0045 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0045/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1076 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1078 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1192 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1380 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2124 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-31084 page",
"url": "https://www.suse.com/security/cve/CVE-2023-31084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3141 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3269 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39192 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39193 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4128 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4128/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4134 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4194 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-42753 page",
"url": "https://www.suse.com/security/cve/CVE-2023-42753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-42754 page",
"url": "https://www.suse.com/security/cve/CVE-2023-42754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-42756 page",
"url": "https://www.suse.com/security/cve/CVE-2023-42756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4623 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-46813 page",
"url": "https://www.suse.com/security/cve/CVE-2023-46813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4881 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-5345 page",
"url": "https://www.suse.com/security/cve/CVE-2023-5345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6606 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6610 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6610/"
}
],
"title": "kernel-devel-longterm-6.6.17-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13704-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.6.17-1.1.aarch64",
"product": {
"name": "kernel-devel-longterm-6.6.17-1.1.aarch64",
"product_id": "kernel-devel-longterm-6.6.17-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.6.17-1.1.aarch64",
"product": {
"name": "kernel-source-longterm-6.6.17-1.1.aarch64",
"product_id": "kernel-source-longterm-6.6.17-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.6.17-1.1.ppc64le",
"product": {
"name": "kernel-devel-longterm-6.6.17-1.1.ppc64le",
"product_id": "kernel-devel-longterm-6.6.17-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.6.17-1.1.ppc64le",
"product": {
"name": "kernel-source-longterm-6.6.17-1.1.ppc64le",
"product_id": "kernel-source-longterm-6.6.17-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.6.17-1.1.s390x",
"product": {
"name": "kernel-devel-longterm-6.6.17-1.1.s390x",
"product_id": "kernel-devel-longterm-6.6.17-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.6.17-1.1.s390x",
"product": {
"name": "kernel-source-longterm-6.6.17-1.1.s390x",
"product_id": "kernel-source-longterm-6.6.17-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.6.17-1.1.x86_64",
"product": {
"name": "kernel-devel-longterm-6.6.17-1.1.x86_64",
"product_id": "kernel-devel-longterm-6.6.17-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.6.17-1.1.x86_64",
"product": {
"name": "kernel-source-longterm-6.6.17-1.1.x86_64",
"product_id": "kernel-source-longterm-6.6.17-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64"
},
"product_reference": "kernel-devel-longterm-6.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le"
},
"product_reference": "kernel-devel-longterm-6.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x"
},
"product_reference": "kernel-devel-longterm-6.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64"
},
"product_reference": "kernel-devel-longterm-6.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64"
},
"product_reference": "kernel-source-longterm-6.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le"
},
"product_reference": "kernel-source-longterm-6.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x"
},
"product_reference": "kernel-source-longterm-6.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
},
"product_reference": "kernel-source-longterm-6.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3695"
}
],
"notes": [
{
"category": "general",
"text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3695",
"url": "https://www.suse.com/security/cve/CVE-2016-3695"
},
{
"category": "external",
"summary": "SUSE Bug 1023051 for CVE-2016-3695",
"url": "https://bugzilla.suse.com/1023051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-3695"
},
{
"cve": "CVE-2017-1000251",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000251"
}
],
"notes": [
{
"category": "general",
"text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000251",
"url": "https://www.suse.com/security/cve/CVE-2017-1000251"
},
{
"category": "external",
"summary": "SUSE Bug 1057389 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1057389"
},
{
"category": "external",
"summary": "SUSE Bug 1057950 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1057950"
},
{
"category": "external",
"summary": "SUSE Bug 1070535 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1070535"
},
{
"category": "external",
"summary": "SUSE Bug 1072117 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1072117"
},
{
"category": "external",
"summary": "SUSE Bug 1072162 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1072162"
},
{
"category": "external",
"summary": "SUSE Bug 1120758 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1120758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-1000251"
},
{
"cve": "CVE-2017-12153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12153"
}
],
"notes": [
{
"category": "general",
"text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12153",
"url": "https://www.suse.com/security/cve/CVE-2017-12153"
},
{
"category": "external",
"summary": "SUSE Bug 1058410 for CVE-2017-12153",
"url": "https://bugzilla.suse.com/1058410"
},
{
"category": "external",
"summary": "SUSE Bug 1058624 for CVE-2017-12153",
"url": "https://bugzilla.suse.com/1058624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-12153"
},
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-14051",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14051"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14051",
"url": "https://www.suse.com/security/cve/CVE-2017-14051"
},
{
"category": "external",
"summary": "SUSE Bug 1056588 for CVE-2017-14051",
"url": "https://bugzilla.suse.com/1056588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14051"
},
{
"cve": "CVE-2017-15129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15129"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15129",
"url": "https://www.suse.com/security/cve/CVE-2017-15129"
},
{
"category": "external",
"summary": "SUSE Bug 1074839 for CVE-2017-15129",
"url": "https://bugzilla.suse.com/1074839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15129"
},
{
"cve": "CVE-2017-15265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15265"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15265",
"url": "https://www.suse.com/security/cve/CVE-2017-15265"
},
{
"category": "external",
"summary": "SUSE Bug 1062520 for CVE-2017-15265",
"url": "https://bugzilla.suse.com/1062520"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15265",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15265"
},
{
"cve": "CVE-2017-16536",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16536"
}
],
"notes": [
{
"category": "general",
"text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16536",
"url": "https://www.suse.com/security/cve/CVE-2017-16536"
},
{
"category": "external",
"summary": "SUSE Bug 1066606 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1066606"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16536"
},
{
"cve": "CVE-2017-16537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16537"
}
],
"notes": [
{
"category": "general",
"text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16537",
"url": "https://www.suse.com/security/cve/CVE-2017-16537"
},
{
"category": "external",
"summary": "SUSE Bug 1066573 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1066573"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16537"
},
{
"cve": "CVE-2017-16645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16645"
}
],
"notes": [
{
"category": "general",
"text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16645",
"url": "https://www.suse.com/security/cve/CVE-2017-16645"
},
{
"category": "external",
"summary": "SUSE Bug 1067132 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1067132"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16645"
},
{
"cve": "CVE-2017-16646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16646"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16646",
"url": "https://www.suse.com/security/cve/CVE-2017-16646"
},
{
"category": "external",
"summary": "SUSE Bug 1067105 for CVE-2017-16646",
"url": "https://bugzilla.suse.com/1067105"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16646",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16646"
},
{
"cve": "CVE-2017-16647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16647"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16647",
"url": "https://www.suse.com/security/cve/CVE-2017-16647"
},
{
"category": "external",
"summary": "SUSE Bug 1067102 for CVE-2017-16647",
"url": "https://bugzilla.suse.com/1067102"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16647",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16647"
},
{
"cve": "CVE-2017-16648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16648"
}
],
"notes": [
{
"category": "general",
"text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16648",
"url": "https://www.suse.com/security/cve/CVE-2017-16648"
},
{
"category": "external",
"summary": "SUSE Bug 1067087 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1067087"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16648"
},
{
"cve": "CVE-2017-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16995"
}
],
"notes": [
{
"category": "general",
"text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16995",
"url": "https://www.suse.com/security/cve/CVE-2017-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-16995",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16995"
},
{
"cve": "CVE-2017-16996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16996"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16996",
"url": "https://www.suse.com/security/cve/CVE-2017-16996"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-16996",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16996"
},
{
"cve": "CVE-2017-17448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17448"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17448",
"url": "https://www.suse.com/security/cve/CVE-2017-17448"
},
{
"category": "external",
"summary": "SUSE Bug 1071693 for CVE-2017-17448",
"url": "https://bugzilla.suse.com/1071693"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17448"
},
{
"cve": "CVE-2017-17449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17449"
}
],
"notes": [
{
"category": "general",
"text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17449",
"url": "https://www.suse.com/security/cve/CVE-2017-17449"
},
{
"category": "external",
"summary": "SUSE Bug 1071694 for CVE-2017-17449",
"url": "https://bugzilla.suse.com/1071694"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17449"
},
{
"cve": "CVE-2017-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17450"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17450",
"url": "https://www.suse.com/security/cve/CVE-2017-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1071695 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "external",
"summary": "SUSE Bug 1074033 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1074033"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17450"
},
{
"cve": "CVE-2017-17852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17852"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17852",
"url": "https://www.suse.com/security/cve/CVE-2017-17852"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17852",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17852"
},
{
"cve": "CVE-2017-17853",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17853"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17853",
"url": "https://www.suse.com/security/cve/CVE-2017-17853"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17853",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17853"
},
{
"cve": "CVE-2017-17854",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17854"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17854",
"url": "https://www.suse.com/security/cve/CVE-2017-17854"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17854",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17854"
},
{
"cve": "CVE-2017-17855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17855"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17855",
"url": "https://www.suse.com/security/cve/CVE-2017-17855"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17855",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17855"
},
{
"cve": "CVE-2017-17856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17856"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17856",
"url": "https://www.suse.com/security/cve/CVE-2017-17856"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17856",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17856"
},
{
"cve": "CVE-2017-17857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17857"
}
],
"notes": [
{
"category": "general",
"text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17857",
"url": "https://www.suse.com/security/cve/CVE-2017-17857"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17857",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17857"
},
{
"cve": "CVE-2017-17862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17862"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17862",
"url": "https://www.suse.com/security/cve/CVE-2017-17862"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17862",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17862"
},
{
"cve": "CVE-2017-5123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5123"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5123",
"url": "https://www.suse.com/security/cve/CVE-2017-5123"
},
{
"category": "external",
"summary": "SUSE Bug 1062473 for CVE-2017-5123",
"url": "https://bugzilla.suse.com/1062473"
},
{
"category": "external",
"summary": "SUSE Bug 1122971 for CVE-2017-5123",
"url": "https://bugzilla.suse.com/1122971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5123"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-7541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7541"
}
],
"notes": [
{
"category": "general",
"text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7541",
"url": "https://www.suse.com/security/cve/CVE-2017-7541"
},
{
"category": "external",
"summary": "SUSE Bug 1049645 for CVE-2017-7541",
"url": "https://bugzilla.suse.com/1049645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7541"
},
{
"cve": "CVE-2017-7542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7542"
}
],
"notes": [
{
"category": "general",
"text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7542",
"url": "https://www.suse.com/security/cve/CVE-2017-7542"
},
{
"category": "external",
"summary": "SUSE Bug 1049882 for CVE-2017-7542",
"url": "https://bugzilla.suse.com/1049882"
},
{
"category": "external",
"summary": "SUSE Bug 1061936 for CVE-2017-7542",
"url": "https://bugzilla.suse.com/1061936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7542"
},
{
"cve": "CVE-2017-8824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8824"
}
],
"notes": [
{
"category": "general",
"text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8824",
"url": "https://www.suse.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "SUSE Bug 1070771 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "external",
"summary": "SUSE Bug 1076734 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1076734"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-8824"
},
{
"cve": "CVE-2017-8831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8831"
}
],
"notes": [
{
"category": "general",
"text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8831",
"url": "https://www.suse.com/security/cve/CVE-2017-8831"
},
{
"category": "external",
"summary": "SUSE Bug 1037994 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1037994"
},
{
"category": "external",
"summary": "SUSE Bug 1061936 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1061936"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-8831"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-10322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10322"
}
],
"notes": [
{
"category": "general",
"text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10322",
"url": "https://www.suse.com/security/cve/CVE-2018-10322"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10322",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090749 for CVE-2018-10322",
"url": "https://bugzilla.suse.com/1090749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10322"
},
{
"cve": "CVE-2018-10323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10323"
}
],
"notes": [
{
"category": "general",
"text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10323",
"url": "https://www.suse.com/security/cve/CVE-2018-10323"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10323",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090717 for CVE-2018-10323",
"url": "https://bugzilla.suse.com/1090717"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10323"
},
{
"cve": "CVE-2018-1068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1068"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1068",
"url": "https://www.suse.com/security/cve/CVE-2018-1068"
},
{
"category": "external",
"summary": "SUSE Bug 1085107 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1085107"
},
{
"category": "external",
"summary": "SUSE Bug 1085114 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1085114"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1123903 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1123903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-1068"
},
{
"cve": "CVE-2018-1118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1118"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1118",
"url": "https://www.suse.com/security/cve/CVE-2018-1118"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092472 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1092472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1118"
},
{
"cve": "CVE-2018-12232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12232"
}
],
"notes": [
{
"category": "general",
"text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12232",
"url": "https://www.suse.com/security/cve/CVE-2018-12232"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1097593 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1097593"
},
{
"category": "external",
"summary": "SUSE Bug 1125907 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1125907"
},
{
"category": "external",
"summary": "SUSE Bug 1127757 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1127757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12232"
},
{
"cve": "CVE-2018-12714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12714"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12714",
"url": "https://www.suse.com/security/cve/CVE-2018-12714"
},
{
"category": "external",
"summary": "SUSE Bug 1098933 for CVE-2018-12714",
"url": "https://bugzilla.suse.com/1098933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-12714"
},
{
"cve": "CVE-2018-13053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13053"
}
],
"notes": [
{
"category": "general",
"text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13053",
"url": "https://www.suse.com/security/cve/CVE-2018-13053"
},
{
"category": "external",
"summary": "SUSE Bug 1099924 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1099924"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-13053"
},
{
"cve": "CVE-2018-18710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18710"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18710",
"url": "https://www.suse.com/security/cve/CVE-2018-18710"
},
{
"category": "external",
"summary": "SUSE Bug 1113751 for CVE-2018-18710",
"url": "https://bugzilla.suse.com/1113751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-18710"
},
{
"cve": "CVE-2018-19824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19824"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19824",
"url": "https://www.suse.com/security/cve/CVE-2018-19824"
},
{
"category": "external",
"summary": "SUSE Bug 1118152 for CVE-2018-19824",
"url": "https://bugzilla.suse.com/1118152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-19824"
},
{
"cve": "CVE-2018-5332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5332"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5332",
"url": "https://www.suse.com/security/cve/CVE-2018-5332"
},
{
"category": "external",
"summary": "SUSE Bug 1075621 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-5332"
},
{
"cve": "CVE-2018-5333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5333"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5333",
"url": "https://www.suse.com/security/cve/CVE-2018-5333"
},
{
"category": "external",
"summary": "SUSE Bug 1075617 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-5333"
},
{
"cve": "CVE-2018-8043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8043"
}
],
"notes": [
{
"category": "general",
"text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8043",
"url": "https://www.suse.com/security/cve/CVE-2018-8043"
},
{
"category": "external",
"summary": "SUSE Bug 1084829 for CVE-2018-8043",
"url": "https://bugzilla.suse.com/1084829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-8043"
},
{
"cve": "CVE-2018-8087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8087"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8087",
"url": "https://www.suse.com/security/cve/CVE-2018-8087"
},
{
"category": "external",
"summary": "SUSE Bug 1085053 for CVE-2018-8087",
"url": "https://bugzilla.suse.com/1085053"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-8087"
},
{
"cve": "CVE-2018-8822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8822"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8822",
"url": "https://www.suse.com/security/cve/CVE-2018-8822"
},
{
"category": "external",
"summary": "SUSE Bug 1086162 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1086162"
},
{
"category": "external",
"summary": "SUSE Bug 1090404 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1090404"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-8822"
},
{
"cve": "CVE-2019-10207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10207"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10207",
"url": "https://www.suse.com/security/cve/CVE-2019-10207"
},
{
"category": "external",
"summary": "SUSE Bug 1123959 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1123959"
},
{
"category": "external",
"summary": "SUSE Bug 1142857 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1142857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-10207"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-14615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14615"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14615",
"url": "https://www.suse.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "SUSE Bug 1160195 for CVE-2019-14615",
"url": "https://bugzilla.suse.com/1160195"
},
{
"category": "external",
"summary": "SUSE Bug 1165881 for CVE-2019-14615",
"url": "https://bugzilla.suse.com/1165881"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14615"
},
{
"cve": "CVE-2019-14814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14814"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14814",
"url": "https://www.suse.com/security/cve/CVE-2019-14814"
},
{
"category": "external",
"summary": "SUSE Bug 1146512 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "external",
"summary": "SUSE Bug 1173664 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173664"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14814"
},
{
"cve": "CVE-2019-14896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14896"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14896",
"url": "https://www.suse.com/security/cve/CVE-2019-14896"
},
{
"category": "external",
"summary": "SUSE Bug 1157157 for CVE-2019-14896",
"url": "https://bugzilla.suse.com/1157157"
},
{
"category": "external",
"summary": "SUSE Bug 1160468 for CVE-2019-14896",
"url": "https://bugzilla.suse.com/1160468"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14896"
},
{
"cve": "CVE-2019-15030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15030",
"url": "https://www.suse.com/security/cve/CVE-2019-15030"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15030",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15030"
},
{
"cve": "CVE-2019-15031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15031",
"url": "https://www.suse.com/security/cve/CVE-2019-15031"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15031",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15031"
},
{
"cve": "CVE-2019-15098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15098"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15098",
"url": "https://www.suse.com/security/cve/CVE-2019-15098"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15098"
},
{
"cve": "CVE-2019-15099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15099"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15099",
"url": "https://www.suse.com/security/cve/CVE-2019-15099"
},
{
"category": "external",
"summary": "SUSE Bug 1146368 for CVE-2019-15099",
"url": "https://bugzilla.suse.com/1146368"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15099"
},
{
"cve": "CVE-2019-15290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15290"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15290",
"url": "https://www.suse.com/security/cve/CVE-2019-15290"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15290"
},
{
"cve": "CVE-2019-15504",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15504"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15504",
"url": "https://www.suse.com/security/cve/CVE-2019-15504"
},
{
"category": "external",
"summary": "SUSE Bug 1147116 for CVE-2019-15504",
"url": "https://bugzilla.suse.com/1147116"
},
{
"category": "external",
"summary": "SUSE Bug 1185852 for CVE-2019-15504",
"url": "https://bugzilla.suse.com/1185852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-15504"
},
{
"cve": "CVE-2019-15902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15902"
}
],
"notes": [
{
"category": "general",
"text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15902",
"url": "https://www.suse.com/security/cve/CVE-2019-15902"
},
{
"category": "external",
"summary": "SUSE Bug 1149376 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "external",
"summary": "SUSE Bug 1155131 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1155131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15902"
},
{
"cve": "CVE-2019-16231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16231"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16231",
"url": "https://www.suse.com/security/cve/CVE-2019-16231"
},
{
"category": "external",
"summary": "SUSE Bug 1150466 for CVE-2019-16231",
"url": "https://bugzilla.suse.com/1150466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-16231"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
},
{
"cve": "CVE-2019-18808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18808"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18808",
"url": "https://www.suse.com/security/cve/CVE-2019-18808"
},
{
"category": "external",
"summary": "SUSE Bug 1156259 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1156259"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18808"
},
{
"cve": "CVE-2019-18812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18812"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18812",
"url": "https://www.suse.com/security/cve/CVE-2019-18812"
},
{
"category": "external",
"summary": "SUSE Bug 1156277 for CVE-2019-18812",
"url": "https://bugzilla.suse.com/1156277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18812"
},
{
"cve": "CVE-2019-18813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18813"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18813",
"url": "https://www.suse.com/security/cve/CVE-2019-18813"
},
{
"category": "external",
"summary": "SUSE Bug 1156278 for CVE-2019-18813",
"url": "https://bugzilla.suse.com/1156278"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18813"
},
{
"cve": "CVE-2019-19252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19252"
}
],
"notes": [
{
"category": "general",
"text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19252",
"url": "https://www.suse.com/security/cve/CVE-2019-19252"
},
{
"category": "external",
"summary": "SUSE Bug 1157813 for CVE-2019-19252",
"url": "https://bugzilla.suse.com/1157813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19252"
},
{
"cve": "CVE-2019-19332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19332"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19332",
"url": "https://www.suse.com/security/cve/CVE-2019-19332"
},
{
"category": "external",
"summary": "SUSE Bug 1158827 for CVE-2019-19332",
"url": "https://bugzilla.suse.com/1158827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19332"
},
{
"cve": "CVE-2019-19338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19338"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19338",
"url": "https://www.suse.com/security/cve/CVE-2019-19338"
},
{
"category": "external",
"summary": "SUSE Bug 1158954 for CVE-2019-19338",
"url": "https://bugzilla.suse.com/1158954"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19338"
},
{
"cve": "CVE-2019-3016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3016"
}
],
"notes": [
{
"category": "general",
"text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3016",
"url": "https://www.suse.com/security/cve/CVE-2019-3016"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2019-3016",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1161154 for CVE-2019-3016",
"url": "https://bugzilla.suse.com/1161154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3016"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-3882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3882"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3882",
"url": "https://www.suse.com/security/cve/CVE-2019-3882"
},
{
"category": "external",
"summary": "SUSE Bug 1131416 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131416"
},
{
"category": "external",
"summary": "SUSE Bug 1131427 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131427"
},
{
"category": "external",
"summary": "SUSE Bug 1133319 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1133319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3882"
},
{
"cve": "CVE-2019-3887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3887"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3887",
"url": "https://www.suse.com/security/cve/CVE-2019-3887"
},
{
"category": "external",
"summary": "SUSE Bug 1131800 for CVE-2019-3887",
"url": "https://bugzilla.suse.com/1131800"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3887"
},
{
"cve": "CVE-2019-6974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-6974"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-6974",
"url": "https://www.suse.com/security/cve/CVE-2019-6974"
},
{
"category": "external",
"summary": "SUSE Bug 1124728 for CVE-2019-6974",
"url": "https://bugzilla.suse.com/1124728"
},
{
"category": "external",
"summary": "SUSE Bug 1124729 for CVE-2019-6974",
"url": "https://bugzilla.suse.com/1124729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-6974"
},
{
"cve": "CVE-2019-7221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7221"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7221",
"url": "https://www.suse.com/security/cve/CVE-2019-7221"
},
{
"category": "external",
"summary": "SUSE Bug 1124732 for CVE-2019-7221",
"url": "https://bugzilla.suse.com/1124732"
},
{
"category": "external",
"summary": "SUSE Bug 1124734 for CVE-2019-7221",
"url": "https://bugzilla.suse.com/1124734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-7221"
},
{
"cve": "CVE-2019-7222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7222"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7222",
"url": "https://www.suse.com/security/cve/CVE-2019-7222"
},
{
"category": "external",
"summary": "SUSE Bug 1124735 for CVE-2019-7222",
"url": "https://bugzilla.suse.com/1124735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-7222"
},
{
"cve": "CVE-2019-8564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8564"
}
],
"notes": [
{
"category": "general",
"text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8564",
"url": "https://www.suse.com/security/cve/CVE-2019-8564"
},
{
"category": "external",
"summary": "SUSE Bug 1132673 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132673"
},
{
"category": "external",
"summary": "SUSE Bug 1132828 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132828"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-8564"
},
{
"cve": "CVE-2019-8912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8912"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8912",
"url": "https://www.suse.com/security/cve/CVE-2019-8912"
},
{
"category": "external",
"summary": "SUSE Bug 1125907 for CVE-2019-8912",
"url": "https://bugzilla.suse.com/1125907"
},
{
"category": "external",
"summary": "SUSE Bug 1126284 for CVE-2019-8912",
"url": "https://bugzilla.suse.com/1126284"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-8912"
},
{
"cve": "CVE-2019-9500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9500"
}
],
"notes": [
{
"category": "general",
"text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9500",
"url": "https://www.suse.com/security/cve/CVE-2019-9500"
},
{
"category": "external",
"summary": "SUSE Bug 1132681 for CVE-2019-9500",
"url": "https://bugzilla.suse.com/1132681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9500"
},
{
"cve": "CVE-2020-10135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10135"
}
],
"notes": [
{
"category": "general",
"text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10135",
"url": "https://www.suse.com/security/cve/CVE-2020-10135"
},
{
"category": "external",
"summary": "SUSE Bug 1171988 for CVE-2020-10135",
"url": "https://bugzilla.suse.com/1171988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10135"
},
{
"cve": "CVE-2020-10766",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10766"
}
],
"notes": [
{
"category": "general",
"text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10766",
"url": "https://www.suse.com/security/cve/CVE-2020-10766"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10766",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2020-10766",
"url": "https://bugzilla.suse.com/1172781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10766"
},
{
"cve": "CVE-2020-10767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10767"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10767",
"url": "https://www.suse.com/security/cve/CVE-2020-10767"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10767",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2020-10767",
"url": "https://bugzilla.suse.com/1172782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10767"
},
{
"cve": "CVE-2020-10768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10768"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10768",
"url": "https://www.suse.com/security/cve/CVE-2020-10768"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10768",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2020-10768",
"url": "https://bugzilla.suse.com/1172783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10768"
},
{
"cve": "CVE-2020-12351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12351"
}
],
"notes": [
{
"category": "general",
"text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12351",
"url": "https://www.suse.com/security/cve/CVE-2020-12351"
},
{
"category": "external",
"summary": "SUSE Bug 1177724 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1177724"
},
{
"category": "external",
"summary": "SUSE Bug 1177729 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1177729"
},
{
"category": "external",
"summary": "SUSE Bug 1178397 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1178397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-12351"
},
{
"cve": "CVE-2020-12352",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12352"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12352",
"url": "https://www.suse.com/security/cve/CVE-2020-12352"
},
{
"category": "external",
"summary": "SUSE Bug 1177725 for CVE-2020-12352",
"url": "https://bugzilla.suse.com/1177725"
},
{
"category": "external",
"summary": "SUSE Bug 1178398 for CVE-2020-12352",
"url": "https://bugzilla.suse.com/1178398"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-12352"
},
{
"cve": "CVE-2020-14331",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14331"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14331",
"url": "https://www.suse.com/security/cve/CVE-2020-14331"
},
{
"category": "external",
"summary": "SUSE Bug 1174205 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174205"
},
{
"category": "external",
"summary": "SUSE Bug 1174247 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14331"
},
{
"cve": "CVE-2020-14386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14386"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14386",
"url": "https://www.suse.com/security/cve/CVE-2020-14386"
},
{
"category": "external",
"summary": "SUSE Bug 1176069 for CVE-2020-14386",
"url": "https://bugzilla.suse.com/1176069"
},
{
"category": "external",
"summary": "SUSE Bug 1176072 for CVE-2020-14386",
"url": "https://bugzilla.suse.com/1176072"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14386"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-25639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25639"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25639",
"url": "https://www.suse.com/security/cve/CVE-2020-25639"
},
{
"category": "external",
"summary": "SUSE Bug 1176846 for CVE-2020-25639",
"url": "https://bugzilla.suse.com/1176846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25639"
},
{
"cve": "CVE-2020-25656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25656",
"url": "https://www.suse.com/security/cve/CVE-2020-25656"
},
{
"category": "external",
"summary": "SUSE Bug 1177766 for CVE-2020-25656",
"url": "https://bugzilla.suse.com/1177766"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25656"
},
{
"cve": "CVE-2020-25668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25668"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25668",
"url": "https://www.suse.com/security/cve/CVE-2020-25668"
},
{
"category": "external",
"summary": "SUSE Bug 1178123 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1178123"
},
{
"category": "external",
"summary": "SUSE Bug 1178622 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1178622"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25668"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-2732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2732"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2732",
"url": "https://www.suse.com/security/cve/CVE-2020-2732"
},
{
"category": "external",
"summary": "SUSE Bug 1163971 for CVE-2020-2732",
"url": "https://bugzilla.suse.com/1163971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-2732"
},
{
"cve": "CVE-2020-29660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29660"
}
],
"notes": [
{
"category": "general",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29660",
"url": "https://www.suse.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "SUSE Bug 1179745 for CVE-2020-29660",
"url": "https://bugzilla.suse.com/1179745"
},
{
"category": "external",
"summary": "SUSE Bug 1179877 for CVE-2020-29660",
"url": "https://bugzilla.suse.com/1179877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-29660"
},
{
"cve": "CVE-2020-29661",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29661"
}
],
"notes": [
{
"category": "general",
"text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29661",
"url": "https://www.suse.com/security/cve/CVE-2020-29661"
},
{
"category": "external",
"summary": "SUSE Bug 1179745 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1179745"
},
{
"category": "external",
"summary": "SUSE Bug 1179877 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1179877"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-29661"
},
{
"cve": "CVE-2020-8648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8648"
}
],
"notes": [
{
"category": "general",
"text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8648",
"url": "https://www.suse.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "SUSE Bug 1162928 for CVE-2020-8648",
"url": "https://bugzilla.suse.com/1162928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-8694",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8694"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8694",
"url": "https://www.suse.com/security/cve/CVE-2020-8694"
},
{
"category": "external",
"summary": "SUSE Bug 1170415 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1170415"
},
{
"category": "external",
"summary": "SUSE Bug 1170446 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1170446"
},
{
"category": "external",
"summary": "SUSE Bug 1178591 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1178591"
},
{
"category": "external",
"summary": "SUSE Bug 1178700 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1178700"
},
{
"category": "external",
"summary": "SUSE Bug 1179661 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1179661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8694"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-26708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26708"
}
],
"notes": [
{
"category": "general",
"text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26708",
"url": "https://www.suse.com/security/cve/CVE-2021-26708"
},
{
"category": "external",
"summary": "SUSE Bug 1181806 for CVE-2021-26708",
"url": "https://bugzilla.suse.com/1181806"
},
{
"category": "external",
"summary": "SUSE Bug 1183298 for CVE-2021-26708",
"url": "https://bugzilla.suse.com/1183298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26708"
},
{
"cve": "CVE-2021-28971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28971"
}
],
"notes": [
{
"category": "general",
"text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28971",
"url": "https://www.suse.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "SUSE Bug 1184196 for CVE-2021-28971",
"url": "https://bugzilla.suse.com/1184196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-32606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32606"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32606",
"url": "https://www.suse.com/security/cve/CVE-2021-32606"
},
{
"category": "external",
"summary": "SUSE Bug 1185953 for CVE-2021-32606",
"url": "https://bugzilla.suse.com/1185953"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-32606"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3483"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3483",
"url": "https://www.suse.com/security/cve/CVE-2021-3483"
},
{
"category": "external",
"summary": "SUSE Bug 1184393 for CVE-2021-3483",
"url": "https://bugzilla.suse.com/1184393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3483"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
},
{
"cve": "CVE-2021-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3542"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3542",
"url": "https://www.suse.com/security/cve/CVE-2021-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1186063 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1186063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3542"
},
{
"cve": "CVE-2021-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3640"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3640",
"url": "https://www.suse.com/security/cve/CVE-2021-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "external",
"summary": "SUSE Bug 1188613 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188613"
},
{
"category": "external",
"summary": "SUSE Bug 1191530 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1191530"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3640"
},
{
"cve": "CVE-2021-3653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3653"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3653",
"url": "https://www.suse.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "SUSE Bug 1189399 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "external",
"summary": "SUSE Bug 1189420 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189420"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3656",
"url": "https://www.suse.com/security/cve/CVE-2021-3656"
},
{
"category": "external",
"summary": "SUSE Bug 1189400 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189400"
},
{
"category": "external",
"summary": "SUSE Bug 1189418 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189418"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3744"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3744",
"url": "https://www.suse.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3744"
},
{
"cve": "CVE-2021-3753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3753"
}
],
"notes": [
{
"category": "general",
"text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3753",
"url": "https://www.suse.com/security/cve/CVE-2021-3753"
},
{
"category": "external",
"summary": "SUSE Bug 1190025 for CVE-2021-3753",
"url": "https://bugzilla.suse.com/1190025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3753"
},
{
"cve": "CVE-2021-37576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37576"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37576",
"url": "https://www.suse.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "SUSE Bug 1188838 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "external",
"summary": "SUSE Bug 1188842 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1190276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-3759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3759"
}
],
"notes": [
{
"category": "general",
"text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3759",
"url": "https://www.suse.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "SUSE Bug 1190115 for CVE-2021-3759",
"url": "https://bugzilla.suse.com/1190115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-38166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38166"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38166",
"url": "https://www.suse.com/security/cve/CVE-2021-38166"
},
{
"category": "external",
"summary": "SUSE Bug 1189233 for CVE-2021-38166",
"url": "https://bugzilla.suse.com/1189233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-38166"
},
{
"cve": "CVE-2021-43976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43976"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43976",
"url": "https://www.suse.com/security/cve/CVE-2021-43976"
},
{
"category": "external",
"summary": "SUSE Bug 1192847 for CVE-2021-43976",
"url": "https://bugzilla.suse.com/1192847"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-43976"
},
{
"cve": "CVE-2022-0185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0185"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0185",
"url": "https://www.suse.com/security/cve/CVE-2022-0185"
},
{
"category": "external",
"summary": "SUSE Bug 1194517 for CVE-2022-0185",
"url": "https://bugzilla.suse.com/1194517"
},
{
"category": "external",
"summary": "SUSE Bug 1194737 for CVE-2022-0185",
"url": "https://bugzilla.suse.com/1194737"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0185"
},
{
"cve": "CVE-2022-0330",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0330"
}
],
"notes": [
{
"category": "general",
"text": "A random memory access flaw was found in the Linux kernel\u0027s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0330",
"url": "https://www.suse.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "SUSE Bug 1194880 for CVE-2022-0330",
"url": "https://bugzilla.suse.com/1194880"
},
{
"category": "external",
"summary": "SUSE Bug 1195950 for CVE-2022-0330",
"url": "https://bugzilla.suse.com/1195950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0330"
},
{
"cve": "CVE-2022-0847",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0847"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0847",
"url": "https://www.suse.com/security/cve/CVE-2022-0847"
},
{
"category": "external",
"summary": "SUSE Bug 1196584 for CVE-2022-0847",
"url": "https://bugzilla.suse.com/1196584"
},
{
"category": "external",
"summary": "SUSE Bug 1196601 for CVE-2022-0847",
"url": "https://bugzilla.suse.com/1196601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0847"
},
{
"cve": "CVE-2022-0886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0886"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27666. Reason: This candidate is a reservation duplicate of CVE-2022-27666. Notes: All CVE users should reference CVE-2022-27666 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0886",
"url": "https://www.suse.com/security/cve/CVE-2022-0886"
},
{
"category": "external",
"summary": "SUSE Bug 1197131 for CVE-2022-0886",
"url": "https://bugzilla.suse.com/1197131"
},
{
"category": "external",
"summary": "SUSE Bug 1197133 for CVE-2022-0886",
"url": "https://bugzilla.suse.com/1197133"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0886"
},
{
"cve": "CVE-2022-1462",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1462"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1462",
"url": "https://www.suse.com/security/cve/CVE-2022-1462"
},
{
"category": "external",
"summary": "SUSE Bug 1198829 for CVE-2022-1462",
"url": "https://bugzilla.suse.com/1198829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1516"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1516",
"url": "https://www.suse.com/security/cve/CVE-2022-1516"
},
{
"category": "external",
"summary": "SUSE Bug 1199012 for CVE-2022-1516",
"url": "https://bugzilla.suse.com/1199012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1516"
},
{
"cve": "CVE-2022-1679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1679"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1679",
"url": "https://www.suse.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "SUSE Bug 1199487 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "external",
"summary": "SUSE Bug 1201080 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212316 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1212316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1729"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1729",
"url": "https://www.suse.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "SUSE Bug 1199507 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199507"
},
{
"category": "external",
"summary": "SUSE Bug 1199697 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199697"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1201832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1852"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1852",
"url": "https://www.suse.com/security/cve/CVE-2022-1852"
},
{
"category": "external",
"summary": "SUSE Bug 1199875 for CVE-2022-1852",
"url": "https://bugzilla.suse.com/1199875"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1852"
},
{
"cve": "CVE-2022-1966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1966"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1966",
"url": "https://www.suse.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "SUSE Bug 1200015 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "external",
"summary": "SUSE Bug 1200268 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200268"
},
{
"category": "external",
"summary": "SUSE Bug 1200494 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200494"
},
{
"category": "external",
"summary": "SUSE Bug 1200529 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1966"
},
{
"cve": "CVE-2022-1972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1972"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1972",
"url": "https://www.suse.com/security/cve/CVE-2022-1972"
},
{
"category": "external",
"summary": "SUSE Bug 1200019 for CVE-2022-1972",
"url": "https://bugzilla.suse.com/1200019"
},
{
"category": "external",
"summary": "SUSE Bug 1200266 for CVE-2022-1972",
"url": "https://bugzilla.suse.com/1200266"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1972"
},
{
"cve": "CVE-2022-1973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1973"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1973",
"url": "https://www.suse.com/security/cve/CVE-2022-1973"
},
{
"category": "external",
"summary": "SUSE Bug 1200023 for CVE-2022-1973",
"url": "https://bugzilla.suse.com/1200023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1973"
},
{
"cve": "CVE-2022-22942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22942"
}
],
"notes": [
{
"category": "general",
"text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22942",
"url": "https://www.suse.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "SUSE Bug 1195065 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195065"
},
{
"category": "external",
"summary": "SUSE Bug 1195951 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-22942"
},
{
"cve": "CVE-2022-2308",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2308"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2308",
"url": "https://www.suse.com/security/cve/CVE-2022-2308"
},
{
"category": "external",
"summary": "SUSE Bug 1202573 for CVE-2022-2308",
"url": "https://bugzilla.suse.com/1202573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2308"
},
{
"cve": "CVE-2022-24958",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24958"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24958",
"url": "https://www.suse.com/security/cve/CVE-2022-24958"
},
{
"category": "external",
"summary": "SUSE Bug 1195905 for CVE-2022-24958",
"url": "https://bugzilla.suse.com/1195905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-24958"
},
{
"cve": "CVE-2022-2588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2588"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2588",
"url": "https://www.suse.com/security/cve/CVE-2022-2588"
},
{
"category": "external",
"summary": "SUSE Bug 1202096 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "external",
"summary": "SUSE Bug 1203613 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1203613"
},
{
"category": "external",
"summary": "SUSE Bug 1204183 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1204183"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2590",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2590"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2590",
"url": "https://www.suse.com/security/cve/CVE-2022-2590"
},
{
"category": "external",
"summary": "SUSE Bug 1202013 for CVE-2022-2590",
"url": "https://bugzilla.suse.com/1202013"
},
{
"category": "external",
"summary": "SUSE Bug 1202089 for CVE-2022-2590",
"url": "https://bugzilla.suse.com/1202089"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-2590"
},
{
"cve": "CVE-2022-26490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26490"
}
],
"notes": [
{
"category": "general",
"text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26490",
"url": "https://www.suse.com/security/cve/CVE-2022-26490"
},
{
"category": "external",
"summary": "SUSE Bug 1196830 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1196830"
},
{
"category": "external",
"summary": "SUSE Bug 1201656 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1201656"
},
{
"category": "external",
"summary": "SUSE Bug 1201969 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1201969"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-26490"
},
{
"cve": "CVE-2022-28388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28388"
}
],
"notes": [
{
"category": "general",
"text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28388",
"url": "https://www.suse.com/security/cve/CVE-2022-28388"
},
{
"category": "external",
"summary": "SUSE Bug 1198032 for CVE-2022-28388",
"url": "https://bugzilla.suse.com/1198032"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-28388"
},
{
"cve": "CVE-2022-28389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28389"
}
],
"notes": [
{
"category": "general",
"text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28389",
"url": "https://www.suse.com/security/cve/CVE-2022-28389"
},
{
"category": "external",
"summary": "SUSE Bug 1198033 for CVE-2022-28389",
"url": "https://bugzilla.suse.com/1198033"
},
{
"category": "external",
"summary": "SUSE Bug 1201657 for CVE-2022-28389",
"url": "https://bugzilla.suse.com/1201657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-28389"
},
{
"cve": "CVE-2022-28390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28390"
}
],
"notes": [
{
"category": "general",
"text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28390",
"url": "https://www.suse.com/security/cve/CVE-2022-28390"
},
{
"category": "external",
"summary": "SUSE Bug 1198031 for CVE-2022-28390",
"url": "https://bugzilla.suse.com/1198031"
},
{
"category": "external",
"summary": "SUSE Bug 1201517 for CVE-2022-28390",
"url": "https://bugzilla.suse.com/1201517"
},
{
"category": "external",
"summary": "SUSE Bug 1207969 for CVE-2022-28390",
"url": "https://bugzilla.suse.com/1207969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-28390"
},
{
"cve": "CVE-2022-28893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28893"
}
],
"notes": [
{
"category": "general",
"text": "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28893",
"url": "https://www.suse.com/security/cve/CVE-2022-28893"
},
{
"category": "external",
"summary": "SUSE Bug 1198330 for CVE-2022-28893",
"url": "https://bugzilla.suse.com/1198330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-28893"
},
{
"cve": "CVE-2022-29900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29900"
}
],
"notes": [
{
"category": "general",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29900",
"url": "https://www.suse.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29901"
}
],
"notes": [
{
"category": "general",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29901",
"url": "https://www.suse.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-29968",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29968"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-\u003eprivate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29968",
"url": "https://www.suse.com/security/cve/CVE-2022-29968"
},
{
"category": "external",
"summary": "SUSE Bug 1199087 for CVE-2022-29968",
"url": "https://bugzilla.suse.com/1199087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-29968"
},
{
"cve": "CVE-2022-3424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3424"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3424",
"url": "https://www.suse.com/security/cve/CVE-2022-3424"
},
{
"category": "external",
"summary": "SUSE Bug 1204166 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "external",
"summary": "SUSE Bug 1204167 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204167"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212309 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1212309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-34918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-34918"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-34918",
"url": "https://www.suse.com/security/cve/CVE-2022-34918"
},
{
"category": "external",
"summary": "SUSE Bug 1201171 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "external",
"summary": "SUSE Bug 1201177 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "external",
"summary": "SUSE Bug 1201222 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-34918"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3640"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3640",
"url": "https://www.suse.com/security/cve/CVE-2022-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1204619 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "external",
"summary": "SUSE Bug 1204624 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-3640"
},
{
"cve": "CVE-2022-40982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40982"
}
],
"notes": [
{
"category": "general",
"text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40982",
"url": "https://www.suse.com/security/cve/CVE-2022-40982"
},
{
"category": "external",
"summary": "SUSE Bug 1206418 for CVE-2022-40982",
"url": "https://bugzilla.suse.com/1206418"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2022-40982",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-40982"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41674"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41674",
"url": "https://www.suse.com/security/cve/CVE-2022-41674"
},
{
"category": "external",
"summary": "SUSE Bug 1203770 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "external",
"summary": "SUSE Bug 1203994 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203994"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-42719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42719"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42719",
"url": "https://www.suse.com/security/cve/CVE-2022-42719"
},
{
"category": "external",
"summary": "SUSE Bug 1204051 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "external",
"summary": "SUSE Bug 1204292 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204292"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42720"
}
],
"notes": [
{
"category": "general",
"text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42720",
"url": "https://www.suse.com/security/cve/CVE-2022-42720"
},
{
"category": "external",
"summary": "SUSE Bug 1204059 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "external",
"summary": "SUSE Bug 1204291 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204291"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42721"
}
],
"notes": [
{
"category": "general",
"text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42721",
"url": "https://www.suse.com/security/cve/CVE-2022-42721"
},
{
"category": "external",
"summary": "SUSE Bug 1204060 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "external",
"summary": "SUSE Bug 1204290 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204290"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42722"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42722",
"url": "https://www.suse.com/security/cve/CVE-2022-42722"
},
{
"category": "external",
"summary": "SUSE Bug 1204125 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204125"
},
{
"category": "external",
"summary": "SUSE Bug 1204289 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204289"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-4379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4379"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4379",
"url": "https://www.suse.com/security/cve/CVE-2022-4379"
},
{
"category": "external",
"summary": "SUSE Bug 1206209 for CVE-2022-4379",
"url": "https://bugzilla.suse.com/1206209"
},
{
"category": "external",
"summary": "SUSE Bug 1206373 for CVE-2022-4379",
"url": "https://bugzilla.suse.com/1206373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-4379"
},
{
"cve": "CVE-2022-44032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-44032"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-44032",
"url": "https://www.suse.com/security/cve/CVE-2022-44032"
},
{
"category": "external",
"summary": "SUSE Bug 1204894 for CVE-2022-44032",
"url": "https://bugzilla.suse.com/1204894"
},
{
"category": "external",
"summary": "SUSE Bug 1212290 for CVE-2022-44032",
"url": "https://bugzilla.suse.com/1212290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-44032"
},
{
"cve": "CVE-2022-44033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-44033"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-44033",
"url": "https://www.suse.com/security/cve/CVE-2022-44033"
},
{
"category": "external",
"summary": "SUSE Bug 1204922 for CVE-2022-44033",
"url": "https://bugzilla.suse.com/1204922"
},
{
"category": "external",
"summary": "SUSE Bug 1212306 for CVE-2022-44033",
"url": "https://bugzilla.suse.com/1212306"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-44033"
},
{
"cve": "CVE-2022-44034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-44034"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-44034",
"url": "https://www.suse.com/security/cve/CVE-2022-44034"
},
{
"category": "external",
"summary": "SUSE Bug 1204901 for CVE-2022-44034",
"url": "https://bugzilla.suse.com/1204901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-44034"
},
{
"cve": "CVE-2022-45884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45884"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45884",
"url": "https://www.suse.com/security/cve/CVE-2022-45884"
},
{
"category": "external",
"summary": "SUSE Bug 1205756 for CVE-2022-45884",
"url": "https://bugzilla.suse.com/1205756"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45884"
},
{
"cve": "CVE-2022-45885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45885"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45885",
"url": "https://www.suse.com/security/cve/CVE-2022-45885"
},
{
"category": "external",
"summary": "SUSE Bug 1205758 for CVE-2022-45885",
"url": "https://bugzilla.suse.com/1205758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45885"
},
{
"cve": "CVE-2022-45886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45886"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45886",
"url": "https://www.suse.com/security/cve/CVE-2022-45886"
},
{
"category": "external",
"summary": "SUSE Bug 1205760 for CVE-2022-45886",
"url": "https://bugzilla.suse.com/1205760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45886"
},
{
"cve": "CVE-2022-45887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45887"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45887",
"url": "https://www.suse.com/security/cve/CVE-2022-45887"
},
{
"category": "external",
"summary": "SUSE Bug 1205762 for CVE-2022-45887",
"url": "https://bugzilla.suse.com/1205762"
},
{
"category": "external",
"summary": "SUSE Bug 1220015 for CVE-2022-45887",
"url": "https://bugzilla.suse.com/1220015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45887"
},
{
"cve": "CVE-2022-45888",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45888"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45888",
"url": "https://www.suse.com/security/cve/CVE-2022-45888"
},
{
"category": "external",
"summary": "SUSE Bug 1205764 for CVE-2022-45888",
"url": "https://bugzilla.suse.com/1205764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-45888"
},
{
"cve": "CVE-2022-45919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45919"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45919",
"url": "https://www.suse.com/security/cve/CVE-2022-45919"
},
{
"category": "external",
"summary": "SUSE Bug 1205803 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1205803"
},
{
"category": "external",
"summary": "SUSE Bug 1208912 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1208912"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1214128"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-45919"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
},
{
"cve": "CVE-2023-0045",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0045"
}
],
"notes": [
{
"category": "general",
"text": "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0045",
"url": "https://www.suse.com/security/cve/CVE-2023-0045"
},
{
"category": "external",
"summary": "SUSE Bug 1207773 for CVE-2023-0045",
"url": "https://bugzilla.suse.com/1207773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-0045"
},
{
"cve": "CVE-2023-1076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1076"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1076",
"url": "https://www.suse.com/security/cve/CVE-2023-1076"
},
{
"category": "external",
"summary": "SUSE Bug 1208599 for CVE-2023-1076",
"url": "https://bugzilla.suse.com/1208599"
},
{
"category": "external",
"summary": "SUSE Bug 1214019 for CVE-2023-1076",
"url": "https://bugzilla.suse.com/1214019"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-1076"
},
{
"cve": "CVE-2023-1078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1078"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1078",
"url": "https://www.suse.com/security/cve/CVE-2023-1078"
},
{
"category": "external",
"summary": "SUSE Bug 1208601 for CVE-2023-1078",
"url": "https://bugzilla.suse.com/1208601"
},
{
"category": "external",
"summary": "SUSE Bug 1208603 for CVE-2023-1078",
"url": "https://bugzilla.suse.com/1208603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-1078"
},
{
"cve": "CVE-2023-1192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1192"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1192",
"url": "https://www.suse.com/security/cve/CVE-2023-1192"
},
{
"category": "external",
"summary": "SUSE Bug 1208995 for CVE-2023-1192",
"url": "https://bugzilla.suse.com/1208995"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-1192"
},
{
"cve": "CVE-2023-1380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1380"
}
],
"notes": [
{
"category": "general",
"text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1380",
"url": "https://www.suse.com/security/cve/CVE-2023-1380"
},
{
"category": "external",
"summary": "SUSE Bug 1209287 for CVE-2023-1380",
"url": "https://bugzilla.suse.com/1209287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2023-1380"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-2124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2124"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2124",
"url": "https://www.suse.com/security/cve/CVE-2023-2124"
},
{
"category": "external",
"summary": "SUSE Bug 1210498 for CVE-2023-2124",
"url": "https://bugzilla.suse.com/1210498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-31084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-31084"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(\u0026fepriv-\u003esem) is called. However, wait_event_interruptible would put the process to sleep, and down(\u0026fepriv-\u003esem) may block the process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-31084",
"url": "https://www.suse.com/security/cve/CVE-2023-31084"
},
{
"category": "external",
"summary": "SUSE Bug 1210783 for CVE-2023-31084",
"url": "https://bugzilla.suse.com/1210783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-31084"
},
{
"cve": "CVE-2023-3141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3141"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3141",
"url": "https://www.suse.com/security/cve/CVE-2023-3141"
},
{
"category": "external",
"summary": "SUSE Bug 1212129 for CVE-2023-3141",
"url": "https://bugzilla.suse.com/1212129"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-3141",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-3141"
},
{
"cve": "CVE-2023-3269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3269"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3269",
"url": "https://www.suse.com/security/cve/CVE-2023-3269"
},
{
"category": "external",
"summary": "SUSE Bug 1212395 for CVE-2023-3269",
"url": "https://bugzilla.suse.com/1212395"
},
{
"category": "external",
"summary": "SUSE Bug 1213760 for CVE-2023-3269",
"url": "https://bugzilla.suse.com/1213760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-3269"
},
{
"cve": "CVE-2023-39192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39192"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39192",
"url": "https://www.suse.com/security/cve/CVE-2023-39192"
},
{
"category": "external",
"summary": "SUSE Bug 1215858 for CVE-2023-39192",
"url": "https://bugzilla.suse.com/1215858"
},
{
"category": "external",
"summary": "SUSE Bug 1220015 for CVE-2023-39192",
"url": "https://bugzilla.suse.com/1220015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-39192"
},
{
"cve": "CVE-2023-39193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39193"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39193",
"url": "https://www.suse.com/security/cve/CVE-2023-39193"
},
{
"category": "external",
"summary": "SUSE Bug 1215860 for CVE-2023-39193",
"url": "https://bugzilla.suse.com/1215860"
},
{
"category": "external",
"summary": "SUSE Bug 1220015 for CVE-2023-39193",
"url": "https://bugzilla.suse.com/1220015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-39193"
},
{
"cve": "CVE-2023-4128",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4128"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4128",
"url": "https://www.suse.com/security/cve/CVE-2023-4128"
},
{
"category": "external",
"summary": "SUSE Bug 1214149 for CVE-2023-4128",
"url": "https://bugzilla.suse.com/1214149"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-4128"
},
{
"cve": "CVE-2023-4134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4134"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4134",
"url": "https://www.suse.com/security/cve/CVE-2023-4134"
},
{
"category": "external",
"summary": "SUSE Bug 1213971 for CVE-2023-4134",
"url": "https://bugzilla.suse.com/1213971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-4134"
},
{
"cve": "CVE-2023-4194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4194"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode-\u003ei_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4194",
"url": "https://www.suse.com/security/cve/CVE-2023-4194"
},
{
"category": "external",
"summary": "SUSE Bug 1214019 for CVE-2023-4194",
"url": "https://bugzilla.suse.com/1214019"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-4194"
},
{
"cve": "CVE-2023-42753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-42753"
}
],
"notes": [
{
"category": "general",
"text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-42753",
"url": "https://www.suse.com/security/cve/CVE-2023-42753"
},
{
"category": "external",
"summary": "SUSE Bug 1215150 for CVE-2023-42753",
"url": "https://bugzilla.suse.com/1215150"
},
{
"category": "external",
"summary": "SUSE Bug 1218613 for CVE-2023-42753",
"url": "https://bugzilla.suse.com/1218613"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-42754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-42754"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-42754",
"url": "https://www.suse.com/security/cve/CVE-2023-42754"
},
{
"category": "external",
"summary": "SUSE Bug 1215467 for CVE-2023-42754",
"url": "https://bugzilla.suse.com/1215467"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-42754",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-42754"
},
{
"cve": "CVE-2023-42756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-42756"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-42756",
"url": "https://www.suse.com/security/cve/CVE-2023-42756"
},
{
"category": "external",
"summary": "SUSE Bug 1215767 for CVE-2023-42756",
"url": "https://bugzilla.suse.com/1215767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-42756"
},
{
"cve": "CVE-2023-4623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4623"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4623",
"url": "https://www.suse.com/security/cve/CVE-2023-4623"
},
{
"category": "external",
"summary": "SUSE Bug 1215115 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1215115"
},
{
"category": "external",
"summary": "SUSE Bug 1215440 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1215440"
},
{
"category": "external",
"summary": "SUSE Bug 1217444 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1217444"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1217531"
},
{
"category": "external",
"summary": "SUSE Bug 1219698 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1219698"
},
{
"category": "external",
"summary": "SUSE Bug 1221578 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1221578"
},
{
"category": "external",
"summary": "SUSE Bug 1221598 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1221598"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-4623"
},
{
"cve": "CVE-2023-46813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-46813"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-46813",
"url": "https://www.suse.com/security/cve/CVE-2023-46813"
},
{
"category": "external",
"summary": "SUSE Bug 1212649 for CVE-2023-46813",
"url": "https://bugzilla.suse.com/1212649"
},
{
"category": "external",
"summary": "SUSE Bug 1216896 for CVE-2023-46813",
"url": "https://bugzilla.suse.com/1216896"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-46813"
},
{
"cve": "CVE-2023-4881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4881"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4881",
"url": "https://www.suse.com/security/cve/CVE-2023-4881"
},
{
"category": "external",
"summary": "SUSE Bug 1215221 for CVE-2023-4881",
"url": "https://bugzilla.suse.com/1215221"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-4881"
},
{
"cve": "CVE-2023-5345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-5345"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx-\u003epassword was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-5345",
"url": "https://www.suse.com/security/cve/CVE-2023-5345"
},
{
"category": "external",
"summary": "SUSE Bug 1215899 for CVE-2023-5345",
"url": "https://bugzilla.suse.com/1215899"
},
{
"category": "external",
"summary": "SUSE Bug 1215971 for CVE-2023-5345",
"url": "https://bugzilla.suse.com/1215971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-5345"
},
{
"cve": "CVE-2023-6606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6606"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6606",
"url": "https://www.suse.com/security/cve/CVE-2023-6606"
},
{
"category": "external",
"summary": "SUSE Bug 1217947 for CVE-2023-6606",
"url": "https://bugzilla.suse.com/1217947"
},
{
"category": "external",
"summary": "SUSE Bug 1220015 for CVE-2023-6606",
"url": "https://bugzilla.suse.com/1220015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-6606"
},
{
"cve": "CVE-2023-6610",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6610"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6610",
"url": "https://www.suse.com/security/cve/CVE-2023-6610"
},
{
"category": "external",
"summary": "SUSE Bug 1217946 for CVE-2023-6610",
"url": "https://bugzilla.suse.com/1217946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-6610"
}
]
}
OPENSUSE-SU-2025:14801-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-usb-network-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-usb-network-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14801",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14801-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-usb-network-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14801-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-usb-network-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-usb-network-20250206-1.1.aarch64",
"product_id": "kernel-firmware-usb-network-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-usb-network-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-usb-network-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-usb-network-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-usb-network-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-usb-network-20250206-1.1.s390x",
"product_id": "kernel-firmware-usb-network-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-usb-network-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-usb-network-20250206-1.1.x86_64",
"product_id": "kernel-firmware-usb-network-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-usb-network-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-usb-network-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-usb-network-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-usb-network-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-usb-network-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-usb-network-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-usb-network-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-usb-network-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-usb-network-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2024:10728-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-devel-5.14.6-1.4 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10728",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10728-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000251 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000251/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12153 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14051 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14051/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15129 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15265 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16536 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16536/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16537 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16645 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16646 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16647 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16648 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16996 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17448 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17449 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17852 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17853 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17853/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17854 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17854/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17855 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17856 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17857 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17862 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5123 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7541 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7542 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8824 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8831 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10322 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10323 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1068 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1118 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12232 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12714 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13053 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18710 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19824 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5332 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5333 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5333/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8043 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8087 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8822 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10207 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14615 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14896 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15030 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15031 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15098 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15099 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15290 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15504 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15504/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15902 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16231 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18808 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18812 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18813 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19252 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19332 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19338 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3016 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3882 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3887 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-6974 page",
"url": "https://www.suse.com/security/cve/CVE-2019-6974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7221 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7222 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8564 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8912 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9500 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10135 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10766 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10766/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10767 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10768 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12351 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12352 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12352/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14331 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25639 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25656 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25668 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2732 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29660 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29661 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29661/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8648 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8694 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8694/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26708 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28971 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32606 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3653 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3656 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3753 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3759 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38166 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38166/"
}
],
"title": "kernel-devel-5.14.6-1.4 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10728-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.6-1.4.aarch64",
"product": {
"name": "kernel-devel-5.14.6-1.4.aarch64",
"product_id": "kernel-devel-5.14.6-1.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.6-1.4.aarch64",
"product": {
"name": "kernel-macros-5.14.6-1.4.aarch64",
"product_id": "kernel-macros-5.14.6-1.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.6-1.4.aarch64",
"product": {
"name": "kernel-source-5.14.6-1.4.aarch64",
"product_id": "kernel-source-5.14.6-1.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.6-1.4.aarch64",
"product": {
"name": "kernel-source-vanilla-5.14.6-1.4.aarch64",
"product_id": "kernel-source-vanilla-5.14.6-1.4.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.6-1.4.ppc64le",
"product": {
"name": "kernel-devel-5.14.6-1.4.ppc64le",
"product_id": "kernel-devel-5.14.6-1.4.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.6-1.4.ppc64le",
"product": {
"name": "kernel-macros-5.14.6-1.4.ppc64le",
"product_id": "kernel-macros-5.14.6-1.4.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.6-1.4.ppc64le",
"product": {
"name": "kernel-source-5.14.6-1.4.ppc64le",
"product_id": "kernel-source-5.14.6-1.4.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.6-1.4.ppc64le",
"product": {
"name": "kernel-source-vanilla-5.14.6-1.4.ppc64le",
"product_id": "kernel-source-vanilla-5.14.6-1.4.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.6-1.4.s390x",
"product": {
"name": "kernel-devel-5.14.6-1.4.s390x",
"product_id": "kernel-devel-5.14.6-1.4.s390x"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.6-1.4.s390x",
"product": {
"name": "kernel-macros-5.14.6-1.4.s390x",
"product_id": "kernel-macros-5.14.6-1.4.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.6-1.4.s390x",
"product": {
"name": "kernel-source-5.14.6-1.4.s390x",
"product_id": "kernel-source-5.14.6-1.4.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.6-1.4.s390x",
"product": {
"name": "kernel-source-vanilla-5.14.6-1.4.s390x",
"product_id": "kernel-source-vanilla-5.14.6-1.4.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.6-1.4.x86_64",
"product": {
"name": "kernel-devel-5.14.6-1.4.x86_64",
"product_id": "kernel-devel-5.14.6-1.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.6-1.4.x86_64",
"product": {
"name": "kernel-macros-5.14.6-1.4.x86_64",
"product_id": "kernel-macros-5.14.6-1.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.6-1.4.x86_64",
"product": {
"name": "kernel-source-5.14.6-1.4.x86_64",
"product_id": "kernel-source-5.14.6-1.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.6-1.4.x86_64",
"product": {
"name": "kernel-source-vanilla-5.14.6-1.4.x86_64",
"product_id": "kernel-source-vanilla-5.14.6-1.4.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64"
},
"product_reference": "kernel-devel-5.14.6-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le"
},
"product_reference": "kernel-devel-5.14.6-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x"
},
"product_reference": "kernel-devel-5.14.6-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64"
},
"product_reference": "kernel-devel-5.14.6-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64"
},
"product_reference": "kernel-macros-5.14.6-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le"
},
"product_reference": "kernel-macros-5.14.6-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x"
},
"product_reference": "kernel-macros-5.14.6-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64"
},
"product_reference": "kernel-macros-5.14.6-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64"
},
"product_reference": "kernel-source-5.14.6-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le"
},
"product_reference": "kernel-source-5.14.6-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x"
},
"product_reference": "kernel-source-5.14.6-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64"
},
"product_reference": "kernel-source-5.14.6-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64"
},
"product_reference": "kernel-source-vanilla-5.14.6-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le"
},
"product_reference": "kernel-source-vanilla-5.14.6-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x"
},
"product_reference": "kernel-source-vanilla-5.14.6-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
},
"product_reference": "kernel-source-vanilla-5.14.6-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-1000251",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000251"
}
],
"notes": [
{
"category": "general",
"text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000251",
"url": "https://www.suse.com/security/cve/CVE-2017-1000251"
},
{
"category": "external",
"summary": "SUSE Bug 1057389 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1057389"
},
{
"category": "external",
"summary": "SUSE Bug 1057950 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1057950"
},
{
"category": "external",
"summary": "SUSE Bug 1070535 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1070535"
},
{
"category": "external",
"summary": "SUSE Bug 1072117 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1072117"
},
{
"category": "external",
"summary": "SUSE Bug 1072162 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1072162"
},
{
"category": "external",
"summary": "SUSE Bug 1120758 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1120758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-1000251"
},
{
"cve": "CVE-2017-12153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12153"
}
],
"notes": [
{
"category": "general",
"text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12153",
"url": "https://www.suse.com/security/cve/CVE-2017-12153"
},
{
"category": "external",
"summary": "SUSE Bug 1058410 for CVE-2017-12153",
"url": "https://bugzilla.suse.com/1058410"
},
{
"category": "external",
"summary": "SUSE Bug 1058624 for CVE-2017-12153",
"url": "https://bugzilla.suse.com/1058624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-12153"
},
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-14051",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14051"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14051",
"url": "https://www.suse.com/security/cve/CVE-2017-14051"
},
{
"category": "external",
"summary": "SUSE Bug 1056588 for CVE-2017-14051",
"url": "https://bugzilla.suse.com/1056588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14051"
},
{
"cve": "CVE-2017-15129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15129"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15129",
"url": "https://www.suse.com/security/cve/CVE-2017-15129"
},
{
"category": "external",
"summary": "SUSE Bug 1074839 for CVE-2017-15129",
"url": "https://bugzilla.suse.com/1074839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15129"
},
{
"cve": "CVE-2017-15265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15265"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15265",
"url": "https://www.suse.com/security/cve/CVE-2017-15265"
},
{
"category": "external",
"summary": "SUSE Bug 1062520 for CVE-2017-15265",
"url": "https://bugzilla.suse.com/1062520"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15265",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15265"
},
{
"cve": "CVE-2017-16536",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16536"
}
],
"notes": [
{
"category": "general",
"text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16536",
"url": "https://www.suse.com/security/cve/CVE-2017-16536"
},
{
"category": "external",
"summary": "SUSE Bug 1066606 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1066606"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16536"
},
{
"cve": "CVE-2017-16537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16537"
}
],
"notes": [
{
"category": "general",
"text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16537",
"url": "https://www.suse.com/security/cve/CVE-2017-16537"
},
{
"category": "external",
"summary": "SUSE Bug 1066573 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1066573"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16537"
},
{
"cve": "CVE-2017-16645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16645"
}
],
"notes": [
{
"category": "general",
"text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16645",
"url": "https://www.suse.com/security/cve/CVE-2017-16645"
},
{
"category": "external",
"summary": "SUSE Bug 1067132 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1067132"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16645"
},
{
"cve": "CVE-2017-16646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16646"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16646",
"url": "https://www.suse.com/security/cve/CVE-2017-16646"
},
{
"category": "external",
"summary": "SUSE Bug 1067105 for CVE-2017-16646",
"url": "https://bugzilla.suse.com/1067105"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16646",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16646"
},
{
"cve": "CVE-2017-16647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16647"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16647",
"url": "https://www.suse.com/security/cve/CVE-2017-16647"
},
{
"category": "external",
"summary": "SUSE Bug 1067102 for CVE-2017-16647",
"url": "https://bugzilla.suse.com/1067102"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16647",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16647"
},
{
"cve": "CVE-2017-16648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16648"
}
],
"notes": [
{
"category": "general",
"text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16648",
"url": "https://www.suse.com/security/cve/CVE-2017-16648"
},
{
"category": "external",
"summary": "SUSE Bug 1067087 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1067087"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16648"
},
{
"cve": "CVE-2017-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16995"
}
],
"notes": [
{
"category": "general",
"text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16995",
"url": "https://www.suse.com/security/cve/CVE-2017-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-16995",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16995"
},
{
"cve": "CVE-2017-16996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16996"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16996",
"url": "https://www.suse.com/security/cve/CVE-2017-16996"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-16996",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16996"
},
{
"cve": "CVE-2017-17448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17448"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17448",
"url": "https://www.suse.com/security/cve/CVE-2017-17448"
},
{
"category": "external",
"summary": "SUSE Bug 1071693 for CVE-2017-17448",
"url": "https://bugzilla.suse.com/1071693"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17448"
},
{
"cve": "CVE-2017-17449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17449"
}
],
"notes": [
{
"category": "general",
"text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17449",
"url": "https://www.suse.com/security/cve/CVE-2017-17449"
},
{
"category": "external",
"summary": "SUSE Bug 1071694 for CVE-2017-17449",
"url": "https://bugzilla.suse.com/1071694"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17449"
},
{
"cve": "CVE-2017-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17450"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17450",
"url": "https://www.suse.com/security/cve/CVE-2017-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1071695 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "external",
"summary": "SUSE Bug 1074033 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1074033"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17450"
},
{
"cve": "CVE-2017-17852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17852"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17852",
"url": "https://www.suse.com/security/cve/CVE-2017-17852"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17852",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17852"
},
{
"cve": "CVE-2017-17853",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17853"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17853",
"url": "https://www.suse.com/security/cve/CVE-2017-17853"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17853",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17853"
},
{
"cve": "CVE-2017-17854",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17854"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17854",
"url": "https://www.suse.com/security/cve/CVE-2017-17854"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17854",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17854"
},
{
"cve": "CVE-2017-17855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17855"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17855",
"url": "https://www.suse.com/security/cve/CVE-2017-17855"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17855",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17855"
},
{
"cve": "CVE-2017-17856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17856"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17856",
"url": "https://www.suse.com/security/cve/CVE-2017-17856"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17856",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17856"
},
{
"cve": "CVE-2017-17857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17857"
}
],
"notes": [
{
"category": "general",
"text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17857",
"url": "https://www.suse.com/security/cve/CVE-2017-17857"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17857",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17857"
},
{
"cve": "CVE-2017-17862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17862"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17862",
"url": "https://www.suse.com/security/cve/CVE-2017-17862"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17862",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17862"
},
{
"cve": "CVE-2017-5123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5123"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5123",
"url": "https://www.suse.com/security/cve/CVE-2017-5123"
},
{
"category": "external",
"summary": "SUSE Bug 1062473 for CVE-2017-5123",
"url": "https://bugzilla.suse.com/1062473"
},
{
"category": "external",
"summary": "SUSE Bug 1122971 for CVE-2017-5123",
"url": "https://bugzilla.suse.com/1122971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5123"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-7541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7541"
}
],
"notes": [
{
"category": "general",
"text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7541",
"url": "https://www.suse.com/security/cve/CVE-2017-7541"
},
{
"category": "external",
"summary": "SUSE Bug 1049645 for CVE-2017-7541",
"url": "https://bugzilla.suse.com/1049645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7541"
},
{
"cve": "CVE-2017-7542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7542"
}
],
"notes": [
{
"category": "general",
"text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7542",
"url": "https://www.suse.com/security/cve/CVE-2017-7542"
},
{
"category": "external",
"summary": "SUSE Bug 1049882 for CVE-2017-7542",
"url": "https://bugzilla.suse.com/1049882"
},
{
"category": "external",
"summary": "SUSE Bug 1061936 for CVE-2017-7542",
"url": "https://bugzilla.suse.com/1061936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7542"
},
{
"cve": "CVE-2017-8824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8824"
}
],
"notes": [
{
"category": "general",
"text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8824",
"url": "https://www.suse.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "SUSE Bug 1070771 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "external",
"summary": "SUSE Bug 1076734 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1076734"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-8824"
},
{
"cve": "CVE-2017-8831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8831"
}
],
"notes": [
{
"category": "general",
"text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8831",
"url": "https://www.suse.com/security/cve/CVE-2017-8831"
},
{
"category": "external",
"summary": "SUSE Bug 1037994 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1037994"
},
{
"category": "external",
"summary": "SUSE Bug 1061936 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1061936"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-8831"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-10322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10322"
}
],
"notes": [
{
"category": "general",
"text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10322",
"url": "https://www.suse.com/security/cve/CVE-2018-10322"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10322",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090749 for CVE-2018-10322",
"url": "https://bugzilla.suse.com/1090749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10322"
},
{
"cve": "CVE-2018-10323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10323"
}
],
"notes": [
{
"category": "general",
"text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10323",
"url": "https://www.suse.com/security/cve/CVE-2018-10323"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10323",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090717 for CVE-2018-10323",
"url": "https://bugzilla.suse.com/1090717"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10323"
},
{
"cve": "CVE-2018-1068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1068"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1068",
"url": "https://www.suse.com/security/cve/CVE-2018-1068"
},
{
"category": "external",
"summary": "SUSE Bug 1085107 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1085107"
},
{
"category": "external",
"summary": "SUSE Bug 1085114 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1085114"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1123903 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1123903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-1068"
},
{
"cve": "CVE-2018-1118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1118"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1118",
"url": "https://www.suse.com/security/cve/CVE-2018-1118"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092472 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1092472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1118"
},
{
"cve": "CVE-2018-12232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12232"
}
],
"notes": [
{
"category": "general",
"text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12232",
"url": "https://www.suse.com/security/cve/CVE-2018-12232"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1097593 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1097593"
},
{
"category": "external",
"summary": "SUSE Bug 1125907 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1125907"
},
{
"category": "external",
"summary": "SUSE Bug 1127757 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1127757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12232"
},
{
"cve": "CVE-2018-12714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12714"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12714",
"url": "https://www.suse.com/security/cve/CVE-2018-12714"
},
{
"category": "external",
"summary": "SUSE Bug 1098933 for CVE-2018-12714",
"url": "https://bugzilla.suse.com/1098933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-12714"
},
{
"cve": "CVE-2018-13053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13053"
}
],
"notes": [
{
"category": "general",
"text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13053",
"url": "https://www.suse.com/security/cve/CVE-2018-13053"
},
{
"category": "external",
"summary": "SUSE Bug 1099924 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1099924"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-13053"
},
{
"cve": "CVE-2018-18710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18710"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18710",
"url": "https://www.suse.com/security/cve/CVE-2018-18710"
},
{
"category": "external",
"summary": "SUSE Bug 1113751 for CVE-2018-18710",
"url": "https://bugzilla.suse.com/1113751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-18710"
},
{
"cve": "CVE-2018-19824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19824"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19824",
"url": "https://www.suse.com/security/cve/CVE-2018-19824"
},
{
"category": "external",
"summary": "SUSE Bug 1118152 for CVE-2018-19824",
"url": "https://bugzilla.suse.com/1118152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-19824"
},
{
"cve": "CVE-2018-5332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5332"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5332",
"url": "https://www.suse.com/security/cve/CVE-2018-5332"
},
{
"category": "external",
"summary": "SUSE Bug 1075621 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-5332"
},
{
"cve": "CVE-2018-5333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5333"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5333",
"url": "https://www.suse.com/security/cve/CVE-2018-5333"
},
{
"category": "external",
"summary": "SUSE Bug 1075617 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-5333"
},
{
"cve": "CVE-2018-8043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8043"
}
],
"notes": [
{
"category": "general",
"text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8043",
"url": "https://www.suse.com/security/cve/CVE-2018-8043"
},
{
"category": "external",
"summary": "SUSE Bug 1084829 for CVE-2018-8043",
"url": "https://bugzilla.suse.com/1084829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-8043"
},
{
"cve": "CVE-2018-8087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8087"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8087",
"url": "https://www.suse.com/security/cve/CVE-2018-8087"
},
{
"category": "external",
"summary": "SUSE Bug 1085053 for CVE-2018-8087",
"url": "https://bugzilla.suse.com/1085053"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-8087"
},
{
"cve": "CVE-2018-8822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8822"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8822",
"url": "https://www.suse.com/security/cve/CVE-2018-8822"
},
{
"category": "external",
"summary": "SUSE Bug 1086162 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1086162"
},
{
"category": "external",
"summary": "SUSE Bug 1090404 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1090404"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-8822"
},
{
"cve": "CVE-2019-10207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10207"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10207",
"url": "https://www.suse.com/security/cve/CVE-2019-10207"
},
{
"category": "external",
"summary": "SUSE Bug 1123959 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1123959"
},
{
"category": "external",
"summary": "SUSE Bug 1142857 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1142857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-10207"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-14615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14615"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14615",
"url": "https://www.suse.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "SUSE Bug 1160195 for CVE-2019-14615",
"url": "https://bugzilla.suse.com/1160195"
},
{
"category": "external",
"summary": "SUSE Bug 1165881 for CVE-2019-14615",
"url": "https://bugzilla.suse.com/1165881"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14615"
},
{
"cve": "CVE-2019-14814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14814"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14814",
"url": "https://www.suse.com/security/cve/CVE-2019-14814"
},
{
"category": "external",
"summary": "SUSE Bug 1146512 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "external",
"summary": "SUSE Bug 1173664 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173664"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14814"
},
{
"cve": "CVE-2019-14896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14896"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14896",
"url": "https://www.suse.com/security/cve/CVE-2019-14896"
},
{
"category": "external",
"summary": "SUSE Bug 1157157 for CVE-2019-14896",
"url": "https://bugzilla.suse.com/1157157"
},
{
"category": "external",
"summary": "SUSE Bug 1160468 for CVE-2019-14896",
"url": "https://bugzilla.suse.com/1160468"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14896"
},
{
"cve": "CVE-2019-15030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15030",
"url": "https://www.suse.com/security/cve/CVE-2019-15030"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15030",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15030"
},
{
"cve": "CVE-2019-15031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15031",
"url": "https://www.suse.com/security/cve/CVE-2019-15031"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15031",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15031"
},
{
"cve": "CVE-2019-15098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15098"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15098",
"url": "https://www.suse.com/security/cve/CVE-2019-15098"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15098"
},
{
"cve": "CVE-2019-15099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15099"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15099",
"url": "https://www.suse.com/security/cve/CVE-2019-15099"
},
{
"category": "external",
"summary": "SUSE Bug 1146368 for CVE-2019-15099",
"url": "https://bugzilla.suse.com/1146368"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15099"
},
{
"cve": "CVE-2019-15290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15290"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15290",
"url": "https://www.suse.com/security/cve/CVE-2019-15290"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15290"
},
{
"cve": "CVE-2019-15504",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15504"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15504",
"url": "https://www.suse.com/security/cve/CVE-2019-15504"
},
{
"category": "external",
"summary": "SUSE Bug 1147116 for CVE-2019-15504",
"url": "https://bugzilla.suse.com/1147116"
},
{
"category": "external",
"summary": "SUSE Bug 1185852 for CVE-2019-15504",
"url": "https://bugzilla.suse.com/1185852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-15504"
},
{
"cve": "CVE-2019-15902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15902"
}
],
"notes": [
{
"category": "general",
"text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15902",
"url": "https://www.suse.com/security/cve/CVE-2019-15902"
},
{
"category": "external",
"summary": "SUSE Bug 1149376 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "external",
"summary": "SUSE Bug 1155131 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1155131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15902"
},
{
"cve": "CVE-2019-16231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16231"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16231",
"url": "https://www.suse.com/security/cve/CVE-2019-16231"
},
{
"category": "external",
"summary": "SUSE Bug 1150466 for CVE-2019-16231",
"url": "https://bugzilla.suse.com/1150466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-16231"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
},
{
"cve": "CVE-2019-18808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18808"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18808",
"url": "https://www.suse.com/security/cve/CVE-2019-18808"
},
{
"category": "external",
"summary": "SUSE Bug 1156259 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1156259"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18808"
},
{
"cve": "CVE-2019-18812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18812"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18812",
"url": "https://www.suse.com/security/cve/CVE-2019-18812"
},
{
"category": "external",
"summary": "SUSE Bug 1156277 for CVE-2019-18812",
"url": "https://bugzilla.suse.com/1156277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18812"
},
{
"cve": "CVE-2019-18813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18813"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18813",
"url": "https://www.suse.com/security/cve/CVE-2019-18813"
},
{
"category": "external",
"summary": "SUSE Bug 1156278 for CVE-2019-18813",
"url": "https://bugzilla.suse.com/1156278"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18813"
},
{
"cve": "CVE-2019-19252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19252"
}
],
"notes": [
{
"category": "general",
"text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19252",
"url": "https://www.suse.com/security/cve/CVE-2019-19252"
},
{
"category": "external",
"summary": "SUSE Bug 1157813 for CVE-2019-19252",
"url": "https://bugzilla.suse.com/1157813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19252"
},
{
"cve": "CVE-2019-19332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19332"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19332",
"url": "https://www.suse.com/security/cve/CVE-2019-19332"
},
{
"category": "external",
"summary": "SUSE Bug 1158827 for CVE-2019-19332",
"url": "https://bugzilla.suse.com/1158827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19332"
},
{
"cve": "CVE-2019-19338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19338"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19338",
"url": "https://www.suse.com/security/cve/CVE-2019-19338"
},
{
"category": "external",
"summary": "SUSE Bug 1158954 for CVE-2019-19338",
"url": "https://bugzilla.suse.com/1158954"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19338"
},
{
"cve": "CVE-2019-3016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3016"
}
],
"notes": [
{
"category": "general",
"text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3016",
"url": "https://www.suse.com/security/cve/CVE-2019-3016"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2019-3016",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1161154 for CVE-2019-3016",
"url": "https://bugzilla.suse.com/1161154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3016"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-3882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3882"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3882",
"url": "https://www.suse.com/security/cve/CVE-2019-3882"
},
{
"category": "external",
"summary": "SUSE Bug 1131416 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131416"
},
{
"category": "external",
"summary": "SUSE Bug 1131427 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131427"
},
{
"category": "external",
"summary": "SUSE Bug 1133319 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1133319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3882"
},
{
"cve": "CVE-2019-3887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3887"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3887",
"url": "https://www.suse.com/security/cve/CVE-2019-3887"
},
{
"category": "external",
"summary": "SUSE Bug 1131800 for CVE-2019-3887",
"url": "https://bugzilla.suse.com/1131800"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3887"
},
{
"cve": "CVE-2019-6974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-6974"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-6974",
"url": "https://www.suse.com/security/cve/CVE-2019-6974"
},
{
"category": "external",
"summary": "SUSE Bug 1124728 for CVE-2019-6974",
"url": "https://bugzilla.suse.com/1124728"
},
{
"category": "external",
"summary": "SUSE Bug 1124729 for CVE-2019-6974",
"url": "https://bugzilla.suse.com/1124729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-6974"
},
{
"cve": "CVE-2019-7221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7221"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7221",
"url": "https://www.suse.com/security/cve/CVE-2019-7221"
},
{
"category": "external",
"summary": "SUSE Bug 1124732 for CVE-2019-7221",
"url": "https://bugzilla.suse.com/1124732"
},
{
"category": "external",
"summary": "SUSE Bug 1124734 for CVE-2019-7221",
"url": "https://bugzilla.suse.com/1124734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-7221"
},
{
"cve": "CVE-2019-7222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7222"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7222",
"url": "https://www.suse.com/security/cve/CVE-2019-7222"
},
{
"category": "external",
"summary": "SUSE Bug 1124735 for CVE-2019-7222",
"url": "https://bugzilla.suse.com/1124735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-7222"
},
{
"cve": "CVE-2019-8564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8564"
}
],
"notes": [
{
"category": "general",
"text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8564",
"url": "https://www.suse.com/security/cve/CVE-2019-8564"
},
{
"category": "external",
"summary": "SUSE Bug 1132673 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132673"
},
{
"category": "external",
"summary": "SUSE Bug 1132828 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132828"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-8564"
},
{
"cve": "CVE-2019-8912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8912"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8912",
"url": "https://www.suse.com/security/cve/CVE-2019-8912"
},
{
"category": "external",
"summary": "SUSE Bug 1125907 for CVE-2019-8912",
"url": "https://bugzilla.suse.com/1125907"
},
{
"category": "external",
"summary": "SUSE Bug 1126284 for CVE-2019-8912",
"url": "https://bugzilla.suse.com/1126284"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-8912"
},
{
"cve": "CVE-2019-9500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9500"
}
],
"notes": [
{
"category": "general",
"text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9500",
"url": "https://www.suse.com/security/cve/CVE-2019-9500"
},
{
"category": "external",
"summary": "SUSE Bug 1132681 for CVE-2019-9500",
"url": "https://bugzilla.suse.com/1132681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9500"
},
{
"cve": "CVE-2020-10135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10135"
}
],
"notes": [
{
"category": "general",
"text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10135",
"url": "https://www.suse.com/security/cve/CVE-2020-10135"
},
{
"category": "external",
"summary": "SUSE Bug 1171988 for CVE-2020-10135",
"url": "https://bugzilla.suse.com/1171988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10135"
},
{
"cve": "CVE-2020-10766",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10766"
}
],
"notes": [
{
"category": "general",
"text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10766",
"url": "https://www.suse.com/security/cve/CVE-2020-10766"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10766",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2020-10766",
"url": "https://bugzilla.suse.com/1172781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10766"
},
{
"cve": "CVE-2020-10767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10767"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10767",
"url": "https://www.suse.com/security/cve/CVE-2020-10767"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10767",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2020-10767",
"url": "https://bugzilla.suse.com/1172782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10767"
},
{
"cve": "CVE-2020-10768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10768"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10768",
"url": "https://www.suse.com/security/cve/CVE-2020-10768"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10768",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2020-10768",
"url": "https://bugzilla.suse.com/1172783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10768"
},
{
"cve": "CVE-2020-12351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12351"
}
],
"notes": [
{
"category": "general",
"text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12351",
"url": "https://www.suse.com/security/cve/CVE-2020-12351"
},
{
"category": "external",
"summary": "SUSE Bug 1177724 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1177724"
},
{
"category": "external",
"summary": "SUSE Bug 1177729 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1177729"
},
{
"category": "external",
"summary": "SUSE Bug 1178397 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1178397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-12351"
},
{
"cve": "CVE-2020-12352",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12352"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12352",
"url": "https://www.suse.com/security/cve/CVE-2020-12352"
},
{
"category": "external",
"summary": "SUSE Bug 1177725 for CVE-2020-12352",
"url": "https://bugzilla.suse.com/1177725"
},
{
"category": "external",
"summary": "SUSE Bug 1178398 for CVE-2020-12352",
"url": "https://bugzilla.suse.com/1178398"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-12352"
},
{
"cve": "CVE-2020-14331",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14331"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14331",
"url": "https://www.suse.com/security/cve/CVE-2020-14331"
},
{
"category": "external",
"summary": "SUSE Bug 1174205 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174205"
},
{
"category": "external",
"summary": "SUSE Bug 1174247 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14331"
},
{
"cve": "CVE-2020-14386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14386"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14386",
"url": "https://www.suse.com/security/cve/CVE-2020-14386"
},
{
"category": "external",
"summary": "SUSE Bug 1176069 for CVE-2020-14386",
"url": "https://bugzilla.suse.com/1176069"
},
{
"category": "external",
"summary": "SUSE Bug 1176072 for CVE-2020-14386",
"url": "https://bugzilla.suse.com/1176072"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14386"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-25639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25639"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25639",
"url": "https://www.suse.com/security/cve/CVE-2020-25639"
},
{
"category": "external",
"summary": "SUSE Bug 1176846 for CVE-2020-25639",
"url": "https://bugzilla.suse.com/1176846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25639"
},
{
"cve": "CVE-2020-25656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25656",
"url": "https://www.suse.com/security/cve/CVE-2020-25656"
},
{
"category": "external",
"summary": "SUSE Bug 1177766 for CVE-2020-25656",
"url": "https://bugzilla.suse.com/1177766"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25656"
},
{
"cve": "CVE-2020-25668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25668"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25668",
"url": "https://www.suse.com/security/cve/CVE-2020-25668"
},
{
"category": "external",
"summary": "SUSE Bug 1178123 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1178123"
},
{
"category": "external",
"summary": "SUSE Bug 1178622 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1178622"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25668"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-2732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2732"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2732",
"url": "https://www.suse.com/security/cve/CVE-2020-2732"
},
{
"category": "external",
"summary": "SUSE Bug 1163971 for CVE-2020-2732",
"url": "https://bugzilla.suse.com/1163971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-2732"
},
{
"cve": "CVE-2020-29660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29660"
}
],
"notes": [
{
"category": "general",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29660",
"url": "https://www.suse.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "SUSE Bug 1179745 for CVE-2020-29660",
"url": "https://bugzilla.suse.com/1179745"
},
{
"category": "external",
"summary": "SUSE Bug 1179877 for CVE-2020-29660",
"url": "https://bugzilla.suse.com/1179877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-29660"
},
{
"cve": "CVE-2020-29661",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29661"
}
],
"notes": [
{
"category": "general",
"text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29661",
"url": "https://www.suse.com/security/cve/CVE-2020-29661"
},
{
"category": "external",
"summary": "SUSE Bug 1179745 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1179745"
},
{
"category": "external",
"summary": "SUSE Bug 1179877 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1179877"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-29661"
},
{
"cve": "CVE-2020-8648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8648"
}
],
"notes": [
{
"category": "general",
"text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8648",
"url": "https://www.suse.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "SUSE Bug 1162928 for CVE-2020-8648",
"url": "https://bugzilla.suse.com/1162928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-8694",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8694"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8694",
"url": "https://www.suse.com/security/cve/CVE-2020-8694"
},
{
"category": "external",
"summary": "SUSE Bug 1170415 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1170415"
},
{
"category": "external",
"summary": "SUSE Bug 1170446 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1170446"
},
{
"category": "external",
"summary": "SUSE Bug 1178591 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1178591"
},
{
"category": "external",
"summary": "SUSE Bug 1178700 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1178700"
},
{
"category": "external",
"summary": "SUSE Bug 1179661 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1179661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8694"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-26708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26708"
}
],
"notes": [
{
"category": "general",
"text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26708",
"url": "https://www.suse.com/security/cve/CVE-2021-26708"
},
{
"category": "external",
"summary": "SUSE Bug 1181806 for CVE-2021-26708",
"url": "https://bugzilla.suse.com/1181806"
},
{
"category": "external",
"summary": "SUSE Bug 1183298 for CVE-2021-26708",
"url": "https://bugzilla.suse.com/1183298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26708"
},
{
"cve": "CVE-2021-28971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28971"
}
],
"notes": [
{
"category": "general",
"text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28971",
"url": "https://www.suse.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "SUSE Bug 1184196 for CVE-2021-28971",
"url": "https://bugzilla.suse.com/1184196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-32606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32606"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32606",
"url": "https://www.suse.com/security/cve/CVE-2021-32606"
},
{
"category": "external",
"summary": "SUSE Bug 1185953 for CVE-2021-32606",
"url": "https://bugzilla.suse.com/1185953"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-32606"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3483"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3483",
"url": "https://www.suse.com/security/cve/CVE-2021-3483"
},
{
"category": "external",
"summary": "SUSE Bug 1184393 for CVE-2021-3483",
"url": "https://bugzilla.suse.com/1184393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3483"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
},
{
"cve": "CVE-2021-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3640"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3640",
"url": "https://www.suse.com/security/cve/CVE-2021-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "external",
"summary": "SUSE Bug 1188613 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188613"
},
{
"category": "external",
"summary": "SUSE Bug 1191530 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1191530"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3640"
},
{
"cve": "CVE-2021-3653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3653"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3653",
"url": "https://www.suse.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "SUSE Bug 1189399 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "external",
"summary": "SUSE Bug 1189420 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189420"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3656",
"url": "https://www.suse.com/security/cve/CVE-2021-3656"
},
{
"category": "external",
"summary": "SUSE Bug 1189400 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189400"
},
{
"category": "external",
"summary": "SUSE Bug 1189418 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189418"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3744"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3744",
"url": "https://www.suse.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3744"
},
{
"cve": "CVE-2021-3753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3753"
}
],
"notes": [
{
"category": "general",
"text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3753",
"url": "https://www.suse.com/security/cve/CVE-2021-3753"
},
{
"category": "external",
"summary": "SUSE Bug 1190025 for CVE-2021-3753",
"url": "https://bugzilla.suse.com/1190025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3753"
},
{
"cve": "CVE-2021-37576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37576"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37576",
"url": "https://www.suse.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "SUSE Bug 1188838 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "external",
"summary": "SUSE Bug 1188842 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1190276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-3759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3759"
}
],
"notes": [
{
"category": "general",
"text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3759",
"url": "https://www.suse.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "SUSE Bug 1190115 for CVE-2021-3759",
"url": "https://bugzilla.suse.com/1190115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-38166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38166"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38166",
"url": "https://www.suse.com/security/cve/CVE-2021-38166"
},
{
"category": "external",
"summary": "SUSE Bug 1189233 for CVE-2021-38166",
"url": "https://bugzilla.suse.com/1189233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-38166"
}
]
}
OPENSUSE-SU-2024:11287-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "qemu-6.1.0-32.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the qemu-6.1.0-32.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11287",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11287-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0222 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8106 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5225 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5225/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-6855 page",
"url": "https://www.suse.com/security/cve/CVE-2015-6855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8504 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8504/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8619 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10028 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10155 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1714 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6490 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6836 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7156 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7157 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7161 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7170 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7421 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7422 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7422/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7423 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7423/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7466 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7466/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7907 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7908 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7909 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7994 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7994/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7995 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8576 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8577 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8578 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8578/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8667 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8668 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8669 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8669/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8909 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8910 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9101 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9102 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9103 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9104 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9105 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9106 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9602 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9907 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9921 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10664 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10806 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11334 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11334/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11434 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11434/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13673 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13711 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14167 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15038 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15118 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15268 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15289 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2615 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2620 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2630 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2630/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5525 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5525/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5526 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5552 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5552/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5578 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5578/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5579 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5667 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5856 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5857 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5898 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5898/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5973 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6058 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7471 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7471/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7493 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7493/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8112 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8309 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8379 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8380 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9503 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9524 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10839 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10839/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11806 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12130 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-15746 page",
"url": "https://www.suse.com/security/cve/CVE-2018-15746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16872 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17963 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17963/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20123 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20124 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20125 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20191 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20216 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20216/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20815 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7858 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-03812 page",
"url": "https://www.suse.com/security/cve/CVE-2019-03812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13164 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14378 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15890 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15890/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-6778 page",
"url": "https://www.suse.com/security/cve/CVE-2019-6778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8934 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9824 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10702 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10717 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10717/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10761 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10761/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-11102 page",
"url": "https://www.suse.com/security/cve/CVE-2020-11102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-11869 page",
"url": "https://www.suse.com/security/cve/CVE-2020-11869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13361 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13362 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13659 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13800 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13800/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14364 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16092 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16092/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1711 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-17380 page",
"url": "https://www.suse.com/security/cve/CVE-2020-17380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1983 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1983/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25085 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25723 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27821 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29129 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7039 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8608 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20181 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20203 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20221 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20257 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20257/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20263 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3416 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3416/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3527 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3527/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3544 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3546 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3546/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3582 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3582/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3607 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3608 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3682 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3682/"
}
],
"title": "qemu-6.1.0-32.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11287-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-6.1.0-32.1.aarch64",
"product_id": "qemu-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-accel-qtest-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-accel-qtest-6.1.0-32.1.aarch64",
"product_id": "qemu-accel-qtest-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"product_id": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-arm-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-arm-6.1.0-32.1.aarch64",
"product_id": "qemu-arm-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-audio-alsa-6.1.0-32.1.aarch64",
"product_id": "qemu-audio-alsa-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-jack-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-audio-jack-6.1.0-32.1.aarch64",
"product_id": "qemu-audio-jack-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-audio-pa-6.1.0-32.1.aarch64",
"product_id": "qemu-audio-pa-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-spice-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-audio-spice-6.1.0-32.1.aarch64",
"product_id": "qemu-audio-spice-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-curl-6.1.0-32.1.aarch64",
"product_id": "qemu-block-curl-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-dmg-6.1.0-32.1.aarch64",
"product_id": "qemu-block-dmg-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-gluster-6.1.0-32.1.aarch64",
"product_id": "qemu-block-gluster-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-iscsi-6.1.0-32.1.aarch64",
"product_id": "qemu-block-iscsi-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-nfs-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-nfs-6.1.0-32.1.aarch64",
"product_id": "qemu-block-nfs-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-rbd-6.1.0-32.1.aarch64",
"product_id": "qemu-block-rbd-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-ssh-6.1.0-32.1.aarch64",
"product_id": "qemu-block-ssh-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-chardev-baum-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-chardev-baum-6.1.0-32.1.aarch64",
"product_id": "qemu-chardev-baum-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-chardev-spice-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-chardev-spice-6.1.0-32.1.aarch64",
"product_id": "qemu-chardev-spice-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-extra-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-extra-6.1.0-32.1.aarch64",
"product_id": "qemu-extra-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-guest-agent-6.1.0-32.1.aarch64",
"product_id": "qemu-guest-agent-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-display-qxl-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-host-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-usb-host-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-usb-host-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-32.1.aarch64",
"product": {
"name": "qemu-ipxe-1.0.0+-32.1.aarch64",
"product_id": "qemu-ipxe-1.0.0+-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"product_id": "qemu-ivshmem-tools-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ksm-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ksm-6.1.0-32.1.aarch64",
"product_id": "qemu-ksm-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-kvm-6.1.0-32.1.aarch64",
"product_id": "qemu-kvm-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-lang-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-lang-6.1.0-32.1.aarch64",
"product_id": "qemu-lang-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-microvm-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-microvm-6.1.0-32.1.aarch64",
"product_id": "qemu-microvm-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ppc-6.1.0-32.1.aarch64",
"product_id": "qemu-ppc-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-s390x-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-s390x-6.1.0-32.1.aarch64",
"product_id": "qemu-s390x-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"product": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"product_id": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-32.1.aarch64",
"product": {
"name": "qemu-sgabios-8-32.1.aarch64",
"product_id": "qemu-sgabios-8-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-skiboot-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-skiboot-6.1.0-32.1.aarch64",
"product_id": "qemu-skiboot-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-tools-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-tools-6.1.0-32.1.aarch64",
"product_id": "qemu-tools-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-curses-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-curses-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-gtk-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-gtk-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-opengl-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-opengl-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-opengl-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-app-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-spice-app-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-spice-app-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-core-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-spice-core-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-spice-core-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"product": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"product_id": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"product_id": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-x86-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-x86-6.1.0-32.1.aarch64",
"product_id": "qemu-x86-6.1.0-32.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-6.1.0-32.1.ppc64le",
"product_id": "qemu-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-accel-qtest-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-accel-qtest-6.1.0-32.1.ppc64le",
"product_id": "qemu-accel-qtest-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"product_id": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-arm-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-arm-6.1.0-32.1.ppc64le",
"product_id": "qemu-arm-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-audio-alsa-6.1.0-32.1.ppc64le",
"product_id": "qemu-audio-alsa-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-jack-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-audio-jack-6.1.0-32.1.ppc64le",
"product_id": "qemu-audio-jack-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-audio-pa-6.1.0-32.1.ppc64le",
"product_id": "qemu-audio-pa-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-spice-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-audio-spice-6.1.0-32.1.ppc64le",
"product_id": "qemu-audio-spice-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-curl-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-curl-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-dmg-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-dmg-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-gluster-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-gluster-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-iscsi-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-iscsi-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-nfs-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-nfs-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-nfs-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-rbd-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-rbd-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-ssh-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-ssh-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-chardev-baum-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-chardev-baum-6.1.0-32.1.ppc64le",
"product_id": "qemu-chardev-baum-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-chardev-spice-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-chardev-spice-6.1.0-32.1.ppc64le",
"product_id": "qemu-chardev-spice-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-extra-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-extra-6.1.0-32.1.ppc64le",
"product_id": "qemu-extra-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-guest-agent-6.1.0-32.1.ppc64le",
"product_id": "qemu-guest-agent-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-usb-host-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-32.1.ppc64le",
"product": {
"name": "qemu-ipxe-1.0.0+-32.1.ppc64le",
"product_id": "qemu-ipxe-1.0.0+-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"product_id": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ksm-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ksm-6.1.0-32.1.ppc64le",
"product_id": "qemu-ksm-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-kvm-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-kvm-6.1.0-32.1.ppc64le",
"product_id": "qemu-kvm-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-lang-6.1.0-32.1.ppc64le",
"product_id": "qemu-lang-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-microvm-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-microvm-6.1.0-32.1.ppc64le",
"product_id": "qemu-microvm-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ppc-6.1.0-32.1.ppc64le",
"product_id": "qemu-ppc-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-s390x-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-s390x-6.1.0-32.1.ppc64le",
"product_id": "qemu-s390x-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"product": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"product_id": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-32.1.ppc64le",
"product": {
"name": "qemu-sgabios-8-32.1.ppc64le",
"product_id": "qemu-sgabios-8-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-skiboot-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-skiboot-6.1.0-32.1.ppc64le",
"product_id": "qemu-skiboot-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-tools-6.1.0-32.1.ppc64le",
"product_id": "qemu-tools-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-curses-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-curses-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-gtk-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-gtk-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-opengl-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-opengl-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-opengl-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-spice-app-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-spice-core-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"product": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"product_id": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"product_id": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-x86-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-x86-6.1.0-32.1.ppc64le",
"product_id": "qemu-x86-6.1.0-32.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-6.1.0-32.1.s390x",
"product": {
"name": "qemu-6.1.0-32.1.s390x",
"product_id": "qemu-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-accel-qtest-6.1.0-32.1.s390x",
"product": {
"name": "qemu-accel-qtest-6.1.0-32.1.s390x",
"product_id": "qemu-accel-qtest-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"product": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"product_id": "qemu-accel-tcg-x86-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-arm-6.1.0-32.1.s390x",
"product": {
"name": "qemu-arm-6.1.0-32.1.s390x",
"product_id": "qemu-arm-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-6.1.0-32.1.s390x",
"product": {
"name": "qemu-audio-alsa-6.1.0-32.1.s390x",
"product_id": "qemu-audio-alsa-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-jack-6.1.0-32.1.s390x",
"product": {
"name": "qemu-audio-jack-6.1.0-32.1.s390x",
"product_id": "qemu-audio-jack-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-6.1.0-32.1.s390x",
"product": {
"name": "qemu-audio-pa-6.1.0-32.1.s390x",
"product_id": "qemu-audio-pa-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-spice-6.1.0-32.1.s390x",
"product": {
"name": "qemu-audio-spice-6.1.0-32.1.s390x",
"product_id": "qemu-audio-spice-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-curl-6.1.0-32.1.s390x",
"product_id": "qemu-block-curl-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-dmg-6.1.0-32.1.s390x",
"product_id": "qemu-block-dmg-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-gluster-6.1.0-32.1.s390x",
"product_id": "qemu-block-gluster-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-iscsi-6.1.0-32.1.s390x",
"product_id": "qemu-block-iscsi-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-nfs-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-nfs-6.1.0-32.1.s390x",
"product_id": "qemu-block-nfs-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-rbd-6.1.0-32.1.s390x",
"product_id": "qemu-block-rbd-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-ssh-6.1.0-32.1.s390x",
"product_id": "qemu-block-ssh-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-chardev-baum-6.1.0-32.1.s390x",
"product": {
"name": "qemu-chardev-baum-6.1.0-32.1.s390x",
"product_id": "qemu-chardev-baum-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-chardev-spice-6.1.0-32.1.s390x",
"product": {
"name": "qemu-chardev-spice-6.1.0-32.1.s390x",
"product_id": "qemu-chardev-spice-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-extra-6.1.0-32.1.s390x",
"product": {
"name": "qemu-extra-6.1.0-32.1.s390x",
"product_id": "qemu-extra-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-6.1.0-32.1.s390x",
"product": {
"name": "qemu-guest-agent-6.1.0-32.1.s390x",
"product_id": "qemu-guest-agent-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-qxl-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.s390x",
"product_id": "qemu-hw-display-qxl-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"product_id": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"product_id": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"product_id": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"product_id": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-host-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-usb-host-6.1.0-32.1.s390x",
"product_id": "qemu-hw-usb-host-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"product_id": "qemu-hw-usb-redirect-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"product_id": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-32.1.s390x",
"product": {
"name": "qemu-ipxe-1.0.0+-32.1.s390x",
"product_id": "qemu-ipxe-1.0.0+-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ivshmem-tools-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.s390x",
"product_id": "qemu-ivshmem-tools-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ksm-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ksm-6.1.0-32.1.s390x",
"product_id": "qemu-ksm-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-6.1.0-32.1.s390x",
"product": {
"name": "qemu-kvm-6.1.0-32.1.s390x",
"product_id": "qemu-kvm-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-6.1.0-32.1.s390x",
"product": {
"name": "qemu-lang-6.1.0-32.1.s390x",
"product_id": "qemu-lang-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-microvm-6.1.0-32.1.s390x",
"product": {
"name": "qemu-microvm-6.1.0-32.1.s390x",
"product_id": "qemu-microvm-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ppc-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ppc-6.1.0-32.1.s390x",
"product_id": "qemu-ppc-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390x-6.1.0-32.1.s390x",
"product": {
"name": "qemu-s390x-6.1.0-32.1.s390x",
"product_id": "qemu-s390x-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"product": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"product_id": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-32.1.s390x",
"product": {
"name": "qemu-sgabios-8-32.1.s390x",
"product_id": "qemu-sgabios-8-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-skiboot-6.1.0-32.1.s390x",
"product": {
"name": "qemu-skiboot-6.1.0-32.1.s390x",
"product_id": "qemu-skiboot-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-6.1.0-32.1.s390x",
"product": {
"name": "qemu-tools-6.1.0-32.1.s390x",
"product_id": "qemu-tools-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-curses-6.1.0-32.1.s390x",
"product_id": "qemu-ui-curses-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-gtk-6.1.0-32.1.s390x",
"product_id": "qemu-ui-gtk-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-opengl-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-opengl-6.1.0-32.1.s390x",
"product_id": "qemu-ui-opengl-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-app-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-spice-app-6.1.0-32.1.s390x",
"product_id": "qemu-ui-spice-app-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-core-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-spice-core-6.1.0-32.1.s390x",
"product_id": "qemu-ui-spice-core-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"product": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"product_id": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"product": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"product_id": "qemu-vhost-user-gpu-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-x86-6.1.0-32.1.s390x",
"product": {
"name": "qemu-x86-6.1.0-32.1.s390x",
"product_id": "qemu-x86-6.1.0-32.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-6.1.0-32.1.x86_64",
"product_id": "qemu-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-accel-qtest-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-accel-qtest-6.1.0-32.1.x86_64",
"product_id": "qemu-accel-qtest-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"product_id": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-arm-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-arm-6.1.0-32.1.x86_64",
"product_id": "qemu-arm-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-audio-alsa-6.1.0-32.1.x86_64",
"product_id": "qemu-audio-alsa-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-jack-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-audio-jack-6.1.0-32.1.x86_64",
"product_id": "qemu-audio-jack-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-audio-pa-6.1.0-32.1.x86_64",
"product_id": "qemu-audio-pa-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-spice-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-audio-spice-6.1.0-32.1.x86_64",
"product_id": "qemu-audio-spice-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-curl-6.1.0-32.1.x86_64",
"product_id": "qemu-block-curl-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-dmg-6.1.0-32.1.x86_64",
"product_id": "qemu-block-dmg-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-gluster-6.1.0-32.1.x86_64",
"product_id": "qemu-block-gluster-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-iscsi-6.1.0-32.1.x86_64",
"product_id": "qemu-block-iscsi-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-nfs-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-nfs-6.1.0-32.1.x86_64",
"product_id": "qemu-block-nfs-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-rbd-6.1.0-32.1.x86_64",
"product_id": "qemu-block-rbd-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-ssh-6.1.0-32.1.x86_64",
"product_id": "qemu-block-ssh-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-chardev-baum-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-chardev-baum-6.1.0-32.1.x86_64",
"product_id": "qemu-chardev-baum-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-chardev-spice-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-chardev-spice-6.1.0-32.1.x86_64",
"product_id": "qemu-chardev-spice-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-extra-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-extra-6.1.0-32.1.x86_64",
"product_id": "qemu-extra-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-guest-agent-6.1.0-32.1.x86_64",
"product_id": "qemu-guest-agent-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-display-qxl-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-host-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-usb-host-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-usb-host-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-32.1.x86_64",
"product": {
"name": "qemu-ipxe-1.0.0+-32.1.x86_64",
"product_id": "qemu-ipxe-1.0.0+-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"product_id": "qemu-ivshmem-tools-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ksm-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ksm-6.1.0-32.1.x86_64",
"product_id": "qemu-ksm-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-kvm-6.1.0-32.1.x86_64",
"product_id": "qemu-kvm-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-lang-6.1.0-32.1.x86_64",
"product_id": "qemu-lang-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-microvm-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-microvm-6.1.0-32.1.x86_64",
"product_id": "qemu-microvm-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ppc-6.1.0-32.1.x86_64",
"product_id": "qemu-ppc-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-s390x-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-s390x-6.1.0-32.1.x86_64",
"product_id": "qemu-s390x-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"product": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"product_id": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-32.1.x86_64",
"product": {
"name": "qemu-sgabios-8-32.1.x86_64",
"product_id": "qemu-sgabios-8-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-skiboot-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-skiboot-6.1.0-32.1.x86_64",
"product_id": "qemu-skiboot-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-tools-6.1.0-32.1.x86_64",
"product_id": "qemu-tools-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-curses-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-curses-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-gtk-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-gtk-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-opengl-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-opengl-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-opengl-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-app-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-spice-app-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-spice-app-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-core-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-spice-core-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-spice-core-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"product": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"product_id": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"product_id": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-x86-6.1.0-32.1.x86_64",
"product_id": "qemu-x86-6.1.0-32.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x"
},
"product_reference": "qemu-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-qtest-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-accel-qtest-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-qtest-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-accel-qtest-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-qtest-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x"
},
"product_reference": "qemu-accel-qtest-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-qtest-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-accel-qtest-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x"
},
"product_reference": "qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-arm-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-arm-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x"
},
"product_reference": "qemu-arm-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-arm-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-audio-alsa-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-audio-alsa-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x"
},
"product_reference": "qemu-audio-alsa-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-audio-alsa-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-jack-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-audio-jack-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-jack-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-audio-jack-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-jack-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x"
},
"product_reference": "qemu-audio-jack-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-jack-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-audio-jack-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-audio-pa-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-audio-pa-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x"
},
"product_reference": "qemu-audio-pa-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-audio-pa-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-spice-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-audio-spice-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-spice-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-audio-spice-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-spice-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x"
},
"product_reference": "qemu-audio-spice-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-spice-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-audio-spice-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-curl-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-curl-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-curl-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-curl-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-dmg-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-dmg-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-dmg-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-dmg-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-gluster-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-gluster-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-gluster-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-gluster-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-iscsi-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-iscsi-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-iscsi-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-iscsi-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-nfs-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-nfs-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-nfs-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-nfs-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-nfs-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-nfs-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-nfs-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-nfs-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-rbd-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-rbd-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-rbd-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-rbd-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-ssh-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-ssh-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-ssh-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-ssh-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-baum-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-chardev-baum-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-baum-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-chardev-baum-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-baum-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x"
},
"product_reference": "qemu-chardev-baum-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-baum-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-chardev-baum-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-spice-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-chardev-spice-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-spice-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-chardev-spice-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-spice-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x"
},
"product_reference": "qemu-chardev-spice-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-spice-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-chardev-spice-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-extra-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-extra-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x"
},
"product_reference": "qemu-extra-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-extra-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-guest-agent-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-guest-agent-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x"
},
"product_reference": "qemu-guest-agent-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-guest-agent-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-display-qxl-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-host-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-usb-host-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-host-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-host-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-usb-host-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-host-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-usb-host-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64"
},
"product_reference": "qemu-ipxe-1.0.0+-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le"
},
"product_reference": "qemu-ipxe-1.0.0+-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x"
},
"product_reference": "qemu-ipxe-1.0.0+-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64"
},
"product_reference": "qemu-ipxe-1.0.0+-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ivshmem-tools-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ksm-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ksm-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ksm-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ksm-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-kvm-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-kvm-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x"
},
"product_reference": "qemu-kvm-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-kvm-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-lang-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-lang-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x"
},
"product_reference": "qemu-lang-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-lang-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-microvm-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-microvm-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-microvm-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-microvm-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-microvm-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x"
},
"product_reference": "qemu-microvm-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-microvm-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-microvm-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ppc-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ppc-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ppc-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ppc-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390x-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-s390x-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390x-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-s390x-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390x-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x"
},
"product_reference": "qemu-s390x-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390x-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-s390x-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64"
},
"product_reference": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le"
},
"product_reference": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x"
},
"product_reference": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64"
},
"product_reference": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64"
},
"product_reference": "qemu-sgabios-8-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le"
},
"product_reference": "qemu-sgabios-8-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x"
},
"product_reference": "qemu-sgabios-8-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64"
},
"product_reference": "qemu-sgabios-8-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-skiboot-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-skiboot-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-skiboot-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-skiboot-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-skiboot-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x"
},
"product_reference": "qemu-skiboot-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-skiboot-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-skiboot-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-tools-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-tools-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x"
},
"product_reference": "qemu-tools-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-tools-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-curses-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-curses-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-curses-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-curses-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-gtk-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-gtk-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-gtk-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-gtk-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-opengl-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-opengl-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-opengl-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-opengl-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-opengl-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-opengl-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-opengl-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-opengl-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-app-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-spice-app-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-app-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-app-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-spice-app-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-app-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-spice-app-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-core-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-spice-core-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-core-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-core-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-spice-core-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-core-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-spice-core-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64"
},
"product_reference": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le"
},
"product_reference": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x"
},
"product_reference": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64"
},
"product_reference": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x"
},
"product_reference": "qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-x86-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-x86-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x"
},
"product_reference": "qemu-x86-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-x86-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-0222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0222"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0222",
"url": "https://www.suse.com/security/cve/CVE-2014-0222"
},
{
"category": "external",
"summary": "SUSE Bug 1072223 for CVE-2014-0222",
"url": "https://bugzilla.suse.com/1072223"
},
{
"category": "external",
"summary": "SUSE Bug 877642 for CVE-2014-0222",
"url": "https://bugzilla.suse.com/877642"
},
{
"category": "external",
"summary": "SUSE Bug 950367 for CVE-2014-0222",
"url": "https://bugzilla.suse.com/950367"
},
{
"category": "external",
"summary": "SUSE Bug 964925 for CVE-2014-0222",
"url": "https://bugzilla.suse.com/964925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-0222"
},
{
"cve": "CVE-2014-8106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8106"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8106",
"url": "https://www.suse.com/security/cve/CVE-2014-8106"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 907805 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/907805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-8106"
},
{
"cve": "CVE-2015-5225",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5225"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5225",
"url": "https://www.suse.com/security/cve/CVE-2015-5225"
},
{
"category": "external",
"summary": "SUSE Bug 942845 for CVE-2015-5225",
"url": "https://bugzilla.suse.com/942845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-5225"
},
{
"cve": "CVE-2015-6855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-6855"
}
],
"notes": [
{
"category": "general",
"text": "hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-6855",
"url": "https://www.suse.com/security/cve/CVE-2015-6855"
},
{
"category": "external",
"summary": "SUSE Bug 945404 for CVE-2015-6855",
"url": "https://bugzilla.suse.com/945404"
},
{
"category": "external",
"summary": "SUSE Bug 965156 for CVE-2015-6855",
"url": "https://bugzilla.suse.com/965156"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-6855"
},
{
"cve": "CVE-2015-8504",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8504"
}
],
"notes": [
{
"category": "general",
"text": "Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8504",
"url": "https://www.suse.com/security/cve/CVE-2015-8504"
},
{
"category": "external",
"summary": "SUSE Bug 958491 for CVE-2015-8504",
"url": "https://bugzilla.suse.com/958491"
},
{
"category": "external",
"summary": "SUSE Bug 958493 for CVE-2015-8504",
"url": "https://bugzilla.suse.com/958493"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-8504"
},
{
"cve": "CVE-2015-8619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8619"
}
],
"notes": [
{
"category": "general",
"text": "The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8619",
"url": "https://www.suse.com/security/cve/CVE-2015-8619"
},
{
"category": "external",
"summary": "SUSE Bug 960334 for CVE-2015-8619",
"url": "https://bugzilla.suse.com/960334"
},
{
"category": "external",
"summary": "SUSE Bug 965269 for CVE-2015-8619",
"url": "https://bugzilla.suse.com/965269"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-8619"
},
{
"cve": "CVE-2016-10028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10028"
}
],
"notes": [
{
"category": "general",
"text": "The virgl_cmd_get_capset function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a VIRTIO_GPU_CMD_GET_CAPSET command with a maximum capabilities size with a value of 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10028",
"url": "https://www.suse.com/security/cve/CVE-2016-10028"
},
{
"category": "external",
"summary": "SUSE Bug 1017084 for CVE-2016-10028",
"url": "https://bugzilla.suse.com/1017084"
},
{
"category": "external",
"summary": "SUSE Bug 1017085 for CVE-2016-10028",
"url": "https://bugzilla.suse.com/1017085"
},
{
"category": "external",
"summary": "SUSE Bug 1185981 for CVE-2016-10028",
"url": "https://bugzilla.suse.com/1185981"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-10028"
},
{
"cve": "CVE-2016-10155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10155"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10155",
"url": "https://www.suse.com/security/cve/CVE-2016-10155"
},
{
"category": "external",
"summary": "SUSE Bug 1021129 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1021129"
},
{
"category": "external",
"summary": "SUSE Bug 1024183 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1024183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-10155"
},
{
"cve": "CVE-2016-1714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1714"
}
],
"notes": [
{
"category": "general",
"text": "The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1714",
"url": "https://www.suse.com/security/cve/CVE-2016-1714"
},
{
"category": "external",
"summary": "SUSE Bug 961691 for CVE-2016-1714",
"url": "https://bugzilla.suse.com/961691"
},
{
"category": "external",
"summary": "SUSE Bug 961692 for CVE-2016-1714",
"url": "https://bugzilla.suse.com/961692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-1714"
},
{
"cve": "CVE-2016-6490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6490"
}
],
"notes": [
{
"category": "general",
"text": "The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6490",
"url": "https://www.suse.com/security/cve/CVE-2016-6490"
},
{
"category": "external",
"summary": "SUSE Bug 991466 for CVE-2016-6490",
"url": "https://bugzilla.suse.com/991466"
},
{
"category": "external",
"summary": "SUSE Bug 993854 for CVE-2016-6490",
"url": "https://bugzilla.suse.com/993854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-6490"
},
{
"cve": "CVE-2016-6836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6836"
}
],
"notes": [
{
"category": "general",
"text": "The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6836",
"url": "https://www.suse.com/security/cve/CVE-2016-6836"
},
{
"category": "external",
"summary": "SUSE Bug 994760 for CVE-2016-6836",
"url": "https://bugzilla.suse.com/994760"
},
{
"category": "external",
"summary": "SUSE Bug 994761 for CVE-2016-6836",
"url": "https://bugzilla.suse.com/994761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-6836"
},
{
"cve": "CVE-2016-7156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7156"
}
],
"notes": [
{
"category": "general",
"text": "The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7156",
"url": "https://www.suse.com/security/cve/CVE-2016-7156"
},
{
"category": "external",
"summary": "SUSE Bug 997859 for CVE-2016-7156",
"url": "https://bugzilla.suse.com/997859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7156"
},
{
"cve": "CVE-2016-7157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7157"
}
],
"notes": [
{
"category": "general",
"text": "The (1) mptsas_config_manufacturing_1 and (2) mptsas_config_ioc_0 functions in hw/scsi/mptconfig.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via vectors involving MPTSAS_CONFIG_PACK.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7157",
"url": "https://www.suse.com/security/cve/CVE-2016-7157"
},
{
"category": "external",
"summary": "SUSE Bug 997860 for CVE-2016-7157",
"url": "https://bugzilla.suse.com/997860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7157"
},
{
"cve": "CVE-2016-7161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7161"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7161",
"url": "https://www.suse.com/security/cve/CVE-2016-7161"
},
{
"category": "external",
"summary": "SUSE Bug 1001151 for CVE-2016-7161",
"url": "https://bugzilla.suse.com/1001151"
},
{
"category": "external",
"summary": "SUSE Bug 1001152 for CVE-2016-7161",
"url": "https://bugzilla.suse.com/1001152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7161"
},
{
"cve": "CVE-2016-7170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7170"
}
],
"notes": [
{
"category": "general",
"text": "The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7170",
"url": "https://www.suse.com/security/cve/CVE-2016-7170"
},
{
"category": "external",
"summary": "SUSE Bug 998516 for CVE-2016-7170",
"url": "https://bugzilla.suse.com/998516"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7170"
},
{
"cve": "CVE-2016-7421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7421"
}
],
"notes": [
{
"category": "general",
"text": "The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit process IO loop to the ring size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7421",
"url": "https://www.suse.com/security/cve/CVE-2016-7421"
},
{
"category": "external",
"summary": "SUSE Bug 999661 for CVE-2016-7421",
"url": "https://bugzilla.suse.com/999661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-7421"
},
{
"cve": "CVE-2016-7422",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7422"
}
],
"notes": [
{
"category": "general",
"text": "The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7422",
"url": "https://www.suse.com/security/cve/CVE-2016-7422"
},
{
"category": "external",
"summary": "SUSE Bug 1000346 for CVE-2016-7422",
"url": "https://bugzilla.suse.com/1000346"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7422"
},
{
"cve": "CVE-2016-7423",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7423"
}
],
"notes": [
{
"category": "general",
"text": "The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7423",
"url": "https://www.suse.com/security/cve/CVE-2016-7423"
},
{
"category": "external",
"summary": "SUSE Bug 1000397 for CVE-2016-7423",
"url": "https://bugzilla.suse.com/1000397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7423"
},
{
"cve": "CVE-2016-7466",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7466"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7466",
"url": "https://www.suse.com/security/cve/CVE-2016-7466"
},
{
"category": "external",
"summary": "SUSE Bug 1000345 for CVE-2016-7466",
"url": "https://bugzilla.suse.com/1000345"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7466"
},
{
"cve": "CVE-2016-7907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7907"
}
],
"notes": [
{
"category": "general",
"text": "The imx_fec_do_tx function in hw/net/imx_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7907",
"url": "https://www.suse.com/security/cve/CVE-2016-7907"
},
{
"category": "external",
"summary": "SUSE Bug 1002549 for CVE-2016-7907",
"url": "https://bugzilla.suse.com/1002549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7907"
},
{
"cve": "CVE-2016-7908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7908"
}
],
"notes": [
{
"category": "general",
"text": "The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7908",
"url": "https://www.suse.com/security/cve/CVE-2016-7908"
},
{
"category": "external",
"summary": "SUSE Bug 1002550 for CVE-2016-7908",
"url": "https://bugzilla.suse.com/1002550"
},
{
"category": "external",
"summary": "SUSE Bug 1003030 for CVE-2016-7908",
"url": "https://bugzilla.suse.com/1003030"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7908"
},
{
"cve": "CVE-2016-7909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7909"
}
],
"notes": [
{
"category": "general",
"text": "The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7909",
"url": "https://www.suse.com/security/cve/CVE-2016-7909"
},
{
"category": "external",
"summary": "SUSE Bug 1002557 for CVE-2016-7909",
"url": "https://bugzilla.suse.com/1002557"
},
{
"category": "external",
"summary": "SUSE Bug 1003032 for CVE-2016-7909",
"url": "https://bugzilla.suse.com/1003032"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7909"
},
{
"cve": "CVE-2016-7994",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7994"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the virtio_gpu_resource_create_2d function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_CREATE_2D commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7994",
"url": "https://www.suse.com/security/cve/CVE-2016-7994"
},
{
"category": "external",
"summary": "SUSE Bug 1003613 for CVE-2016-7994",
"url": "https://bugzilla.suse.com/1003613"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7994"
},
{
"cve": "CVE-2016-7995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7995"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7995",
"url": "https://www.suse.com/security/cve/CVE-2016-7995"
},
{
"category": "external",
"summary": "SUSE Bug 1003612 for CVE-2016-7995",
"url": "https://bugzilla.suse.com/1003612"
},
{
"category": "external",
"summary": "SUSE Bug 1003870 for CVE-2016-7995",
"url": "https://bugzilla.suse.com/1003870"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7995"
},
{
"cve": "CVE-2016-8576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8576"
}
],
"notes": [
{
"category": "general",
"text": "The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8576",
"url": "https://www.suse.com/security/cve/CVE-2016-8576"
},
{
"category": "external",
"summary": "SUSE Bug 1003878 for CVE-2016-8576",
"url": "https://bugzilla.suse.com/1003878"
},
{
"category": "external",
"summary": "SUSE Bug 1004016 for CVE-2016-8576",
"url": "https://bugzilla.suse.com/1004016"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8576"
},
{
"cve": "CVE-2016-8577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8577"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8577",
"url": "https://www.suse.com/security/cve/CVE-2016-8577"
},
{
"category": "external",
"summary": "SUSE Bug 1003893 for CVE-2016-8577",
"url": "https://bugzilla.suse.com/1003893"
},
{
"category": "external",
"summary": "SUSE Bug 1004021 for CVE-2016-8577",
"url": "https://bugzilla.suse.com/1004021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8577"
},
{
"cve": "CVE-2016-8578",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8578"
}
],
"notes": [
{
"category": "general",
"text": "The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8578",
"url": "https://www.suse.com/security/cve/CVE-2016-8578"
},
{
"category": "external",
"summary": "SUSE Bug 1003894 for CVE-2016-8578",
"url": "https://bugzilla.suse.com/1003894"
},
{
"category": "external",
"summary": "SUSE Bug 1004023 for CVE-2016-8578",
"url": "https://bugzilla.suse.com/1004023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8578"
},
{
"cve": "CVE-2016-8667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8667"
}
],
"notes": [
{
"category": "general",
"text": "The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8667",
"url": "https://www.suse.com/security/cve/CVE-2016-8667"
},
{
"category": "external",
"summary": "SUSE Bug 1004702 for CVE-2016-8667",
"url": "https://bugzilla.suse.com/1004702"
},
{
"category": "external",
"summary": "SUSE Bug 1005004 for CVE-2016-8667",
"url": "https://bugzilla.suse.com/1005004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8667"
},
{
"cve": "CVE-2016-8668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8668"
}
],
"notes": [
{
"category": "general",
"text": "The rocker_io_writel function in hw/net/rocker/rocker.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8668",
"url": "https://www.suse.com/security/cve/CVE-2016-8668"
},
{
"category": "external",
"summary": "SUSE Bug 1004706 for CVE-2016-8668",
"url": "https://bugzilla.suse.com/1004706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8668"
},
{
"cve": "CVE-2016-8669",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8669"
}
],
"notes": [
{
"category": "general",
"text": "The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8669",
"url": "https://www.suse.com/security/cve/CVE-2016-8669"
},
{
"category": "external",
"summary": "SUSE Bug 1004707 for CVE-2016-8669",
"url": "https://bugzilla.suse.com/1004707"
},
{
"category": "external",
"summary": "SUSE Bug 1005005 for CVE-2016-8669",
"url": "https://bugzilla.suse.com/1005005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8669"
},
{
"cve": "CVE-2016-8909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8909"
}
],
"notes": [
{
"category": "general",
"text": "The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8909",
"url": "https://www.suse.com/security/cve/CVE-2016-8909"
},
{
"category": "external",
"summary": "SUSE Bug 1006536 for CVE-2016-8909",
"url": "https://bugzilla.suse.com/1006536"
},
{
"category": "external",
"summary": "SUSE Bug 1007160 for CVE-2016-8909",
"url": "https://bugzilla.suse.com/1007160"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-8909"
},
{
"cve": "CVE-2016-8910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8910"
}
],
"notes": [
{
"category": "general",
"text": "The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8910",
"url": "https://www.suse.com/security/cve/CVE-2016-8910"
},
{
"category": "external",
"summary": "SUSE Bug 1006538 for CVE-2016-8910",
"url": "https://bugzilla.suse.com/1006538"
},
{
"category": "external",
"summary": "SUSE Bug 1007157 for CVE-2016-8910",
"url": "https://bugzilla.suse.com/1007157"
},
{
"category": "external",
"summary": "SUSE Bug 1024178 for CVE-2016-8910",
"url": "https://bugzilla.suse.com/1024178"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-8910"
},
{
"cve": "CVE-2016-9101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9101"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9101",
"url": "https://www.suse.com/security/cve/CVE-2016-9101"
},
{
"category": "external",
"summary": "SUSE Bug 1007391 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1007391"
},
{
"category": "external",
"summary": "SUSE Bug 1013668 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1013668"
},
{
"category": "external",
"summary": "SUSE Bug 1024181 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1024181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9101"
},
{
"cve": "CVE-2016-9102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9102"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9102",
"url": "https://www.suse.com/security/cve/CVE-2016-9102"
},
{
"category": "external",
"summary": "SUSE Bug 1007450 for CVE-2016-9102",
"url": "https://bugzilla.suse.com/1007450"
},
{
"category": "external",
"summary": "SUSE Bug 1014256 for CVE-2016-9102",
"url": "https://bugzilla.suse.com/1014256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9102"
},
{
"cve": "CVE-2016-9103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9103"
}
],
"notes": [
{
"category": "general",
"text": "The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9103",
"url": "https://www.suse.com/security/cve/CVE-2016-9103"
},
{
"category": "external",
"summary": "SUSE Bug 1007454 for CVE-2016-9103",
"url": "https://bugzilla.suse.com/1007454"
},
{
"category": "external",
"summary": "SUSE Bug 1014259 for CVE-2016-9103",
"url": "https://bugzilla.suse.com/1014259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9103"
},
{
"cve": "CVE-2016-9104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9104"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9104",
"url": "https://www.suse.com/security/cve/CVE-2016-9104"
},
{
"category": "external",
"summary": "SUSE Bug 1007493 for CVE-2016-9104",
"url": "https://bugzilla.suse.com/1007493"
},
{
"category": "external",
"summary": "SUSE Bug 1014297 for CVE-2016-9104",
"url": "https://bugzilla.suse.com/1014297"
},
{
"category": "external",
"summary": "SUSE Bug 1034990 for CVE-2016-9104",
"url": "https://bugzilla.suse.com/1034990"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9104"
},
{
"cve": "CVE-2016-9105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9105"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9105",
"url": "https://www.suse.com/security/cve/CVE-2016-9105"
},
{
"category": "external",
"summary": "SUSE Bug 1007494 for CVE-2016-9105",
"url": "https://bugzilla.suse.com/1007494"
},
{
"category": "external",
"summary": "SUSE Bug 1014279 for CVE-2016-9105",
"url": "https://bugzilla.suse.com/1014279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9105"
},
{
"cve": "CVE-2016-9106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9106"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9106",
"url": "https://www.suse.com/security/cve/CVE-2016-9106"
},
{
"category": "external",
"summary": "SUSE Bug 1007495 for CVE-2016-9106",
"url": "https://bugzilla.suse.com/1007495"
},
{
"category": "external",
"summary": "SUSE Bug 1014299 for CVE-2016-9106",
"url": "https://bugzilla.suse.com/1014299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9106"
},
{
"cve": "CVE-2016-9602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9602"
}
],
"notes": [
{
"category": "general",
"text": "Qemu before version 2.9 is vulnerable to an improper link following when built with the VirtFS. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9602",
"url": "https://www.suse.com/security/cve/CVE-2016-9602"
},
{
"category": "external",
"summary": "SUSE Bug 1020427 for CVE-2016-9602",
"url": "https://bugzilla.suse.com/1020427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9602"
},
{
"cve": "CVE-2016-9907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9907"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in \u0027usbredir_handle_destroy\u0027. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9907",
"url": "https://www.suse.com/security/cve/CVE-2016-9907"
},
{
"category": "external",
"summary": "SUSE Bug 1014109 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014109"
},
{
"category": "external",
"summary": "SUSE Bug 1014490 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9907"
},
{
"cve": "CVE-2016-9921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9921"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9921",
"url": "https://www.suse.com/security/cve/CVE-2016-9921"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9921"
},
{
"cve": "CVE-2017-10664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10664"
}
],
"notes": [
{
"category": "general",
"text": "qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10664",
"url": "https://www.suse.com/security/cve/CVE-2017-10664"
},
{
"category": "external",
"summary": "SUSE Bug 1046636 for CVE-2017-10664",
"url": "https://bugzilla.suse.com/1046636"
},
{
"category": "external",
"summary": "SUSE Bug 1046637 for CVE-2017-10664",
"url": "https://bugzilla.suse.com/1046637"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-10664",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10664"
},
{
"cve": "CVE-2017-10806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10806"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10806",
"url": "https://www.suse.com/security/cve/CVE-2017-10806"
},
{
"category": "external",
"summary": "SUSE Bug 1047674 for CVE-2017-10806",
"url": "https://bugzilla.suse.com/1047674"
},
{
"category": "external",
"summary": "SUSE Bug 1047675 for CVE-2017-10806",
"url": "https://bugzilla.suse.com/1047675"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10806"
},
{
"cve": "CVE-2017-11334",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11334"
}
],
"notes": [
{
"category": "general",
"text": "The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11334",
"url": "https://www.suse.com/security/cve/CVE-2017-11334"
},
{
"category": "external",
"summary": "SUSE Bug 1048902 for CVE-2017-11334",
"url": "https://bugzilla.suse.com/1048902"
},
{
"category": "external",
"summary": "SUSE Bug 1048920 for CVE-2017-11334",
"url": "https://bugzilla.suse.com/1048920"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-11334"
},
{
"cve": "CVE-2017-11434",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11434"
}
],
"notes": [
{
"category": "general",
"text": "The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11434",
"url": "https://www.suse.com/security/cve/CVE-2017-11434"
},
{
"category": "external",
"summary": "SUSE Bug 1049381 for CVE-2017-11434",
"url": "https://bugzilla.suse.com/1049381"
},
{
"category": "external",
"summary": "SUSE Bug 1049578 for CVE-2017-11434",
"url": "https://bugzilla.suse.com/1049578"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-11434",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-11434"
},
{
"cve": "CVE-2017-13673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13673"
}
],
"notes": [
{
"category": "general",
"text": "The vga display update in mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the cpu_physical_memory_snapshot_get_dirty function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13673",
"url": "https://www.suse.com/security/cve/CVE-2017-13673"
},
{
"category": "external",
"summary": "SUSE Bug 1056386 for CVE-2017-13673",
"url": "https://bugzilla.suse.com/1056386"
},
{
"category": "external",
"summary": "SUSE Bug 1056387 for CVE-2017-13673",
"url": "https://bugzilla.suse.com/1056387"
},
{
"category": "external",
"summary": "SUSE Bug 1084604 for CVE-2017-13673",
"url": "https://bugzilla.suse.com/1084604"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-13673"
},
{
"cve": "CVE-2017-13711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13711"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13711",
"url": "https://www.suse.com/security/cve/CVE-2017-13711"
},
{
"category": "external",
"summary": "SUSE Bug 1056291 for CVE-2017-13711",
"url": "https://bugzilla.suse.com/1056291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-13711"
},
{
"cve": "CVE-2017-14167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14167"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14167",
"url": "https://www.suse.com/security/cve/CVE-2017-14167"
},
{
"category": "external",
"summary": "SUSE Bug 1057585 for CVE-2017-14167",
"url": "https://bugzilla.suse.com/1057585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-14167"
},
{
"cve": "CVE-2017-15038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15038"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the v9fs_xattrwalk function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15038",
"url": "https://www.suse.com/security/cve/CVE-2017-15038"
},
{
"category": "external",
"summary": "SUSE Bug 1062069 for CVE-2017-15038",
"url": "https://bugzilla.suse.com/1062069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-15038"
},
{
"cve": "CVE-2017-15118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15118"
}
],
"notes": [
{
"category": "general",
"text": "A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15118",
"url": "https://www.suse.com/security/cve/CVE-2017-15118"
},
{
"category": "external",
"summary": "SUSE Bug 1070147 for CVE-2017-15118",
"url": "https://bugzilla.suse.com/1070147"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2017-15118"
},
{
"cve": "CVE-2017-15268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15268"
}
],
"notes": [
{
"category": "general",
"text": "Qemu through 2.10.0 allows remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15268",
"url": "https://www.suse.com/security/cve/CVE-2017-15268"
},
{
"category": "external",
"summary": "SUSE Bug 1062942 for CVE-2017-15268",
"url": "https://bugzilla.suse.com/1062942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15268"
},
{
"cve": "CVE-2017-15289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15289"
}
],
"notes": [
{
"category": "general",
"text": "The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15289",
"url": "https://www.suse.com/security/cve/CVE-2017-15289"
},
{
"category": "external",
"summary": "SUSE Bug 1063122 for CVE-2017-15289",
"url": "https://bugzilla.suse.com/1063122"
},
{
"category": "external",
"summary": "SUSE Bug 1063123 for CVE-2017-15289",
"url": "https://bugzilla.suse.com/1063123"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-15289",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15289"
},
{
"cve": "CVE-2017-2615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2615"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2615",
"url": "https://www.suse.com/security/cve/CVE-2017-2615"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-2615"
},
{
"cve": "CVE-2017-2620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2620"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2620",
"url": "https://www.suse.com/security/cve/CVE-2017-2620"
},
{
"category": "external",
"summary": "SUSE Bug 1024834 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024834"
},
{
"category": "external",
"summary": "SUSE Bug 1024972 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024972"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-2620"
},
{
"cve": "CVE-2017-2630",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2630"
}
],
"notes": [
{
"category": "general",
"text": "A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server\u0027s response to a \u0027NBD_OPT_LIST\u0027 request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2630",
"url": "https://www.suse.com/security/cve/CVE-2017-2630"
},
{
"category": "external",
"summary": "SUSE Bug 1025396 for CVE-2017-2630",
"url": "https://bugzilla.suse.com/1025396"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-2630"
},
{
"cve": "CVE-2017-5525",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5525"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/audio/ac97.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5525",
"url": "https://www.suse.com/security/cve/CVE-2017-5525"
},
{
"category": "external",
"summary": "SUSE Bug 1020491 for CVE-2017-5525",
"url": "https://bugzilla.suse.com/1020491"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5525"
},
{
"cve": "CVE-2017-5526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5526"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/audio/es1370.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5526",
"url": "https://www.suse.com/security/cve/CVE-2017-5526"
},
{
"category": "external",
"summary": "SUSE Bug 1020589 for CVE-2017-5526",
"url": "https://bugzilla.suse.com/1020589"
},
{
"category": "external",
"summary": "SUSE Bug 1059777 for CVE-2017-5526",
"url": "https://bugzilla.suse.com/1059777"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5526",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5526"
},
{
"cve": "CVE-2017-5552",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5552"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the virgl_resource_attach_backing function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5552",
"url": "https://www.suse.com/security/cve/CVE-2017-5552"
},
{
"category": "external",
"summary": "SUSE Bug 1021195 for CVE-2017-5552",
"url": "https://bugzilla.suse.com/1021195"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5552"
},
{
"cve": "CVE-2017-5578",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5578"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the virtio_gpu_resource_attach_backing function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5578",
"url": "https://www.suse.com/security/cve/CVE-2017-5578"
},
{
"category": "external",
"summary": "SUSE Bug 1021481 for CVE-2017-5578",
"url": "https://bugzilla.suse.com/1021481"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5578"
},
{
"cve": "CVE-2017-5579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5579"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the serial_exit_core function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5579",
"url": "https://www.suse.com/security/cve/CVE-2017-5579"
},
{
"category": "external",
"summary": "SUSE Bug 1021741 for CVE-2017-5579",
"url": "https://bugzilla.suse.com/1021741"
},
{
"category": "external",
"summary": "SUSE Bug 1022627 for CVE-2017-5579",
"url": "https://bugzilla.suse.com/1022627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5579"
},
{
"cve": "CVE-2017-5667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5667"
}
],
"notes": [
{
"category": "general",
"text": "The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds heap access and crash) or execute arbitrary code on the QEMU host via vectors involving the data transfer length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5667",
"url": "https://www.suse.com/security/cve/CVE-2017-5667"
},
{
"category": "external",
"summary": "SUSE Bug 1022541 for CVE-2017-5667",
"url": "https://bugzilla.suse.com/1022541"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5667"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5856"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) via MegaRAID Firmware Interface (MFI) commands with the sglist size set to a value over 2 Gb.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5856",
"url": "https://www.suse.com/security/cve/CVE-2017-5856"
},
{
"category": "external",
"summary": "SUSE Bug 1023053 for CVE-2017-5856",
"url": "https://bugzilla.suse.com/1023053"
},
{
"category": "external",
"summary": "SUSE Bug 1024186 for CVE-2017-5856",
"url": "https://bugzilla.suse.com/1024186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5856"
},
{
"cve": "CVE-2017-5857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5857"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the virgl_cmd_resource_unref function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_UNREF commands sent without detaching the backing storage beforehand.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5857",
"url": "https://www.suse.com/security/cve/CVE-2017-5857"
},
{
"category": "external",
"summary": "SUSE Bug 1023073 for CVE-2017-5857",
"url": "https://bugzilla.suse.com/1023073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5857"
},
{
"cve": "CVE-2017-5898",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5898"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5898",
"url": "https://www.suse.com/security/cve/CVE-2017-5898"
},
{
"category": "external",
"summary": "SUSE Bug 1023907 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1023907"
},
{
"category": "external",
"summary": "SUSE Bug 1024307 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1024307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5898"
},
{
"cve": "CVE-2017-5973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5973"
}
],
"notes": [
{
"category": "general",
"text": "The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors related to control transfer descriptor sequence.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5973",
"url": "https://www.suse.com/security/cve/CVE-2017-5973"
},
{
"category": "external",
"summary": "SUSE Bug 1025109 for CVE-2017-5973",
"url": "https://bugzilla.suse.com/1025109"
},
{
"category": "external",
"summary": "SUSE Bug 1025188 for CVE-2017-5973",
"url": "https://bugzilla.suse.com/1025188"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5973"
},
{
"cve": "CVE-2017-6058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6058"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU (aka Quick Emulator), when the VLANSTRIP feature is enabled on the vmxnet3 device, allows remote attackers to cause a denial of service (out-of-bounds access and QEMU process crash) via vectors related to VLAN stripping.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6058",
"url": "https://www.suse.com/security/cve/CVE-2017-6058"
},
{
"category": "external",
"summary": "SUSE Bug 1025837 for CVE-2017-6058",
"url": "https://bugzilla.suse.com/1025837"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-6058"
},
{
"cve": "CVE-2017-7471",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7471"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7471",
"url": "https://www.suse.com/security/cve/CVE-2017-7471"
},
{
"category": "external",
"summary": "SUSE Bug 1034866 for CVE-2017-7471",
"url": "https://bugzilla.suse.com/1034866"
},
{
"category": "external",
"summary": "SUSE Bug 1034990 for CVE-2017-7471",
"url": "https://bugzilla.suse.com/1034990"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7471"
},
{
"cve": "CVE-2017-7493",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7493"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7493",
"url": "https://www.suse.com/security/cve/CVE-2017-7493"
},
{
"category": "external",
"summary": "SUSE Bug 1039495 for CVE-2017-7493",
"url": "https://bugzilla.suse.com/1039495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7493"
},
{
"cve": "CVE-2017-8112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8112"
}
],
"notes": [
{
"category": "general",
"text": "hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8112",
"url": "https://www.suse.com/security/cve/CVE-2017-8112"
},
{
"category": "external",
"summary": "SUSE Bug 1036211 for CVE-2017-8112",
"url": "https://bugzilla.suse.com/1036211"
},
{
"category": "external",
"summary": "SUSE Bug 1036470 for CVE-2017-8112",
"url": "https://bugzilla.suse.com/1036470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8112"
},
{
"cve": "CVE-2017-8309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8309"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8309",
"url": "https://www.suse.com/security/cve/CVE-2017-8309"
},
{
"category": "external",
"summary": "SUSE Bug 1037242 for CVE-2017-8309",
"url": "https://bugzilla.suse.com/1037242"
},
{
"category": "external",
"summary": "SUSE Bug 1037243 for CVE-2017-8309",
"url": "https://bugzilla.suse.com/1037243"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-8309",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8309"
},
{
"cve": "CVE-2017-8379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8379"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8379",
"url": "https://www.suse.com/security/cve/CVE-2017-8379"
},
{
"category": "external",
"summary": "SUSE Bug 1037334 for CVE-2017-8379",
"url": "https://bugzilla.suse.com/1037334"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8379"
},
{
"cve": "CVE-2017-8380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8380"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the \"megasas_mmio_write\" function in Qemu 2.9.0 allows remote attackers to have unspecified impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8380",
"url": "https://www.suse.com/security/cve/CVE-2017-8380"
},
{
"category": "external",
"summary": "SUSE Bug 1037336 for CVE-2017-8380",
"url": "https://bugzilla.suse.com/1037336"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8380"
},
{
"cve": "CVE-2017-9503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9503"
}
],
"notes": [
{
"category": "general",
"text": "QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9503",
"url": "https://www.suse.com/security/cve/CVE-2017-9503"
},
{
"category": "external",
"summary": "SUSE Bug 1043296 for CVE-2017-9503",
"url": "https://bugzilla.suse.com/1043296"
},
{
"category": "external",
"summary": "SUSE Bug 1043297 for CVE-2017-9503",
"url": "https://bugzilla.suse.com/1043297"
},
{
"category": "external",
"summary": "SUSE Bug 1043312 for CVE-2017-9503",
"url": "https://bugzilla.suse.com/1043312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-9503"
},
{
"cve": "CVE-2017-9524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9524"
}
],
"notes": [
{
"category": "general",
"text": "The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9524",
"url": "https://www.suse.com/security/cve/CVE-2017-9524"
},
{
"category": "external",
"summary": "SUSE Bug 1043808 for CVE-2017-9524",
"url": "https://bugzilla.suse.com/1043808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-9524"
},
{
"cve": "CVE-2018-10839",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10839"
}
],
"notes": [
{
"category": "general",
"text": "Qemu emulator \u003c= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10839",
"url": "https://www.suse.com/security/cve/CVE-2018-10839"
},
{
"category": "external",
"summary": "SUSE Bug 1110910 for CVE-2018-10839",
"url": "https://bugzilla.suse.com/1110910"
},
{
"category": "external",
"summary": "SUSE Bug 1110924 for CVE-2018-10839",
"url": "https://bugzilla.suse.com/1110924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10839"
},
{
"cve": "CVE-2018-11806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11806"
}
],
"notes": [
{
"category": "general",
"text": "m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11806",
"url": "https://www.suse.com/security/cve/CVE-2018-11806"
},
{
"category": "external",
"summary": "SUSE Bug 1096223 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "external",
"summary": "SUSE Bug 1096224 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-11806"
},
{
"cve": "CVE-2018-12126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12126"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12126",
"url": "https://www.suse.com/security/cve/CVE-2018-12126"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1135524 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135524"
},
{
"category": "external",
"summary": "SUSE Bug 1137916 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1137916"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 1149726 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149726"
},
{
"category": "external",
"summary": "SUSE Bug 1149729 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149729"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12126"
},
{
"cve": "CVE-2018-12130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12130"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12130",
"url": "https://www.suse.com/security/cve/CVE-2018-12130"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1137916 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1137916"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12130"
},
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2018-15746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-15746"
}
],
"notes": [
{
"category": "general",
"text": "qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-15746",
"url": "https://www.suse.com/security/cve/CVE-2018-15746"
},
{
"category": "external",
"summary": "SUSE Bug 1106222 for CVE-2018-15746",
"url": "https://bugzilla.suse.com/1106222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-15746"
},
{
"cve": "CVE-2018-16872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16872"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn\u0027t consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16872",
"url": "https://www.suse.com/security/cve/CVE-2018-16872"
},
{
"category": "external",
"summary": "SUSE Bug 1119493 for CVE-2018-16872",
"url": "https://bugzilla.suse.com/1119493"
},
{
"category": "external",
"summary": "SUSE Bug 1119494 for CVE-2018-16872",
"url": "https://bugzilla.suse.com/1119494"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-16872"
},
{
"cve": "CVE-2018-17963",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17963"
}
],
"notes": [
{
"category": "general",
"text": "qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17963",
"url": "https://www.suse.com/security/cve/CVE-2018-17963"
},
{
"category": "external",
"summary": "SUSE Bug 1111013 for CVE-2018-17963",
"url": "https://bugzilla.suse.com/1111013"
},
{
"category": "external",
"summary": "SUSE Bug 1111014 for CVE-2018-17963",
"url": "https://bugzilla.suse.com/1111014"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-17963",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-17963"
},
{
"cve": "CVE-2018-20123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20123"
}
],
"notes": [
{
"category": "general",
"text": "pvrdma_realize in hw/rdma/vmw/pvrdma_main.c in QEMU has a Memory leak after an initialisation error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20123",
"url": "https://www.suse.com/security/cve/CVE-2018-20123"
},
{
"category": "external",
"summary": "SUSE Bug 1119437 for CVE-2018-20123",
"url": "https://bugzilla.suse.com/1119437"
},
{
"category": "external",
"summary": "SUSE Bug 1119438 for CVE-2018-20123",
"url": "https://bugzilla.suse.com/1119438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-20123"
},
{
"cve": "CVE-2018-20124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20124"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/rdma_backend.c in QEMU allows guest OS users to trigger out-of-bounds access via a PvrdmaSqWqe ring element with a large num_sge value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20124",
"url": "https://www.suse.com/security/cve/CVE-2018-20124"
},
{
"category": "external",
"summary": "SUSE Bug 1119840 for CVE-2018-20124",
"url": "https://bugzilla.suse.com/1119840"
},
{
"category": "external",
"summary": "SUSE Bug 1119841 for CVE-2018-20124",
"url": "https://bugzilla.suse.com/1119841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-20124"
},
{
"cve": "CVE-2018-20125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20125"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/vmw/pvrdma_cmd.c in QEMU allows attackers to cause a denial of service (NULL pointer dereference or excessive memory allocation) in create_cq_ring or create_qp_rings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20125",
"url": "https://www.suse.com/security/cve/CVE-2018-20125"
},
{
"category": "external",
"summary": "SUSE Bug 1119989 for CVE-2018-20125",
"url": "https://bugzilla.suse.com/1119989"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-20125"
},
{
"cve": "CVE-2018-20126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20126"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/vmw/pvrdma_cmd.c in QEMU allows create_cq and create_qp memory leaks because errors are mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20126",
"url": "https://www.suse.com/security/cve/CVE-2018-20126"
},
{
"category": "external",
"summary": "SUSE Bug 1119991 for CVE-2018-20126",
"url": "https://bugzilla.suse.com/1119991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-20126"
},
{
"cve": "CVE-2018-20191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20191"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/vmw/pvrdma_main.c in QEMU does not implement a read operation (such as uar_read by analogy to uar_write), which allows attackers to cause a denial of service (NULL pointer dereference).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20191",
"url": "https://www.suse.com/security/cve/CVE-2018-20191"
},
{
"category": "external",
"summary": "SUSE Bug 1119979 for CVE-2018-20191",
"url": "https://bugzilla.suse.com/1119979"
},
{
"category": "external",
"summary": "SUSE Bug 1119980 for CVE-2018-20191",
"url": "https://bugzilla.suse.com/1119980"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-20191"
},
{
"cve": "CVE-2018-20216",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20216"
}
],
"notes": [
{
"category": "general",
"text": "QEMU can have an infinite loop in hw/rdma/vmw/pvrdma_dev_ring.c because return values are not checked (and -1 is mishandled).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20216",
"url": "https://www.suse.com/security/cve/CVE-2018-20216"
},
{
"category": "external",
"summary": "SUSE Bug 1119984 for CVE-2018-20216",
"url": "https://bugzilla.suse.com/1119984"
},
{
"category": "external",
"summary": "SUSE Bug 1119985 for CVE-2018-20216",
"url": "https://bugzilla.suse.com/1119985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-20216"
},
{
"cve": "CVE-2018-20815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20815"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20815",
"url": "https://www.suse.com/security/cve/CVE-2018-20815"
},
{
"category": "external",
"summary": "SUSE Bug 1118900 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1118900"
},
{
"category": "external",
"summary": "SUSE Bug 1130675 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1130675"
},
{
"category": "external",
"summary": "SUSE Bug 1130680 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1130680"
},
{
"category": "external",
"summary": "SUSE Bug 1138043 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1138043"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-20815"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-7858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7858"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7858",
"url": "https://www.suse.com/security/cve/CVE-2018-7858"
},
{
"category": "external",
"summary": "SUSE Bug 1084604 for CVE-2018-7858",
"url": "https://bugzilla.suse.com/1084604"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-7858"
},
{
"cve": "CVE-2019-03812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-03812"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-03812",
"url": "https://www.suse.com/security/cve/CVE-2019-03812"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-03812"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-12155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12155"
}
],
"notes": [
{
"category": "general",
"text": "interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12155",
"url": "https://www.suse.com/security/cve/CVE-2019-12155"
},
{
"category": "external",
"summary": "SUSE Bug 1135902 for CVE-2019-12155",
"url": "https://bugzilla.suse.com/1135902"
},
{
"category": "external",
"summary": "SUSE Bug 1135905 for CVE-2019-12155",
"url": "https://bugzilla.suse.com/1135905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-12155"
},
{
"cve": "CVE-2019-13164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13164"
}
],
"notes": [
{
"category": "general",
"text": "qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13164",
"url": "https://www.suse.com/security/cve/CVE-2019-13164"
},
{
"category": "external",
"summary": "SUSE Bug 1140402 for CVE-2019-13164",
"url": "https://bugzilla.suse.com/1140402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-13164"
},
{
"cve": "CVE-2019-14378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14378"
}
],
"notes": [
{
"category": "general",
"text": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14378",
"url": "https://www.suse.com/security/cve/CVE-2019-14378"
},
{
"category": "external",
"summary": "SUSE Bug 1143794 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143794"
},
{
"category": "external",
"summary": "SUSE Bug 1143797 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143797"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14378"
},
{
"cve": "CVE-2019-15890",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15890"
}
],
"notes": [
{
"category": "general",
"text": "libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15890",
"url": "https://www.suse.com/security/cve/CVE-2019-15890"
},
{
"category": "external",
"summary": "SUSE Bug 1149811 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1149811"
},
{
"category": "external",
"summary": "SUSE Bug 1149813 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1149813"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15890"
},
{
"cve": "CVE-2019-6778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-6778"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-6778",
"url": "https://www.suse.com/security/cve/CVE-2019-6778"
},
{
"category": "external",
"summary": "SUSE Bug 1123156 for CVE-2019-6778",
"url": "https://bugzilla.suse.com/1123156"
},
{
"category": "external",
"summary": "SUSE Bug 1123157 for CVE-2019-6778",
"url": "https://bugzilla.suse.com/1123157"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-6778",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-6778"
},
{
"cve": "CVE-2019-8934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8934"
}
],
"notes": [
{
"category": "general",
"text": "hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8934",
"url": "https://www.suse.com/security/cve/CVE-2019-8934"
},
{
"category": "external",
"summary": "SUSE Bug 1118900 for CVE-2019-8934",
"url": "https://bugzilla.suse.com/1118900"
},
{
"category": "external",
"summary": "SUSE Bug 1126455 for CVE-2019-8934",
"url": "https://bugzilla.suse.com/1126455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-8934"
},
{
"cve": "CVE-2019-9824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9824"
}
],
"notes": [
{
"category": "general",
"text": "tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9824",
"url": "https://www.suse.com/security/cve/CVE-2019-9824"
},
{
"category": "external",
"summary": "SUSE Bug 1118900 for CVE-2019-9824",
"url": "https://bugzilla.suse.com/1118900"
},
{
"category": "external",
"summary": "SUSE Bug 1129622 for CVE-2019-9824",
"url": "https://bugzilla.suse.com/1129622"
},
{
"category": "external",
"summary": "SUSE Bug 1129623 for CVE-2019-9824",
"url": "https://bugzilla.suse.com/1129623"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-9824",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-9824"
},
{
"cve": "CVE-2020-10702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10702"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10702",
"url": "https://www.suse.com/security/cve/CVE-2020-10702"
},
{
"category": "external",
"summary": "SUSE Bug 1168681 for CVE-2020-10702",
"url": "https://bugzilla.suse.com/1168681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10702"
},
{
"cve": "CVE-2020-10717",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10717"
}
],
"notes": [
{
"category": "general",
"text": "A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation of the QEMU version \u003e= v5.0. Virtio-fs is meant to share a host file system directory with a guest via virtio-fs device. If the guest opens the maximum number of file descriptors under the shared directory, a denial of service may occur. This flaw allows a guest user/process to cause this denial of service on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10717",
"url": "https://www.suse.com/security/cve/CVE-2020-10717"
},
{
"category": "external",
"summary": "SUSE Bug 1171110 for CVE-2020-10717",
"url": "https://bugzilla.suse.com/1171110"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-10717"
},
{
"cve": "CVE-2020-10761",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10761"
}
],
"notes": [
{
"category": "general",
"text": "An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10761",
"url": "https://www.suse.com/security/cve/CVE-2020-10761"
},
{
"category": "external",
"summary": "SUSE Bug 1172710 for CVE-2020-10761",
"url": "https://bugzilla.suse.com/1172710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-10761"
},
{
"cve": "CVE-2020-11102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-11102"
}
],
"notes": [
{
"category": "general",
"text": "hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-11102",
"url": "https://www.suse.com/security/cve/CVE-2020-11102"
},
{
"category": "external",
"summary": "SUSE Bug 1168713 for CVE-2020-11102",
"url": "https://bugzilla.suse.com/1168713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-11102"
},
{
"cve": "CVE-2020-11869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-11869"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-11869",
"url": "https://www.suse.com/security/cve/CVE-2020-11869"
},
{
"category": "external",
"summary": "SUSE Bug 1170537 for CVE-2020-11869",
"url": "https://bugzilla.suse.com/1170537"
},
{
"category": "external",
"summary": "SUSE Bug 1188609 for CVE-2020-11869",
"url": "https://bugzilla.suse.com/1188609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-11869"
},
{
"cve": "CVE-2020-13361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13361"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13361",
"url": "https://www.suse.com/security/cve/CVE-2020-13361"
},
{
"category": "external",
"summary": "SUSE Bug 1172384 for CVE-2020-13361",
"url": "https://bugzilla.suse.com/1172384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-13361"
},
{
"cve": "CVE-2020-13362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13362"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13362",
"url": "https://www.suse.com/security/cve/CVE-2020-13362"
},
{
"category": "external",
"summary": "SUSE Bug 1172383 for CVE-2020-13362",
"url": "https://bugzilla.suse.com/1172383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-13362"
},
{
"cve": "CVE-2020-13659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13659"
}
],
"notes": [
{
"category": "general",
"text": "address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13659",
"url": "https://www.suse.com/security/cve/CVE-2020-13659"
},
{
"category": "external",
"summary": "SUSE Bug 1172386 for CVE-2020-13659",
"url": "https://bugzilla.suse.com/1172386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-13659"
},
{
"cve": "CVE-2020-13800",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13800"
}
],
"notes": [
{
"category": "general",
"text": "ati-vga in hw/display/ati.c in QEMU 4.2.0 allows guest OS users to trigger infinite recursion via a crafted mm_index value during an ati_mm_read or ati_mm_write call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13800",
"url": "https://www.suse.com/security/cve/CVE-2020-13800"
},
{
"category": "external",
"summary": "SUSE Bug 1172495 for CVE-2020-13800",
"url": "https://bugzilla.suse.com/1172495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-13800"
},
{
"cve": "CVE-2020-14364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14364"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice \u0027setup_len\u0027 exceeds its \u0027data_buf[4096]\u0027 in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14364",
"url": "https://www.suse.com/security/cve/CVE-2020-14364"
},
{
"category": "external",
"summary": "SUSE Bug 1175441 for CVE-2020-14364",
"url": "https://bugzilla.suse.com/1175441"
},
{
"category": "external",
"summary": "SUSE Bug 1175534 for CVE-2020-14364",
"url": "https://bugzilla.suse.com/1175534"
},
{
"category": "external",
"summary": "SUSE Bug 1176494 for CVE-2020-14364",
"url": "https://bugzilla.suse.com/1176494"
},
{
"category": "external",
"summary": "SUSE Bug 1177130 for CVE-2020-14364",
"url": "https://bugzilla.suse.com/1177130"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14364"
},
{
"cve": "CVE-2020-16092",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16092"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16092",
"url": "https://www.suse.com/security/cve/CVE-2020-16092"
},
{
"category": "external",
"summary": "SUSE Bug 1174641 for CVE-2020-16092",
"url": "https://bugzilla.suse.com/1174641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-16092"
},
{
"cve": "CVE-2020-1711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1711"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1711",
"url": "https://www.suse.com/security/cve/CVE-2020-1711"
},
{
"category": "external",
"summary": "SUSE Bug 1166240 for CVE-2020-1711",
"url": "https://bugzilla.suse.com/1166240"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-1711"
},
{
"cve": "CVE-2020-17380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-17380"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-17380",
"url": "https://www.suse.com/security/cve/CVE-2020-17380"
},
{
"category": "external",
"summary": "SUSE Bug 1175144 for CVE-2020-17380",
"url": "https://bugzilla.suse.com/1175144"
},
{
"category": "external",
"summary": "SUSE Bug 1182282 for CVE-2020-17380",
"url": "https://bugzilla.suse.com/1182282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-17380"
},
{
"cve": "CVE-2020-1983",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1983"
}
],
"notes": [
{
"category": "general",
"text": "A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1983",
"url": "https://www.suse.com/security/cve/CVE-2020-1983"
},
{
"category": "external",
"summary": "SUSE Bug 1170940 for CVE-2020-1983",
"url": "https://bugzilla.suse.com/1170940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-1983"
},
{
"cve": "CVE-2020-25085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25085"
}
],
"notes": [
{
"category": "general",
"text": "QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25085",
"url": "https://www.suse.com/security/cve/CVE-2020-25085"
},
{
"category": "external",
"summary": "SUSE Bug 1176681 for CVE-2020-25085",
"url": "https://bugzilla.suse.com/1176681"
},
{
"category": "external",
"summary": "SUSE Bug 1182282 for CVE-2020-25085",
"url": "https://bugzilla.suse.com/1182282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25085"
},
{
"cve": "CVE-2020-25723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25723"
}
],
"notes": [
{
"category": "general",
"text": "A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25723",
"url": "https://www.suse.com/security/cve/CVE-2020-25723"
},
{
"category": "external",
"summary": "SUSE Bug 1178934 for CVE-2020-25723",
"url": "https://bugzilla.suse.com/1178934"
},
{
"category": "external",
"summary": "SUSE Bug 1178935 for CVE-2020-25723",
"url": "https://bugzilla.suse.com/1178935"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-25723"
},
{
"cve": "CVE-2020-27821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27821"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27821",
"url": "https://www.suse.com/security/cve/CVE-2020-27821"
},
{
"category": "external",
"summary": "SUSE Bug 1179686 for CVE-2020-27821",
"url": "https://bugzilla.suse.com/1179686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-27821"
},
{
"cve": "CVE-2020-29129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29129"
}
],
"notes": [
{
"category": "general",
"text": "ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29129",
"url": "https://www.suse.com/security/cve/CVE-2020-29129"
},
{
"category": "external",
"summary": "SUSE Bug 1179466 for CVE-2020-29129",
"url": "https://bugzilla.suse.com/1179466"
},
{
"category": "external",
"summary": "SUSE Bug 1179467 for CVE-2020-29129",
"url": "https://bugzilla.suse.com/1179467"
},
{
"category": "external",
"summary": "SUSE Bug 1179477 for CVE-2020-29129",
"url": "https://bugzilla.suse.com/1179477"
},
{
"category": "external",
"summary": "SUSE Bug 1179484 for CVE-2020-29129",
"url": "https://bugzilla.suse.com/1179484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-29129"
},
{
"cve": "CVE-2020-7039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7039"
}
],
"notes": [
{
"category": "general",
"text": "tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7039",
"url": "https://www.suse.com/security/cve/CVE-2020-7039"
},
{
"category": "external",
"summary": "SUSE Bug 1161066 for CVE-2020-7039",
"url": "https://bugzilla.suse.com/1161066"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-7039"
},
{
"cve": "CVE-2020-8608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8608"
}
],
"notes": [
{
"category": "general",
"text": "In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8608",
"url": "https://www.suse.com/security/cve/CVE-2020-8608"
},
{
"category": "external",
"summary": "SUSE Bug 1163018 for CVE-2020-8608",
"url": "https://bugzilla.suse.com/1163018"
},
{
"category": "external",
"summary": "SUSE Bug 1163019 for CVE-2020-8608",
"url": "https://bugzilla.suse.com/1163019"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8608"
},
{
"cve": "CVE-2021-20181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20181"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20181",
"url": "https://www.suse.com/security/cve/CVE-2021-20181"
},
{
"category": "external",
"summary": "SUSE Bug 1182137 for CVE-2021-20181",
"url": "https://bugzilla.suse.com/1182137"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-20181"
},
{
"cve": "CVE-2021-20203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20203"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20203",
"url": "https://www.suse.com/security/cve/CVE-2021-20203"
},
{
"category": "external",
"summary": "SUSE Bug 1181639 for CVE-2021-20203",
"url": "https://bugzilla.suse.com/1181639"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-20203"
},
{
"cve": "CVE-2021-20221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20221"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20221",
"url": "https://www.suse.com/security/cve/CVE-2021-20221"
},
{
"category": "external",
"summary": "SUSE Bug 1181933 for CVE-2021-20221",
"url": "https://bugzilla.suse.com/1181933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20221"
},
{
"cve": "CVE-2021-20257",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20257"
}
],
"notes": [
{
"category": "general",
"text": "An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20257",
"url": "https://www.suse.com/security/cve/CVE-2021-20257"
},
{
"category": "external",
"summary": "SUSE Bug 1182577 for CVE-2021-20257",
"url": "https://bugzilla.suse.com/1182577"
},
{
"category": "external",
"summary": "SUSE Bug 1182846 for CVE-2021-20257",
"url": "https://bugzilla.suse.com/1182846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-20257"
},
{
"cve": "CVE-2021-20263",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20263"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the virtio-fs shared file system daemon (virtiofsd) of QEMU. The new \u0027xattrmap\u0027 option may cause the \u0027security.capability\u0027 xattr in the guest to not drop on file write, potentially leading to a modified, privileged executable in the guest. In rare circumstances, this flaw could be used by a malicious user to elevate their privileges within the guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20263",
"url": "https://www.suse.com/security/cve/CVE-2021-20263"
},
{
"category": "external",
"summary": "SUSE Bug 1183373 for CVE-2021-20263",
"url": "https://bugzilla.suse.com/1183373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-20263"
},
{
"cve": "CVE-2021-3416",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3416"
}
],
"notes": [
{
"category": "general",
"text": "A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3416",
"url": "https://www.suse.com/security/cve/CVE-2021-3416"
},
{
"category": "external",
"summary": "SUSE Bug 1182968 for CVE-2021-3416",
"url": "https://bugzilla.suse.com/1182968"
},
{
"category": "external",
"summary": "SUSE Bug 1186473 for CVE-2021-3416",
"url": "https://bugzilla.suse.com/1186473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3416"
},
{
"cve": "CVE-2021-3527",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3527"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3527",
"url": "https://www.suse.com/security/cve/CVE-2021-3527"
},
{
"category": "external",
"summary": "SUSE Bug 1186012 for CVE-2021-3527",
"url": "https://bugzilla.suse.com/1186012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3527"
},
{
"cve": "CVE-2021-3544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3544"
}
],
"notes": [
{
"category": "general",
"text": "Several memory leaks were found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. They exist in contrib/vhost-user-gpu/vhost-user-gpu.c and contrib/vhost-user-gpu/virgl.c due to improper release of memory (i.e., free) after effective lifetime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3544",
"url": "https://www.suse.com/security/cve/CVE-2021-3544"
},
{
"category": "external",
"summary": "SUSE Bug 1186010 for CVE-2021-3544",
"url": "https://bugzilla.suse.com/1186010"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3544"
},
{
"cve": "CVE-2021-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3545"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3545",
"url": "https://www.suse.com/security/cve/CVE-2021-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1185990 for CVE-2021-3545",
"url": "https://bugzilla.suse.com/1185990"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3545"
},
{
"cve": "CVE-2021-3546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3546"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the \u0027VIRTIO_GPU_CMD_GET_CAPSET\u0027 command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3546",
"url": "https://www.suse.com/security/cve/CVE-2021-3546"
},
{
"category": "external",
"summary": "SUSE Bug 1185981 for CVE-2021-3546",
"url": "https://bugzilla.suse.com/1185981"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3546"
},
{
"cve": "CVE-2021-3582",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3582"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the QEMU implementation of VMWare\u0027s paravirtual RDMA device. The issue occurs while handling a \"PVRDMA_CMD_CREATE_MR\" command due to improper memory remapping (mremap). This flaw allows a malicious guest to crash the QEMU process on the host. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3582",
"url": "https://www.suse.com/security/cve/CVE-2021-3582"
},
{
"category": "external",
"summary": "SUSE Bug 1187499 for CVE-2021-3582",
"url": "https://bugzilla.suse.com/1187499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3582"
},
{
"cve": "CVE-2021-3607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3607"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow was found in the QEMU implementation of VMWare\u0027s paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a \"PVRDMA_REG_DSRHIGH\" write from the guest due to improper input validation. This flaw allows a privileged guest user to make QEMU allocate a large amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3607",
"url": "https://www.suse.com/security/cve/CVE-2021-3607"
},
{
"category": "external",
"summary": "SUSE Bug 1187539 for CVE-2021-3607",
"url": "https://bugzilla.suse.com/1187539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3607"
},
{
"cve": "CVE-2021-3608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3608"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the QEMU implementation of VMWare\u0027s paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a \"PVRDMA_REG_DSRHIGH\" write from the guest and may result in a crash of QEMU or cause undefined behavior due to the access of an uninitialized pointer. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3608",
"url": "https://www.suse.com/security/cve/CVE-2021-3608"
},
{
"category": "external",
"summary": "SUSE Bug 1187538 for CVE-2021-3608",
"url": "https://bugzilla.suse.com/1187538"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3608"
},
{
"cve": "CVE-2021-3682",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3682"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3682",
"url": "https://www.suse.com/security/cve/CVE-2021-3682"
},
{
"category": "external",
"summary": "SUSE Bug 1189145 for CVE-2021-3682",
"url": "https://bugzilla.suse.com/1189145"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3682"
}
]
}
OPENSUSE-SU-2025:14796-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-realtek-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-realtek-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14796",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14796-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14796-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JRVYJFDMGL4ZFIAYJKJTQHRR5SPMPZJ2/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14796-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JRVYJFDMGL4ZFIAYJKJTQHRR5SPMPZJ2/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-realtek-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14796-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-realtek-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-realtek-20250206-1.1.aarch64",
"product_id": "kernel-firmware-realtek-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-realtek-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-realtek-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-realtek-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-realtek-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-realtek-20250206-1.1.s390x",
"product_id": "kernel-firmware-realtek-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-realtek-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-realtek-20250206-1.1.x86_64",
"product_id": "kernel-firmware-realtek-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-realtek-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-realtek-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-realtek-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-realtek-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-realtek-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-realtek-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-realtek-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-realtek-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-realtek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14773-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-atheros-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-atheros-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14773",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14773-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-atheros-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14773-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-atheros-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-atheros-20250206-1.1.aarch64",
"product_id": "kernel-firmware-atheros-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-atheros-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-atheros-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-atheros-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-atheros-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-atheros-20250206-1.1.s390x",
"product_id": "kernel-firmware-atheros-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-atheros-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-atheros-20250206-1.1.x86_64",
"product_id": "kernel-firmware-atheros-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-atheros-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-atheros-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-atheros-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-atheros-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-atheros-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-atheros-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-atheros-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-atheros-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-atheros-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14804-1
Vulnerability from csaf_opensuse - Published: 2025-02-13 00:00 - Updated: 2025-02-13 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-all-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-all-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14804",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14804-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14804-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EISBLM6MW64JFKX5G6QNSKXKI34QXKQ4/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14804-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EISBLM6MW64JFKX5G6QNSKXKI34QXKQ4/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-all-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-13T00:00:00Z",
"generator": {
"date": "2025-02-13T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14804-1",
"initial_release_date": "2025-02-13T00:00:00Z",
"revision_history": [
{
"date": "2025-02-13T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-all-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-all-20250206-1.1.aarch64",
"product_id": "kernel-firmware-all-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-all-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-all-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-all-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-all-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-all-20250206-1.1.s390x",
"product_id": "kernel-firmware-all-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-all-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-all-20250206-1.1.x86_64",
"product_id": "kernel-firmware-all-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-all-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-all-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-all-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-all-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-all-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-all-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-all-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-all-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-all-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14798-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-sound-20250210-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-sound-20250210-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14798",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14798-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-sound-20250210-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14798-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-sound-20250210-1.1.aarch64",
"product": {
"name": "kernel-firmware-sound-20250210-1.1.aarch64",
"product_id": "kernel-firmware-sound-20250210-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-sound-20250210-1.1.ppc64le",
"product": {
"name": "kernel-firmware-sound-20250210-1.1.ppc64le",
"product_id": "kernel-firmware-sound-20250210-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-sound-20250210-1.1.s390x",
"product": {
"name": "kernel-firmware-sound-20250210-1.1.s390x",
"product_id": "kernel-firmware-sound-20250210-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-sound-20250210-1.1.x86_64",
"product": {
"name": "kernel-firmware-sound-20250210-1.1.x86_64",
"product_id": "kernel-firmware-sound-20250210-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-sound-20250210-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64"
},
"product_reference": "kernel-firmware-sound-20250210-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-sound-20250210-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le"
},
"product_reference": "kernel-firmware-sound-20250210-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-sound-20250210-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x"
},
"product_reference": "kernel-firmware-sound-20250210-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-sound-20250210-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
},
"product_reference": "kernel-firmware-sound-20250210-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-sound-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2024:11478-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "ucode-intel-20210608-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the ucode-intel-20210608-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11478",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11478-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12130 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11139 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-0543 page",
"url": "https://www.suse.com/security/cve/CVE-2020-0543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-0548 page",
"url": "https://www.suse.com/security/cve/CVE-2020-0548/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24489 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24511 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24512 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24513 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24513/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8695 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8696 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8696/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8698 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8698/"
}
],
"title": "ucode-intel-20210608-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11478-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ucode-intel-20210608-1.2.aarch64",
"product": {
"name": "ucode-intel-20210608-1.2.aarch64",
"product_id": "ucode-intel-20210608-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ucode-intel-20210608-1.2.ppc64le",
"product": {
"name": "ucode-intel-20210608-1.2.ppc64le",
"product_id": "ucode-intel-20210608-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ucode-intel-20210608-1.2.s390x",
"product": {
"name": "ucode-intel-20210608-1.2.s390x",
"product_id": "ucode-intel-20210608-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ucode-intel-20210608-1.2.x86_64",
"product": {
"name": "ucode-intel-20210608-1.2.x86_64",
"product_id": "ucode-intel-20210608-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20210608-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64"
},
"product_reference": "ucode-intel-20210608-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20210608-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le"
},
"product_reference": "ucode-intel-20210608-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20210608-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x"
},
"product_reference": "ucode-intel-20210608-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20210608-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
},
"product_reference": "ucode-intel-20210608-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-12126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12126"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12126",
"url": "https://www.suse.com/security/cve/CVE-2018-12126"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1135524 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135524"
},
{
"category": "external",
"summary": "SUSE Bug 1137916 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1137916"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 1149726 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149726"
},
{
"category": "external",
"summary": "SUSE Bug 1149729 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149729"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12126"
},
{
"cve": "CVE-2018-12130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12130"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12130",
"url": "https://www.suse.com/security/cve/CVE-2018-12130"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1137916 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1137916"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12130"
},
{
"cve": "CVE-2018-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3640"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3640",
"url": "https://www.suse.com/security/cve/CVE-2018-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087083 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1175912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1175912"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3640"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-11139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11139",
"url": "https://www.suse.com/security/cve/CVE-2019-11139"
},
{
"category": "external",
"summary": "SUSE Bug 1141035 for CVE-2019-11139",
"url": "https://bugzilla.suse.com/1141035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-11139"
},
{
"cve": "CVE-2020-0543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-0543"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-0543",
"url": "https://www.suse.com/security/cve/CVE-2020-0543"
},
{
"category": "external",
"summary": "SUSE Bug 1154824 for CVE-2020-0543",
"url": "https://bugzilla.suse.com/1154824"
},
{
"category": "external",
"summary": "SUSE Bug 1172205 for CVE-2020-0543",
"url": "https://bugzilla.suse.com/1172205"
},
{
"category": "external",
"summary": "SUSE Bug 1172206 for CVE-2020-0543",
"url": "https://bugzilla.suse.com/1172206"
},
{
"category": "external",
"summary": "SUSE Bug 1172207 for CVE-2020-0543",
"url": "https://bugzilla.suse.com/1172207"
},
{
"category": "external",
"summary": "SUSE Bug 1172770 for CVE-2020-0543",
"url": "https://bugzilla.suse.com/1172770"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-0543",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2020-0543",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-0543"
},
{
"cve": "CVE-2020-0548",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-0548"
}
],
"notes": [
{
"category": "general",
"text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-0548",
"url": "https://www.suse.com/security/cve/CVE-2020-0548"
},
{
"category": "external",
"summary": "SUSE Bug 1156353 for CVE-2020-0548",
"url": "https://bugzilla.suse.com/1156353"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-0548"
},
{
"cve": "CVE-2020-24489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24489"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24489",
"url": "https://www.suse.com/security/cve/CVE-2020-24489"
},
{
"category": "external",
"summary": "SUSE Bug 1179839 for CVE-2020-24489",
"url": "https://bugzilla.suse.com/1179839"
},
{
"category": "external",
"summary": "SUSE Bug 1192359 for CVE-2020-24489",
"url": "https://bugzilla.suse.com/1192359"
},
{
"category": "external",
"summary": "SUSE Bug 1199300 for CVE-2020-24489",
"url": "https://bugzilla.suse.com/1199300"
},
{
"category": "external",
"summary": "SUSE Bug 1201731 for CVE-2020-24489",
"url": "https://bugzilla.suse.com/1201731"
},
{
"category": "external",
"summary": "SUSE Bug 1225680 for CVE-2020-24489",
"url": "https://bugzilla.suse.com/1225680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-24489"
},
{
"cve": "CVE-2020-24511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24511"
}
],
"notes": [
{
"category": "general",
"text": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24511",
"url": "https://www.suse.com/security/cve/CVE-2020-24511"
},
{
"category": "external",
"summary": "SUSE Bug 1179836 for CVE-2020-24511",
"url": "https://bugzilla.suse.com/1179836"
},
{
"category": "external",
"summary": "SUSE Bug 1192360 for CVE-2020-24511",
"url": "https://bugzilla.suse.com/1192360"
},
{
"category": "external",
"summary": "SUSE Bug 1199300 for CVE-2020-24511",
"url": "https://bugzilla.suse.com/1199300"
},
{
"category": "external",
"summary": "SUSE Bug 1201731 for CVE-2020-24511",
"url": "https://bugzilla.suse.com/1201731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24511"
},
{
"cve": "CVE-2020-24512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24512"
}
],
"notes": [
{
"category": "general",
"text": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24512",
"url": "https://www.suse.com/security/cve/CVE-2020-24512"
},
{
"category": "external",
"summary": "SUSE Bug 1179837 for CVE-2020-24512",
"url": "https://bugzilla.suse.com/1179837"
},
{
"category": "external",
"summary": "SUSE Bug 1192360 for CVE-2020-24512",
"url": "https://bugzilla.suse.com/1192360"
},
{
"category": "external",
"summary": "SUSE Bug 1199300 for CVE-2020-24512",
"url": "https://bugzilla.suse.com/1199300"
},
{
"category": "external",
"summary": "SUSE Bug 1201731 for CVE-2020-24512",
"url": "https://bugzilla.suse.com/1201731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-24512"
},
{
"cve": "CVE-2020-24513",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24513"
}
],
"notes": [
{
"category": "general",
"text": "Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24513",
"url": "https://www.suse.com/security/cve/CVE-2020-24513"
},
{
"category": "external",
"summary": "SUSE Bug 1179833 for CVE-2020-24513",
"url": "https://bugzilla.suse.com/1179833"
},
{
"category": "external",
"summary": "SUSE Bug 1192360 for CVE-2020-24513",
"url": "https://bugzilla.suse.com/1192360"
},
{
"category": "external",
"summary": "SUSE Bug 1199300 for CVE-2020-24513",
"url": "https://bugzilla.suse.com/1199300"
},
{
"category": "external",
"summary": "SUSE Bug 1201731 for CVE-2020-24513",
"url": "https://bugzilla.suse.com/1201731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24513"
},
{
"cve": "CVE-2020-8695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8695"
}
],
"notes": [
{
"category": "general",
"text": "Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8695",
"url": "https://www.suse.com/security/cve/CVE-2020-8695"
},
{
"category": "external",
"summary": "SUSE Bug 1170415 for CVE-2020-8695",
"url": "https://bugzilla.suse.com/1170415"
},
{
"category": "external",
"summary": "SUSE Bug 1170446 for CVE-2020-8695",
"url": "https://bugzilla.suse.com/1170446"
},
{
"category": "external",
"summary": "SUSE Bug 1178591 for CVE-2020-8695",
"url": "https://bugzilla.suse.com/1178591"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8695"
},
{
"cve": "CVE-2020-8696",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8696"
}
],
"notes": [
{
"category": "general",
"text": "Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8696",
"url": "https://www.suse.com/security/cve/CVE-2020-8696"
},
{
"category": "external",
"summary": "SUSE Bug 1173592 for CVE-2020-8696",
"url": "https://bugzilla.suse.com/1173592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-8696"
},
{
"cve": "CVE-2020-8698",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8698"
}
],
"notes": [
{
"category": "general",
"text": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8698",
"url": "https://www.suse.com/security/cve/CVE-2020-8698"
},
{
"category": "external",
"summary": "SUSE Bug 1173594 for CVE-2020-8698",
"url": "https://bugzilla.suse.com/1173594"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x",
"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-8698"
}
]
}
OPENSUSE-SU-2025:14769-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-amdgpu-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-amdgpu-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14769",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14769-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-amdgpu-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14769-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-amdgpu-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-amdgpu-20250206-1.1.aarch64",
"product_id": "kernel-firmware-amdgpu-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-amdgpu-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-amdgpu-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-amdgpu-20250206-1.1.s390x",
"product_id": "kernel-firmware-amdgpu-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-amdgpu-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-amdgpu-20250206-1.1.x86_64",
"product_id": "kernel-firmware-amdgpu-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-amdgpu-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-amdgpu-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-amdgpu-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-amdgpu-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-amdgpu-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-amdgpu-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-amdgpu-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-amdgpu-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14778-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-dpaa2-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-dpaa2-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14778",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14778-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14778-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3XCURBMJRRPRVU3EVKDNACDUEBSYOCK/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14778-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3XCURBMJRRPRVU3EVKDNACDUEBSYOCK/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-dpaa2-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14778-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-dpaa2-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-dpaa2-20250206-1.1.aarch64",
"product_id": "kernel-firmware-dpaa2-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-dpaa2-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-dpaa2-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-dpaa2-20250206-1.1.s390x",
"product_id": "kernel-firmware-dpaa2-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-dpaa2-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-dpaa2-20250206-1.1.x86_64",
"product_id": "kernel-firmware-dpaa2-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-dpaa2-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-dpaa2-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-dpaa2-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-dpaa2-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-dpaa2-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-dpaa2-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-dpaa2-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-dpaa2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14793-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-qcom-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-qcom-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14793",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14793-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-qcom-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14793-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-qcom-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-qcom-20250206-1.1.aarch64",
"product_id": "kernel-firmware-qcom-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-qcom-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-qcom-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-qcom-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-qcom-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-qcom-20250206-1.1.s390x",
"product_id": "kernel-firmware-qcom-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-qcom-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-qcom-20250206-1.1.x86_64",
"product_id": "kernel-firmware-qcom-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-qcom-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-qcom-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-qcom-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-qcom-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-qcom-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-qcom-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-qcom-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-qcom-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-qcom-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14787-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-mwifiex-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-mwifiex-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14787",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14787-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14787-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWMIURVH3RGSXYDDHGU2A5NU4OI3OLPB/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14787-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWMIURVH3RGSXYDDHGU2A5NU4OI3OLPB/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-mwifiex-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14787-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-mwifiex-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-mwifiex-20250206-1.1.aarch64",
"product_id": "kernel-firmware-mwifiex-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-mwifiex-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-mwifiex-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-mwifiex-20250206-1.1.s390x",
"product_id": "kernel-firmware-mwifiex-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-mwifiex-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-mwifiex-20250206-1.1.x86_64",
"product_id": "kernel-firmware-mwifiex-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-mwifiex-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-mwifiex-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-mwifiex-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-mwifiex-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-mwifiex-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-mwifiex-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-mwifiex-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mwifiex-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14784-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-media-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-media-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14784",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14784-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-media-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14784-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-media-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-media-20250206-1.1.aarch64",
"product_id": "kernel-firmware-media-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-media-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-media-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-media-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-media-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-media-20250206-1.1.s390x",
"product_id": "kernel-firmware-media-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-media-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-media-20250206-1.1.x86_64",
"product_id": "kernel-firmware-media-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-media-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-media-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-media-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-media-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-media-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-media-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-media-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-media-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-media-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14779-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-i915-20250210-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-i915-20250210-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14779",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14779-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-i915-20250210-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14779-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-i915-20250210-1.1.aarch64",
"product": {
"name": "kernel-firmware-i915-20250210-1.1.aarch64",
"product_id": "kernel-firmware-i915-20250210-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-i915-20250210-1.1.ppc64le",
"product": {
"name": "kernel-firmware-i915-20250210-1.1.ppc64le",
"product_id": "kernel-firmware-i915-20250210-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-i915-20250210-1.1.s390x",
"product": {
"name": "kernel-firmware-i915-20250210-1.1.s390x",
"product_id": "kernel-firmware-i915-20250210-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-i915-20250210-1.1.x86_64",
"product": {
"name": "kernel-firmware-i915-20250210-1.1.x86_64",
"product_id": "kernel-firmware-i915-20250210-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-i915-20250210-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64"
},
"product_reference": "kernel-firmware-i915-20250210-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-i915-20250210-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le"
},
"product_reference": "kernel-firmware-i915-20250210-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-i915-20250210-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x"
},
"product_reference": "kernel-firmware-i915-20250210-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-i915-20250210-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
},
"product_reference": "kernel-firmware-i915-20250210-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-i915-20250210-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14785-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-mediatek-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-mediatek-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14785",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14785-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-mediatek-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14785-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-mediatek-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-mediatek-20250206-1.1.aarch64",
"product_id": "kernel-firmware-mediatek-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-mediatek-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-mediatek-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-mediatek-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-mediatek-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-mediatek-20250206-1.1.s390x",
"product_id": "kernel-firmware-mediatek-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-mediatek-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-mediatek-20250206-1.1.x86_64",
"product_id": "kernel-firmware-mediatek-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-mediatek-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-mediatek-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-mediatek-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-mediatek-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-mediatek-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-mediatek-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-mediatek-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-mediatek-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-mediatek-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14789-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-nfp-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-nfp-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14789",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14789-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-nfp-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14789-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-nfp-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-nfp-20250206-1.1.aarch64",
"product_id": "kernel-firmware-nfp-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-nfp-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-nfp-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-nfp-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-nfp-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-nfp-20250206-1.1.s390x",
"product_id": "kernel-firmware-nfp-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-nfp-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-nfp-20250206-1.1.x86_64",
"product_id": "kernel-firmware-nfp-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-nfp-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-nfp-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-nfp-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-nfp-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-nfp-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-nfp-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-nfp-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-nfp-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nfp-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14771-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-ath11k-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-ath11k-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14771",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14771-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-ath11k-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14771-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ath11k-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-ath11k-20250206-1.1.aarch64",
"product_id": "kernel-firmware-ath11k-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ath11k-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-ath11k-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-ath11k-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ath11k-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-ath11k-20250206-1.1.s390x",
"product_id": "kernel-firmware-ath11k-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ath11k-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-ath11k-20250206-1.1.x86_64",
"product_id": "kernel-firmware-ath11k-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ath11k-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-ath11k-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ath11k-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-ath11k-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ath11k-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-ath11k-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ath11k-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-ath11k-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath11k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14797-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-serial-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-serial-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14797",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14797-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14797-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLB6EQ4PQFULA6326VPRQRWW66T32SST/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14797-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLB6EQ4PQFULA6326VPRQRWW66T32SST/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-serial-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14797-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-serial-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-serial-20250206-1.1.aarch64",
"product_id": "kernel-firmware-serial-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-serial-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-serial-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-serial-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-serial-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-serial-20250206-1.1.s390x",
"product_id": "kernel-firmware-serial-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-serial-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-serial-20250206-1.1.x86_64",
"product_id": "kernel-firmware-serial-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-serial-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-serial-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-serial-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-serial-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-serial-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-serial-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-serial-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-serial-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-serial-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14775-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-bnx2-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-bnx2-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14775",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14775-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14775-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDYBISXNIKR4JQNKOAZNM4IWBORGXDGT/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14775-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDYBISXNIKR4JQNKOAZNM4IWBORGXDGT/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-bnx2-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14775-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-bnx2-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-bnx2-20250206-1.1.aarch64",
"product_id": "kernel-firmware-bnx2-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-bnx2-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-bnx2-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-bnx2-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-bnx2-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-bnx2-20250206-1.1.s390x",
"product_id": "kernel-firmware-bnx2-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-bnx2-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-bnx2-20250206-1.1.x86_64",
"product_id": "kernel-firmware-bnx2-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-bnx2-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-bnx2-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-bnx2-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-bnx2-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-bnx2-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-bnx2-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-bnx2-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-bnx2-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-bnx2-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14790-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-nvidia-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-nvidia-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14790",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14790-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-nvidia-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14790-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-nvidia-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-nvidia-20250206-1.1.aarch64",
"product_id": "kernel-firmware-nvidia-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-nvidia-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-nvidia-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-nvidia-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-nvidia-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-nvidia-20250206-1.1.s390x",
"product_id": "kernel-firmware-nvidia-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-nvidia-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-nvidia-20250206-1.1.x86_64",
"product_id": "kernel-firmware-nvidia-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-nvidia-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-nvidia-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-nvidia-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-nvidia-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-nvidia-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-nvidia-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-nvidia-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-nvidia-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-nvidia-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14781-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-iwlwifi-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-iwlwifi-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14781",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14781-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-iwlwifi-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14781-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"product_id": "kernel-firmware-iwlwifi-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-iwlwifi-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-iwlwifi-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-iwlwifi-20250206-1.1.s390x",
"product_id": "kernel-firmware-iwlwifi-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-iwlwifi-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-iwlwifi-20250206-1.1.x86_64",
"product_id": "kernel-firmware-iwlwifi-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-iwlwifi-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-iwlwifi-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-iwlwifi-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-iwlwifi-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-iwlwifi-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-iwlwifi-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-iwlwifi-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14800-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-ueagle-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-ueagle-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14800",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14800-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14800-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIORKETHKWBJRRYF55G3J3DL3T7QGOEL/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14800-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIORKETHKWBJRRYF55G3J3DL3T7QGOEL/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-ueagle-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14800-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ueagle-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-ueagle-20250206-1.1.aarch64",
"product_id": "kernel-firmware-ueagle-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ueagle-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-ueagle-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-ueagle-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ueagle-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-ueagle-20250206-1.1.s390x",
"product_id": "kernel-firmware-ueagle-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ueagle-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-ueagle-20250206-1.1.x86_64",
"product_id": "kernel-firmware-ueagle-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ueagle-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-ueagle-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ueagle-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-ueagle-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ueagle-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-ueagle-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ueagle-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-ueagle-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ueagle-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14780-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-intel-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-intel-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14780",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14780-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-intel-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14780-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-intel-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-intel-20250206-1.1.aarch64",
"product_id": "kernel-firmware-intel-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-intel-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-intel-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-intel-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-intel-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-intel-20250206-1.1.s390x",
"product_id": "kernel-firmware-intel-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-intel-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-intel-20250206-1.1.x86_64",
"product_id": "kernel-firmware-intel-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-intel-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-intel-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-intel-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-intel-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-intel-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-intel-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-intel-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-intel-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-intel-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14770-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-ath10k-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-ath10k-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14770",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14770-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14770-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WU6USOH6Z5LBH65E37F7SXQ2ZCYMYO4C/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14770-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WU6USOH6Z5LBH65E37F7SXQ2ZCYMYO4C/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-ath10k-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14770-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ath10k-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-ath10k-20250206-1.1.aarch64",
"product_id": "kernel-firmware-ath10k-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ath10k-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-ath10k-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-ath10k-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ath10k-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-ath10k-20250206-1.1.s390x",
"product_id": "kernel-firmware-ath10k-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-ath10k-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-ath10k-20250206-1.1.x86_64",
"product_id": "kernel-firmware-ath10k-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ath10k-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-ath10k-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ath10k-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-ath10k-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ath10k-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-ath10k-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-ath10k-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-ath10k-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-ath10k-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14777-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-chelsio-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-chelsio-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14777",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14777-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14777-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4CQIJEA5UAOBWUSUVTBHDHKQNBQURQG/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14777-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4CQIJEA5UAOBWUSUVTBHDHKQNBQURQG/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-chelsio-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14777-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-chelsio-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-chelsio-20250206-1.1.aarch64",
"product_id": "kernel-firmware-chelsio-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-chelsio-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-chelsio-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-chelsio-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-chelsio-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-chelsio-20250206-1.1.s390x",
"product_id": "kernel-firmware-chelsio-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-chelsio-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-chelsio-20250206-1.1.x86_64",
"product_id": "kernel-firmware-chelsio-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-chelsio-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-chelsio-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-chelsio-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-chelsio-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-chelsio-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-chelsio-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-chelsio-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-chelsio-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-chelsio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2025:14782-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-liquidio-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-liquidio-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14782",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14782-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-liquidio-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14782-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-liquidio-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-liquidio-20250206-1.1.aarch64",
"product_id": "kernel-firmware-liquidio-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-liquidio-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-liquidio-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-liquidio-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-liquidio-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-liquidio-20250206-1.1.s390x",
"product_id": "kernel-firmware-liquidio-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-liquidio-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-liquidio-20250206-1.1.x86_64",
"product_id": "kernel-firmware-liquidio-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-liquidio-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-liquidio-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-liquidio-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-liquidio-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-liquidio-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-liquidio-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-liquidio-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-liquidio-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-liquidio-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
OPENSUSE-SU-2024:10894-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-20210901-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-20210901-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10894",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10894-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
}
],
"title": "kernel-firmware-20210901-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10894-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-20210901-1.2.aarch64",
"product": {
"name": "kernel-firmware-20210901-1.2.aarch64",
"product_id": "kernel-firmware-20210901-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "ucode-amd-20210901-1.2.aarch64",
"product": {
"name": "ucode-amd-20210901-1.2.aarch64",
"product_id": "ucode-amd-20210901-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-20210901-1.2.ppc64le",
"product": {
"name": "kernel-firmware-20210901-1.2.ppc64le",
"product_id": "kernel-firmware-20210901-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ucode-amd-20210901-1.2.ppc64le",
"product": {
"name": "ucode-amd-20210901-1.2.ppc64le",
"product_id": "ucode-amd-20210901-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-20210901-1.2.s390x",
"product": {
"name": "kernel-firmware-20210901-1.2.s390x",
"product_id": "kernel-firmware-20210901-1.2.s390x"
}
},
{
"category": "product_version",
"name": "ucode-amd-20210901-1.2.s390x",
"product": {
"name": "ucode-amd-20210901-1.2.s390x",
"product_id": "ucode-amd-20210901-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-20210901-1.2.x86_64",
"product": {
"name": "kernel-firmware-20210901-1.2.x86_64",
"product_id": "kernel-firmware-20210901-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "ucode-amd-20210901-1.2.x86_64",
"product": {
"name": "ucode-amd-20210901-1.2.x86_64",
"product_id": "ucode-amd-20210901-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20210901-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-20210901-1.2.aarch64"
},
"product_reference": "kernel-firmware-20210901-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20210901-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-20210901-1.2.ppc64le"
},
"product_reference": "kernel-firmware-20210901-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20210901-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-20210901-1.2.s390x"
},
"product_reference": "kernel-firmware-20210901-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-20210901-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-20210901-1.2.x86_64"
},
"product_reference": "kernel-firmware-20210901-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20210901-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ucode-amd-20210901-1.2.aarch64"
},
"product_reference": "ucode-amd-20210901-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20210901-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ucode-amd-20210901-1.2.ppc64le"
},
"product_reference": "ucode-amd-20210901-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20210901-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ucode-amd-20210901-1.2.s390x"
},
"product_reference": "ucode-amd-20210901-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-amd-20210901-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ucode-amd-20210901-1.2.x86_64"
},
"product_reference": "ucode-amd-20210901-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.aarch64",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.s390x",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.x86_64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.aarch64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.s390x",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.aarch64",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.s390x",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.x86_64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.aarch64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.s390x",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.aarch64",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.s390x",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.x86_64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.aarch64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.s390x",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.aarch64",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.s390x",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.x86_64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.aarch64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.s390x",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.aarch64",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.s390x",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.x86_64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.aarch64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.s390x",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.aarch64",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.s390x",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.x86_64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.aarch64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.s390x",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.aarch64",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.s390x",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.x86_64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.aarch64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.s390x",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.aarch64",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.s390x",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.x86_64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.aarch64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.s390x",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.aarch64",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.s390x",
"openSUSE Tumbleweed:kernel-firmware-20210901-1.2.x86_64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.aarch64",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.ppc64le",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.s390x",
"openSUSE Tumbleweed:ucode-amd-20210901-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
}
]
}
OPENSUSE-SU-2025:14791-1
Vulnerability from csaf_opensuse - Published: 2025-02-12 00:00 - Updated: 2025-02-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-firmware-platform-20250206-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-firmware-platform-20250206-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14791",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14791-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14791-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ILZHMVR4NNCE6NWCEPZ2BVWZXYSWRTS/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14791-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ILZHMVR4NNCE6NWCEPZ2BVWZXYSWRTS/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9836 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26339 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
}
],
"title": "kernel-firmware-platform-20250206-1.1 on GA media",
"tracking": {
"current_release_date": "2025-02-12T00:00:00Z",
"generator": {
"date": "2025-02-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14791-1",
"initial_release_date": "2025-02-12T00:00:00Z",
"revision_history": [
{
"date": "2025-02-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-platform-20250206-1.1.aarch64",
"product": {
"name": "kernel-firmware-platform-20250206-1.1.aarch64",
"product_id": "kernel-firmware-platform-20250206-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-platform-20250206-1.1.ppc64le",
"product": {
"name": "kernel-firmware-platform-20250206-1.1.ppc64le",
"product_id": "kernel-firmware-platform-20250206-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-platform-20250206-1.1.s390x",
"product": {
"name": "kernel-firmware-platform-20250206-1.1.s390x",
"product_id": "kernel-firmware-platform-20250206-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-platform-20250206-1.1.x86_64",
"product": {
"name": "kernel-firmware-platform-20250206-1.1.x86_64",
"product_id": "kernel-firmware-platform-20250206-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-platform-20250206-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64"
},
"product_reference": "kernel-firmware-platform-20250206-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-platform-20250206-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le"
},
"product_reference": "kernel-firmware-platform-20250206-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-platform-20250206-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x"
},
"product_reference": "kernel-firmware-platform-20250206-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-platform-20250206-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
},
"product_reference": "kernel-firmware-platform-20250206-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2019-9836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9836"
}
],
"notes": [
{
"category": "general",
"text": "Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9836",
"url": "https://www.suse.com/security/cve/CVE-2019-9836"
},
{
"category": "external",
"summary": "SUSE Bug 1139383 for CVE-2019-9836",
"url": "https://bugzilla.suse.com/1139383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9836"
},
{
"cve": "CVE-2021-26339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26339"
}
],
"notes": [
{
"category": "general",
"text": "A bug in AMD CPU\u0027s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26339",
"url": "https://www.suse.com/security/cve/CVE-2021-26339"
},
{
"category": "external",
"summary": "SUSE Bug 1199459 for CVE-2021-26339",
"url": "https://bugzilla.suse.com/1199459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"notes": [
{
"category": "general",
"text": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26348",
"url": "https://www.suse.com/security/cve/CVE-2021-26348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26364",
"url": "https://www.suse.com/security/cve/CVE-2021-26364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26375",
"url": "https://www.suse.com/security/cve/CVE-2021-26375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-33139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33139"
}
],
"notes": [
{
"category": "general",
"text": "Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33139",
"url": "https://www.suse.com/security/cve/CVE-2021-33139"
},
{
"category": "external",
"summary": "SUSE Bug 1195786 for CVE-2021-33139",
"url": "https://bugzilla.suse.com/1195786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33139"
},
{
"cve": "CVE-2021-46744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46744",
"url": "https://www.suse.com/security/cve/CVE-2021-46744"
},
{
"category": "external",
"summary": "SUSE Bug 1199470 for CVE-2021-46744",
"url": "https://bugzilla.suse.com/1199470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46744"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.aarch64",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.s390x",
"openSUSE Tumbleweed:kernel-firmware-platform-20250206-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
}
]
}
CNVD-2018-00302
Vulnerability from cnvd - Published: 2018-01-04目前部分厂商发布了补丁修复信息: Amazon AWS:https://aws.amazon.com/security/security-bulletins/AWS-2018-013/ Apple:https://source.android.com/security/bulletin/2018-01-01 Android:https://source.android.com/security/bulletin/2018-01-01
| Name | ['Microsoft Windows 7 SP1', 'Microsoft Internet Explorer 11', 'Microsoft Windows 8.1', 'google V8', 'Microsoft Windows 10', 'Microsoft Edge', 'Intel Xeon CPU E5-1650 v3', 'ARM Cortex A57', 'AMD PRO A8-9600 R7', 'AMD 10 COMPUTE CORES 4C+6G', 'AMD FX(tm)-8320 Eight-Core Processor'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "102376"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-5715"
}
},
"description": "CPU hardware\u662f\u4e00\u5957\u8fd0\u884c\u5728CPU\uff08\u4e2d\u592e\u5904\u7406\u5668\uff09\u4e2d\u7528\u4e8e\u7ba1\u7406\u548c\u63a7\u5236CPU\u7684\u56fa\u4ef6\u3002\r\n\r\nCPU\u5904\u7406\u5668\u5185\u6838\u5b58\u5728Meltdown\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u201c\u7194\u5316\u201d\u4e86\u7531\u786c\u4ef6\u6765\u5b9e\u73b0\u7684\u5b89\u5168\u8fb9\u754c\uff0c\u5141\u8bb8\u4f4e\u6743\u9650\u7528\u6237\u7ea7\u522b\u7684\u5e94\u7528\u7a0b\u5e8f\u201c\u8d8a\u754c\u201d\u8bbf\u95ee\u7cfb\u7edf\u7ea7\u7684\u5185\u5b58\uff0c\u4ece\u800c\u9020\u6210\u6570\u636e\u6cc4\u9732\u3002",
"discovererName": "Jann Horn (Google Project Zero) and Paul Kocher in collaboration with, in alphabetical order, Daniel Genkin (University of Pennsylvania and University of Maryland), Mike Hamburg (Rambus), Moritz Lipp (Graz University of Technology), and Yuval Yarom (Univer",
"formalWay": "\u76ee\u524d\u90e8\u5206\u5382\u5546\u53d1\u5e03\u4e86\u8865\u4e01\u4fee\u590d\u4fe1\u606f\uff1a\r\nAmazon AWS\uff1ahttps://aws.amazon.com/security/security-bulletins/AWS-2018-013/\r\nApple\uff1ahttps://source.android.com/security/bulletin/2018-01-01\r\nAndroid\uff1ahttps\uff1a//source.android.com/security/bulletin/2018-01-01",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-00302",
"openTime": "2018-01-04",
"products": {
"product": [
"Microsoft Windows 7 SP1",
"Microsoft Internet Explorer 11",
"Microsoft Windows 8.1",
"google V8",
"Microsoft Windows 10",
"Microsoft Edge",
"Intel Xeon CPU E5-1650 v3",
"ARM Cortex A57",
"AMD PRO A8-9600 R7",
"AMD 10 COMPUTE CORES 4C+6G",
"AMD FX(tm)-8320 Eight-Core Processor"
]
},
"referenceLink": "https://www.bleepingcomputer.com/news/security/list-of-meltdown-and-spectre-vulnerability-advisories-patches-and-updates\r\nhttps://www.securityfocus.com/bid/102376",
"serverity": "\u4e2d",
"submitTime": "2018-01-04",
"title": "CPU\u5904\u7406\u5668\u5185\u6838\u5b58\u5728Meltdown\u6f0f\u6d1e"
}
WID-SEC-W-2023-0103
Vulnerability from csaf_certbund - Published: 2018-01-03 23:00 - Updated: 2025-02-16 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in den meisten der aktuellen Prozessoren ausnutzen, um Sicherheitsmechanismen zu umgehen und physikalischen Speicher auszulesen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Appliance\n- BIOS/Firmware\n- CISCO Appliance\n- F5 Networks\n- Juniper Appliance\n- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0103 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2023-0103.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0103 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0103"
},
{
"category": "external",
"summary": "Citrix Security Updates CTX231399 vom 2018-01-03",
"url": "https://support.citrix.com/article/CTX231399"
},
{
"category": "external",
"summary": "Windows Security Updates 4072698 vom 2018-01-03",
"url": "https://support.microsoft.com/en-za/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution-s"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-254 vom 2018-01-03",
"url": "https://xenbits.xen.org/xsa/advisory-254.html"
},
{
"category": "external",
"summary": "Lenovo Security Advisory: LEN-18282 vom 2018-01-03",
"url": "https://support.lenovo.com/de/de/solutions/len-18282"
},
{
"category": "external",
"summary": "Redhat Security Advisory RHSA-2018:0017 vom 2018-01-03",
"url": "https://access.redhat.com/errata/RHSA-2018:0017"
},
{
"category": "external",
"summary": "Redhat Security Advisory RHSA-2018:0016 vom 2018-01-03",
"url": "https://access.redhat.com/errata/RHSA-2018:0016"
},
{
"category": "external",
"summary": "Redhat Security Advisory RHSA-2018:0015 vom 2018-01-03",
"url": "https://access.redhat.com/errata/RHSA-2018:0015"
},
{
"category": "external",
"summary": "Redhat Security Advisory RHSA-2018:0014 vom 2018-01-03",
"url": "https://access.redhat.com/errata/RHSA-2018:0014"
},
{
"category": "external",
"summary": "Redhat Security Advisory RHSA-2018:0013 vom 2018-01-03",
"url": "https://access.redhat.com/errata/RHSA-2018:0013"
},
{
"category": "external",
"summary": "Redhat Security Advisory RHSA-2018:0012 vom 2018-01-03",
"url": "https://access.redhat.com/errata/RHSA-2018:0012"
},
{
"category": "external",
"summary": "Redhat Security Advisory RHSA-2018:0011 vom 2018-01-03",
"url": "https://access.redhat.com/errata/RHSA-2018:0011"
},
{
"category": "external",
"summary": "Redhat Security Advisory RHSA-2018:0010 vom 2018-01-03",
"url": "https://access.redhat.com/errata/RHSA-2018:0010"
},
{
"category": "external",
"summary": "Redhat Security Advisory RHSA-2018:0009 vom 2018-01-03",
"url": "https://access.redhat.com/errata/RHSA-2018:0009"
},
{
"category": "external",
"summary": "Redhat Security Advisory RHSA-2018:0008 vom 2018-01-03",
"url": "https://access.redhat.com/errata/RHSA-2018:0008"
},
{
"category": "external",
"summary": "Redhat Security Advisory RHSA-2018:0007 vom 2018-01-03",
"url": "https://access.redhat.com/errata/RHSA-2018:0007"
},
{
"category": "external",
"summary": "SUSE Security Update: SUSE-SU-2018:0009-1 vom 2018-01-03",
"url": "https://www.suse.com/de-de/support/update/announcement/2018/suse-su-20180009-1/"
},
{
"category": "external",
"summary": "SUSE Security Update: SUSE-SU-2018:0008-1 vom 2018-01-03",
"url": "https://www.suse.com/de-de/support/update/announcement/2018/suse-su-20180008-1/"
},
{
"category": "external",
"summary": "SUSE Security Update: SUSE-SU-2018:0007-1 vom 2018-01-03",
"url": "https://www.suse.com/de-de/support/update/announcement/2018/suse-su-20180007-1/"
},
{
"category": "external",
"summary": "SUSE Security Update: SUSE-SU-2018:0006-1 vom 2018-01-03",
"url": "https://www.suse.com/de-de/support/update/announcement/2018/suse-su-20180006-1/"
},
{
"category": "external",
"summary": "VMware Security Advisory VMSA-2018-0002",
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0002.html"
},
{
"category": "external",
"summary": "Microsoft Security Advisory ADV180002 vom 2018-01-03",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"category": "external",
"summary": "Meltdown and Spectre Informationsseite der Schwachstelle Stand 2018-01-03",
"url": "https://meltdownattack.com/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0018 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0018"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00088 vom 2018-01-04",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr"
},
{
"category": "external",
"summary": "Citrix Security Advisory CTX231390 vom 2018-01-04",
"url": "https://support.citrix.com/article/CTX231390"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0020-1 vom 2018-01-04",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180020-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0019-1 vom 2018-01-04",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180019-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-0024 vom 2018-01-05",
"url": "http://linux.oracle.com/errata/ELSA-2018-0024.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-0030 vom 2018-01-05",
"url": "http://linux.oracle.com/errata/ELSA-2018-0030.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-0023 vom 2018-01-05",
"url": "http://linux.oracle.com/errata/ELSA-2018-0023.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0040 vom 2018-01-05",
"url": "https://access.redhat.com/errata/RHSA-2018:0040"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0038 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0038"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0037 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0037"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0035 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0035"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0034 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0034"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0032 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0032"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0031 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0031"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0029 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0029"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0039 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0039"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0036 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0036"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0030 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0030"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-0013 vom 2018-01-04",
"url": "http://linux.oracle.com/errata/ELSA-2018-0013.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-0007 vom 2018-01-04",
"url": "http://linux.oracle.com/errata/ELSA-2018-0007.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-0012 vom 2018-01-04",
"url": "http://linux.oracle.com/errata/ELSA-2018-0012.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-0008 vom 2018-01-04",
"url": "http://linux.oracle.com/errata/ELSA-2018-0008.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0010-1 vom 2018-01-04",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180010-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0012-1 vom 2018-01-04",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180012-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0011-1 vom 2018-01-04",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180011-1.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2018:0012 vom 2018-01-04",
"url": "https://lwn.net/Alerts/742921"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2018:0007 vom 2018-01-04",
"url": "https://lwn.net/Alerts/742919"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2018:0014 vom 2018-01-04",
"url": "https://lwn.net/Alerts/742920"
},
{
"category": "external",
"summary": "Meldung 43427 auf der Exploit-DB vom 2018-01-03",
"url": "https://www.exploit-db.com/exploits/43427/"
},
{
"category": "external",
"summary": "Mozilla Foundation Security Advisory mfsa2018-01 vom 2018-01-04",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/"
},
{
"category": "external",
"summary": "Google Chrome-Hilfe Stand 2018-01-05",
"url": "https://support.google.com/chrome/answer/7623121"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4078-1 vom 2018-01-04",
"url": "https://lists.debian.org/debian-security-announce/2018/msg00000.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0028 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0028"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0027 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0027"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0026 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0026"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0025 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0025"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0024 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0024"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0023 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0023"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0022 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0022"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0021 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0021"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0020 vom 2018-01-04",
"url": "https://access.redhat.com/errata/RHSA-2018:0020"
},
{
"category": "external",
"summary": "CentOS-announce CESA-2018:0013 vom 2018-01-04",
"url": "https://lists.centos.org/pipermail/centos-announce/2018-January/022700.html"
},
{
"category": "external",
"summary": "CentOS-announce CESA-RHSA-2018:0024 vom 2018-01-04",
"url": "https://lists.centos.org/pipermail/centos-announce/2018-January/022702.html"
},
{
"category": "external",
"summary": "CentOS-announce CESA-2018:0030 vom 2018-01-04",
"url": "https://lists.centos.org/pipermail/centos-announce/2018-January/022703.html"
},
{
"category": "external",
"summary": "CentOS-announce CESA-2018:0029 vom 2018-01-04",
"url": "https://lists.centos.org/pipermail/centos-announce/2018-January/022704.html"
},
{
"category": "external",
"summary": "CentOS-announce CESA-2018:0023 vom 2018-01-04",
"url": "https://lists.centos.org/pipermail/centos-announce/2018-January/022705.html"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2018-0004 vom 2018-01-05",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000812.html"
},
{
"category": "external",
"summary": "NetApp Advisory NTAP-20180104-0001 vom 2018-01-07",
"url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
},
{
"category": "external",
"summary": "APPLE Security Advisory HT208397 vom 2018-01-08",
"url": "https://support.apple.com/kb/HT208397"
},
{
"category": "external",
"summary": "APPLE Security Advisory HT208403 vom 2018-01-08",
"url": "https://support.apple.com/kb/HT208403"
},
{
"category": "external",
"summary": "APPLE Security Advisory HT208401 vom 2018-01-08",
"url": "https://support.apple.com/kb/HT208401"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0040-1 vom 2018-01-09",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180040-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0041-1 vom 2018-01-09",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180041-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0039-1 vom 2018-01-09",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180039-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0036-1 vom 2018-01-09",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180036-1.html"
},
{
"category": "external",
"summary": "CISCO Security Advisory CISCO-SA-20180104-CPUSIDECHANNE vom 2018-01-08",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"category": "external",
"summary": "F5 Article K91229003 vom 2018-01-06",
"url": "https://support.f5.com/csp/article/K91229003"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4006 vom 2018-01-09",
"url": "http://linux.oracle.com/errata/ELSA-2018-4006.html"
},
{
"category": "external",
"summary": "VMware Security Advisory VMSA-2018-0004 vom 2018-01-09",
"url": "http://www.vmware.com/security/advisories/VMSA-2018-0004.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3521-1 vom 2018-01-09",
"url": "http://www.ubuntu.com/usn/usn-3521-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0056-1 vom 2018-01-10",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180056-1.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4082 vom 2018-01-10",
"url": "https://www.debian.org/security/2018/dsa-4082"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0051-1 vom 2018-01-09",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180051-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3524-2 vom 2018-01-10",
"url": "http://www.ubuntu.com/usn/usn-3524-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3523-1 vom 2018-01-10",
"url": "http://www.ubuntu.com/usn/usn-3523-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3522-1 vom 2018-01-10",
"url": "http://www.ubuntu.com/usn/usn-3522-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3522-2 vom 2018-01-10",
"url": "http://www.ubuntu.com/usn/usn-3522-2/"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2018-0005 vom 2018-01-09",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000817.html"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2018-0006 vom 2018-01-09",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000816.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3522-4 vom 2018-01-10",
"url": "http://www.ubuntu.com/usn/usn-3522-4/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3523-2 vom 2018-01-10",
"url": "http://www.ubuntu.com/usn/usn-3523-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3525-1 vom 2018-01-10",
"url": "http://www.ubuntu.com/usn/usn-3525-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3522-3 vom 2018-01-10",
"url": "http://www.ubuntu.com/usn/usn-3522-3/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3531-1 vom 2018-01-11",
"url": "http://www.ubuntu.com/usn/usn-3531-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3530-1 vom 2018-01-11",
"url": "http://www.ubuntu.com/usn/usn-3530-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0068-1 vom 2018-01-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180068-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0067-1 vom 2018-01-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180067-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0069-1 vom 2018-01-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180069-1.html"
},
{
"category": "external",
"summary": "Update des Lenovo Security Advisory: LEN-18282 vom 2018-01-11",
"url": "https://support.lenovo.com/de/de/solutions/len-18282"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2018-0007 vom 2018-01-11",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000818.html"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2018-0008 vom 2018-01-11",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000819.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4011 vom 2018-01-13",
"url": "http://linux.oracle.com/errata/ELSA-2018-4011.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0091 vom 2018-01-16",
"url": "https://access.redhat.com/errata/RHSA-2018:0091"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0090 vom 2018-01-16",
"url": "https://access.redhat.com/errata/RHSA-2018:0090"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0089 vom 2018-01-16",
"url": "https://access.redhat.com/errata/RHSA-2018:0089"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0115-1 vom 2018-01-17",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180115-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0114-1 vom 2018-01-17",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180114-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0113-1 vom 2018-01-17",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180113-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0092 vom 2018-01-17",
"url": "https://access.redhat.com/errata/RHSA-2018:0092"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0094 vom 2018-01-17",
"url": "https://access.redhat.com/errata/RHSA-2018:0094"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0093 vom 2018-01-17",
"url": "https://access.redhat.com/errata/RHSA-2018:0093"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-0093 vom 2018-01-18",
"url": "http://linux.oracle.com/errata/ELSA-2018-0093.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0131-1 vom 2018-01-19",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180131-1/"
},
{
"category": "external",
"summary": "Cisco Seurity Advisory: cisco-sa-20180104-cpusidechannel",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN Document ID: hpesbhf03805en_us",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4012 vom 2018-01-19",
"url": "http://linux.oracle.com/errata/ELSA-2018-4012.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4019 vom 2018-01-21",
"url": "http://linux.oracle.com/errata/ELSA-2018-4019.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4018 vom 2018-01-21",
"url": "http://linux.oracle.com/errata/ELSA-2018-4018.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0112 vom 2018-01-22",
"url": "https://access.redhat.com/errata/RHSA-2018:0112"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0111 vom 2018-01-22",
"url": "https://access.redhat.com/errata/RHSA-2018:0111"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0110 vom 2018-01-22",
"url": "https://access.redhat.com/errata/RHSA-2018:0110"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0109 vom 2018-01-22",
"url": "https://access.redhat.com/errata/RHSA-2018:0109"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0107 vom 2018-01-22",
"url": "https://access.redhat.com/errata/RHSA-2018:0107"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0106 vom 2018-01-22",
"url": "https://access.redhat.com/errata/RHSA-2018:0106"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0105 vom 2018-01-22",
"url": "https://access.redhat.com/errata/RHSA-2018:0105"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0104 vom 2018-01-22",
"url": "https://access.redhat.com/errata/RHSA-2018:0104"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0108 vom 2018-01-22",
"url": "https://access.redhat.com/errata/RHSA-2018:0108"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0103 vom 2018-01-22",
"url": "https://access.redhat.com/errata/RHSA-2018:0103"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0171-1 vom 2018-01-22",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180171-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3541-1 vom 2018-01-23",
"url": "http://www.ubuntu.com/usn/usn-3541-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3531-2 vom 2018-01-22",
"url": "http://www.ubuntu.com/usn/usn-3531-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3542-2 vom 2018-01-23",
"url": "http://www.ubuntu.com/usn/usn-3542-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3541-2 vom 2018-01-23",
"url": "http://www.ubuntu.com/usn/usn-3541-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3542-1 vom 2018-01-23",
"url": "http://www.ubuntu.com/usn/usn-3542-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3540-2 vom 2018-01-23",
"url": "http://www.ubuntu.com/usn/usn-3540-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3540-1 vom 2018-01-23",
"url": "http://www.ubuntu.com/usn/usn-3540-1/"
},
{
"category": "external",
"summary": "HP Bulletin Document ID: a00039267en_us",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00039267en_us"
},
{
"category": "external",
"summary": "VMware Knowledge Base article 52245",
"url": "https://kb.vmware.com/s/article/52345"
},
{
"category": "external",
"summary": "Microsoft Security Advisory ADV180002",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"category": "external",
"summary": "Eintrag im Intel Blog",
"url": "https://newsroom.intel.com/news/root-cause-of-reboot-issue-identified-updated-guidance-for-customers-and-partners/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0180-1 vom 2018-01-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180180-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0179-1 vom 2018-01-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180179-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4020 vom 2018-01-24",
"url": "http://linux.oracle.com/errata/ELSA-2018-4020.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0191-1 vom 2018-01-24",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180191-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0182 vom 2018-01-25",
"url": "https://access.redhat.com/errata/RHSA-2018:0182"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0151 vom 2018-01-25",
"url": "https://access.redhat.com/errata/RHSA-2018:0151"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0213-1 vom 2018-01-25",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180213-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-0151 vom 2018-01-26",
"url": "http://linux.oracle.com/errata/ELSA-2018-0151.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-0169 vom 2018-01-26",
"url": "http://linux.oracle.com/errata/ELSA-2018-0169.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4021 vom 2018-01-28",
"url": "http://linux.oracle.com/errata/ELSA-2018-4021.html"
},
{
"category": "external",
"summary": "Informationen von Microsoft vom 2018-01-27",
"url": "https://support.microsoft.com/en-us/help/4078130/update-to-disable-mitigation-against-spectre-variant-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3549-1 vom 2018-01-30",
"url": "http://www.ubuntu.com/usn/usn-3549-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0285-1 vom 2018-01-30",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180285-1.html"
},
{
"category": "external",
"summary": "Update des Intel Security Advisory INTEL-SA-00088 vom 2018-01-27",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA10842 vom 2018-02-02",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10842\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3561-1 vom 2018-02-07",
"url": "http://www.ubuntu.com/usn/usn-3561-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3560-1 vom 2018-02-07",
"url": "http://www.ubuntu.com/usn/usn-3560-1/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4025 vom 2018-02-07",
"url": "http://linux.oracle.com/errata/ELSA-2018-4025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0383-1 vom 2018-02-08",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180383-1.html"
},
{
"category": "external",
"summary": "Update des Intel Security Advisory INTEL-SA-00088 vom 2018-02-07",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2018-0017 vom 2018-02-08",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-February/000828.html"
},
{
"category": "external",
"summary": "Meldung von Intel vom 2018-02-08",
"url": "https://newsroom.intel.com/wp-content/uploads/sites/11/2018/02/microcode-update-guidance.pdf"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0292 vom 2018-02-09",
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0416-1 vom 2018-02-10",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180416-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0292 vom 2018-02-12",
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0438-1 vom 2018-02-14",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180438-1.html"
},
{
"category": "external",
"summary": "Update des Security Advisory ADV180002 vom 2018-02-13",
"url": "https://portal.msrc.microsoft.com/de-de/security-guidance/advisory/ADV180002"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0472-1 vom 2018-02-19",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180472-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0482-1 vom 2018-02-20",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180482-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3580-1 vom 2018-02-22",
"url": "http://www.ubuntu.com/usn/usn-3580-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3582-1 vom 2018-02-22",
"url": "http://www.ubuntu.com/usn/usn-3582-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3581-1 vom 2018-02-22",
"url": "http://www.ubuntu.com/usn/usn-3581-2/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0525-1 vom 2018-02-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180525-1.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4120 vom 2018-02-23",
"url": "https://www.debian.org/security/2018/dsa-4120"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-0292 vom 2018-02-23",
"url": "http://linux.oracle.com/errata/ELSA-2018-0292.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0552-1 vom 2018-02-27",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180552-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0555-1 vom 2018-02-28",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180555-1.html"
},
{
"category": "external",
"summary": "Microsoft Advisory ADV180002",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0601-1 vom 2018-03-05",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180601-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0609-1 vom 2018-03-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180609-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0464 vom 2018-03-07",
"url": "https://access.redhat.com/errata/RHSA-2018:0464"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0552-2 vom 2018-03-08",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180552-2.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0638-1 vom 2018-03-09",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180638-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0660-1 vom 2018-03-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180660-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0496 vom 2018-03-13",
"url": "https://access.redhat.com/errata/RHSA-2018:0496"
},
{
"category": "external",
"summary": "FreeBSD Security Advisory FREEBSD-SA-18:03.SPECULATIV vom 2018-03-14",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0512 vom 2018-03-14",
"url": "https://access.redhat.com/errata/RHSA-2018:0512"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0502 vom 2018-03-14",
"url": "https://access.redhat.com/errata/RHSA-2018:0502"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0678-1 vom 2018-03-15",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180678-1.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2018:0512 vom 2018-03-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2018-0512-Important-CentOS-6-kernel-Security-Update-tp4645009.html"
},
{
"category": "external",
"summary": "libvirt Security Notice LSN-2018-0001 vom 2018-03-15",
"url": "http://security.libvirt.org/2018/0001.html"
},
{
"category": "external",
"summary": "Microsoft KB Artikel KB409166",
"url": "https://support.microsoft.com/en-us/help/4091664/kb4091664-intel-microcode-updates"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0705-1 vom 2018-03-17",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180705-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0708-1 vom 2018-03-17",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180708-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0757-1 vom 2018-03-22",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180757-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0831-1 vom 2018-03-28",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180831-1/"
},
{
"category": "external",
"summary": "EMC Security Advisory DSA-2018-062 vom 2018-03-26",
"url": "https://support.emc.com/kb/519589"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0841-1 vom 2018-03-29",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180841-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0838-1 vom 2018-03-29",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180838-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0861-1 vom 2018-04-04",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180861-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3620-2 vom 2018-04-05",
"url": "https://usn.ubuntu.com/3620-2/"
},
{
"category": "external",
"summary": "GENTOO Security Advisory GLSA201804-08 vom 2018-04-09",
"url": "https://security.gentoo.org/glsa/201804-08"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0909-1 vom 2018-04-11",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180909-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0920-1 vom 2018-04-11",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180920-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1129 vom 2018-04-17",
"url": "https://access.redhat.com/errata/RHSA-2018:1129"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1196 vom 2018-04-24",
"url": "https://access.redhat.com/errata/RHSA-2018:1196"
},
{
"category": "external",
"summary": "Microsoft Security Advisory ADV180002 Update vom 24.04.2018",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"category": "external",
"summary": "RedHat Security Advisory",
"url": "https://access.redhat.com/errata/RHSA-2018:1252"
},
{
"category": "external",
"summary": "Microsoft Knowledgebase Artikel KB4090007",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4089 vom 2018-05-02",
"url": "http://linux.oracle.com/errata/ELSA-2018-4089.html"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html#AppendixSUNS"
},
{
"category": "external",
"summary": "VMware Security Advisories",
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
},
{
"category": "external",
"summary": "Citrix Security Advisory CTX234679 vom 2018-05-09",
"url": "https://support.citrix.com/article/CTX234679"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1346 vom 2018-05-09",
"url": "https://access.redhat.com/errata/RHSA-2018:1346"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1349 vom 2018-05-09",
"url": "https://access.redhat.com/errata/RHSA-2018:1349"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1350 vom 2018-05-09",
"url": "https://access.redhat.com/errata/RHSA-2018:1350"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1351 vom 2018-05-09",
"url": "https://access.redhat.com/errata/RHSA-2018:1351"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1318 vom 2018-05-09",
"url": "https://access.redhat.com/errata/RHSA-2018:1318"
},
{
"category": "external",
"summary": "CISCO Security Advisory CISCO-SA-20180104-CPUSIDECHANNEL vom 2018-05-15",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel?vs_f=Cisco%20Security%20Advisory\u0026vs_cat=Security%20Intelligence\u0026vs_type=RSS\u0026vs_p=CPU%20Side-Channel%20Information%20Disclosure%20Vulnerabilities\u0026vs_k=1"
},
{
"category": "external",
"summary": "F5 Security Advisory K91229003",
"url": "https://support.f5.com/csp/article/K91229003"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1967 vom 2018-06-27",
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
},
{
"category": "external",
"summary": "Microsoft Security Advisory ADV180002 vom 2018-08-01",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180002"
},
{
"category": "external",
"summary": "XEN Security Advisory XSA-289 vom 2019-01-21",
"url": "http://seclists.org/oss-sec/2019/q1/76"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:0765-1 vom 2019-03-27",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190765-1.html"
},
{
"category": "external",
"summary": "Cumulus Networks Securitty Announcement",
"url": "https://support.cumulusnetworks.com/hc/en-us/articles/360020503354-Spectre-and-Meltdown-Vulnerability-Fixes-"
},
{
"category": "external",
"summary": "Cumulus Networks Securitty Announcement",
"url": "https://support.cumulusnetworks.com/hc/en-us/articles/115015951667-Meltdown-and-Spectre-Modern-CPU-Vulnerabilities"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1046 vom 2019-05-08",
"url": "https://access.redhat.com/errata/RHSA-2019:1046"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1550-1 vom 2019-06-19",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191550-1.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4469 vom 2019-06-23",
"url": "https://www.debian.org/security/2019/dsa-4469"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-4710 vom 2019-07-11",
"url": "http://linux.oracle.com/errata/ELSA-2019-4710.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2019-0035 vom 2019-07-11",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-July/000953.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-4702 vom 2019-08-04",
"url": "http://linux.oracle.com/errata/ELSA-2019-4702.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-4732 vom 2019-08-04",
"url": "http://linux.oracle.com/errata/ELSA-2019-4732.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2450-1 vom 2019-09-24",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192450-1.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA 2148 vom 2020-04-01",
"url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202003/msg00025.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0026 vom 2020-06-22",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000986.html"
},
{
"category": "external",
"summary": "Huawei Security Advisory HUAWEI-SA-20180106-01-CPU vom 2020-08-12",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180106-01-cpu-en"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2323 vom 2020-08-12",
"url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202008/msg00019.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4985-1 vom 2021-06-09",
"url": "https://ubuntu.com/security/notices/USN-4985-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2743 vom 2021-08-16",
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2861-1 vom 2021-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2862-1 vom 2021-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009367.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3929-1 vom 2021-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009844.html"
},
{
"category": "external",
"summary": "Lenovo Security Advisory",
"url": "https://support.lenovo.com/de/de/product_security/ps500479-amd-and-intel-processor-advisory"
},
{
"category": "external",
"summary": "AMD Security Bulletin",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1975 vom 2022-05-10",
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1988 vom 2022-05-10",
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0187 vom 2023-01-17",
"url": "https://access.redhat.com/errata/RHSA-2023:0187"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0634-1 vom 2023-03-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:1801-1 vom 2023-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014437.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:1802-1 vom 2023-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014436.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:1800-1 vom 2023-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014435.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:1803-1 vom 2023-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014434.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:1848-1 vom 2023-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014466.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:1892-1 vom 2023-04-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014489.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:1897-1 vom 2023-04-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014485.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2232-1 vom 2023-05-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014918.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2506-1 vom 2023-06-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015199.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2805-1 vom 2023-07-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14778-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3XCURBMJRRPRVU3EVKDNACDUEBSYOCK/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14791-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ILZHMVR4NNCE6NWCEPZ2BVWZXYSWRTS/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14787-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/FWMIURVH3RGSXYDDHGU2A5NU4OI3OLPB/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14775-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IDYBISXNIKR4JQNKOAZNM4IWBORGXDGT/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14797-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RLB6EQ4PQFULA6326VPRQRWW66T32SST/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14770-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WU6USOH6Z5LBH65E37F7SXQ2ZCYMYO4C/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14777-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/K4CQIJEA5UAOBWUSUVTBHDHKQNBQURQG/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14800-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XIORKETHKWBJRRYF55G3J3DL3T7QGOEL/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14796-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JRVYJFDMGL4ZFIAYJKJTQHRR5SPMPZJ2/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14776-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VY6LKWXFA5DZKFFJWA52HJLZ3GJXUDB/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14804-1 vom 2025-02-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/EISBLM6MW64JFKX5G6QNSKXKI34QXKQ4/"
}
],
"source_lang": "en-US",
"title": "Meltdown und Spectre: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-02-16T23:00:00.000+00:00",
"generator": {
"date": "2025-02-17T09:16:47.894+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2023-0103",
"initial_release_date": "2018-01-03T23:00:00.000+00:00",
"revision_history": [
{
"date": "2018-01-03T23:00:00.000+00:00",
"number": "1",
"summary": "Initial Release"
},
{
"date": "2018-01-03T23:00:00.000+00:00",
"number": "2",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-03T23:00:00.000+00:00",
"number": "3",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-03T23:00:00.000+00:00",
"number": "4",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-03T23:00:00.000+00:00",
"number": "5",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-04T23:00:00.000+00:00",
"number": "6",
"summary": "New remediations available"
},
{
"date": "2018-01-04T23:00:00.000+00:00",
"number": "7",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-04T23:00:00.000+00:00",
"number": "8",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-04T23:00:00.000+00:00",
"number": "9",
"summary": "New remediations available"
},
{
"date": "2018-01-04T23:00:00.000+00:00",
"number": "10",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-04T23:00:00.000+00:00",
"number": "11",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-07T23:00:00.000+00:00",
"number": "12",
"summary": "New remediations available"
},
{
"date": "2018-01-07T23:00:00.000+00:00",
"number": "13",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-07T23:00:00.000+00:00",
"number": "14",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-07T23:00:00.000+00:00",
"number": "15",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-07T23:00:00.000+00:00",
"number": "16",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-07T23:00:00.000+00:00",
"number": "17",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-07T23:00:00.000+00:00",
"number": "18",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-07T23:00:00.000+00:00",
"number": "19",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-07T23:00:00.000+00:00",
"number": "20",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-07T23:00:00.000+00:00",
"number": "21",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-07T23:00:00.000+00:00",
"number": "22",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-07T23:00:00.000+00:00",
"number": "23",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-07T23:00:00.000+00:00",
"number": "24",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-08T23:00:00.000+00:00",
"number": "25",
"summary": "New remediations available"
},
{
"date": "2018-01-08T23:00:00.000+00:00",
"number": "26",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-08T23:00:00.000+00:00",
"number": "27",
"summary": "New remediations available"
},
{
"date": "2018-01-08T23:00:00.000+00:00",
"number": "28",
"summary": "New remediations available"
},
{
"date": "2018-01-08T23:00:00.000+00:00",
"number": "29",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-08T23:00:00.000+00:00",
"number": "30",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-08T23:00:00.000+00:00",
"number": "31",
"summary": "Adjust probable damage to 4"
},
{
"date": "2018-01-08T23:00:00.000+00:00",
"number": "32",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-09T23:00:00.000+00:00",
"number": "33",
"summary": "New remediations available"
},
{
"date": "2018-01-09T23:00:00.000+00:00",
"number": "34",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-09T23:00:00.000+00:00",
"number": "35",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-10T23:00:00.000+00:00",
"number": "36",
"summary": "New remediations available"
},
{
"date": "2018-01-10T23:00:00.000+00:00",
"number": "37",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-10T23:00:00.000+00:00",
"number": "38",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-10T23:00:00.000+00:00",
"number": "39",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-10T23:00:00.000+00:00",
"number": "40",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-10T23:00:00.000+00:00",
"number": "41",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-10T23:00:00.000+00:00",
"number": "42",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-10T23:00:00.000+00:00",
"number": "43",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-10T23:00:00.000+00:00",
"number": "44",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-10T23:00:00.000+00:00",
"number": "45",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-10T23:00:00.000+00:00",
"number": "46",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-11T23:00:00.000+00:00",
"number": "47",
"summary": "reference added"
},
{
"date": "2018-01-11T23:00:00.000+00:00",
"number": "48",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-11T23:00:00.000+00:00",
"number": "49",
"summary": "New remediations available"
},
{
"date": "2018-01-11T23:00:00.000+00:00",
"number": "50",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-11T23:00:00.000+00:00",
"number": "51",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-11T23:00:00.000+00:00",
"number": "52",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-11T23:00:00.000+00:00",
"number": "53",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-11T23:00:00.000+00:00",
"number": "54",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-11T23:00:00.000+00:00",
"number": "55",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-11T23:00:00.000+00:00",
"number": "56",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-14T23:00:00.000+00:00",
"number": "57",
"summary": "New remediations available"
},
{
"date": "2018-01-15T23:00:00.000+00:00",
"number": "58",
"summary": "New remediations available"
},
{
"date": "2018-01-16T23:00:00.000+00:00",
"number": "59",
"summary": "New remediations available"
},
{
"date": "2018-01-17T23:00:00.000+00:00",
"number": "60",
"summary": "New remediations available"
},
{
"date": "2018-01-18T23:00:00.000+00:00",
"number": "61",
"summary": "New remediations available"
},
{
"date": "2018-01-18T23:00:00.000+00:00",
"number": "62",
"summary": "New remediations available"
},
{
"date": "2018-01-18T23:00:00.000+00:00",
"number": "63",
"summary": "New remediations available"
},
{
"date": "2018-01-18T23:00:00.000+00:00",
"number": "64",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-21T23:00:00.000+00:00",
"number": "65",
"summary": "New remediations available"
},
{
"date": "2018-01-22T23:00:00.000+00:00",
"number": "66",
"summary": "New remediations available"
},
{
"date": "2018-01-22T23:00:00.000+00:00",
"number": "67",
"summary": "New remediations available"
},
{
"date": "2018-01-22T23:00:00.000+00:00",
"number": "68",
"summary": "New remediations available"
},
{
"date": "2018-01-22T23:00:00.000+00:00",
"number": "69",
"summary": "New remediations available"
},
{
"date": "2018-01-22T23:00:00.000+00:00",
"number": "70",
"summary": "New remediations available"
},
{
"date": "2018-01-23T23:00:00.000+00:00",
"number": "71",
"summary": "New remediations available"
},
{
"date": "2018-01-24T23:00:00.000+00:00",
"number": "72",
"summary": "New remediations available"
},
{
"date": "2018-01-25T23:00:00.000+00:00",
"number": "73",
"summary": "New remediations available"
},
{
"date": "2018-01-28T23:00:00.000+00:00",
"number": "74",
"summary": "New remediations available"
},
{
"date": "2018-01-28T23:00:00.000+00:00",
"number": "75",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-29T23:00:00.000+00:00",
"number": "76",
"summary": "New remediations available"
},
{
"date": "2018-01-30T23:00:00.000+00:00",
"number": "77",
"summary": "New remediations available"
},
{
"date": "2018-01-30T23:00:00.000+00:00",
"number": "78",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-30T23:00:00.000+00:00",
"number": "79",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-30T23:00:00.000+00:00",
"number": "80",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-02-07T23:00:00.000+00:00",
"number": "81",
"summary": "New remediations available"
},
{
"date": "2018-02-07T23:00:00.000+00:00",
"number": "82",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-02-08T23:00:00.000+00:00",
"number": "83",
"summary": "New remediations available"
},
{
"date": "2018-02-08T23:00:00.000+00:00",
"number": "84",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-02-11T23:00:00.000+00:00",
"number": "85",
"summary": "New remediations available"
},
{
"date": "2018-02-14T23:00:00.000+00:00",
"number": "86",
"summary": "New remediations available"
},
{
"date": "2018-02-14T23:00:00.000+00:00",
"number": "87",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-02-19T23:00:00.000+00:00",
"number": "88",
"summary": "New remediations available"
},
{
"date": "2018-02-21T23:00:00.000+00:00",
"number": "89",
"summary": "New remediations available"
},
{
"date": "2018-02-22T23:00:00.000+00:00",
"number": "90",
"summary": "New remediations available"
},
{
"date": "2018-02-25T23:00:00.000+00:00",
"number": "91",
"summary": "New remediations available"
},
{
"date": "2018-02-27T23:00:00.000+00:00",
"number": "92",
"summary": "New remediations available"
},
{
"date": "2018-03-01T23:00:00.000+00:00",
"number": "93",
"summary": "New remediations available"
},
{
"date": "2018-03-05T23:00:00.000+00:00",
"number": "94",
"summary": "New remediations available"
},
{
"date": "2018-03-07T23:00:00.000+00:00",
"number": "95",
"summary": "New remediations available"
},
{
"date": "2018-03-08T23:00:00.000+00:00",
"number": "96",
"summary": "New remediations available"
},
{
"date": "2018-03-12T23:00:00.000+00:00",
"number": "97",
"summary": "New remediations available"
},
{
"date": "2018-03-13T23:00:00.000+00:00",
"number": "98",
"summary": "New remediations available"
},
{
"date": "2018-03-13T23:00:00.000+00:00",
"number": "99",
"summary": "New remediations available"
},
{
"date": "2018-03-14T23:00:00.000+00:00",
"number": "100",
"summary": "New remediations available"
},
{
"date": "2018-03-14T23:00:00.000+00:00",
"number": "101",
"summary": "New remediations available"
},
{
"date": "2018-03-15T23:00:00.000+00:00",
"number": "102",
"summary": "New remediations available"
},
{
"date": "2018-03-15T23:00:00.000+00:00",
"number": "103",
"summary": "New remediations available"
},
{
"date": "2018-03-18T23:00:00.000+00:00",
"number": "104",
"summary": "New remediations available"
},
{
"date": "2018-03-18T23:00:00.000+00:00",
"number": "105",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-03-18T23:00:00.000+00:00",
"number": "106",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-03-21T23:00:00.000+00:00",
"number": "107",
"summary": "New remediations available"
},
{
"date": "2018-03-21T23:00:00.000+00:00",
"number": "108",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-03-27T22:00:00.000+00:00",
"number": "109",
"summary": "New remediations available"
},
{
"date": "2018-03-27T22:00:00.000+00:00",
"number": "110",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-04-02T22:00:00.000+00:00",
"number": "111",
"summary": "New remediations available"
},
{
"date": "2018-04-03T22:00:00.000+00:00",
"number": "112",
"summary": "New remediations available"
},
{
"date": "2018-04-04T22:00:00.000+00:00",
"number": "113",
"summary": "New remediations available"
},
{
"date": "2018-04-08T22:00:00.000+00:00",
"number": "114",
"summary": "New remediations available"
},
{
"date": "2018-04-10T22:00:00.000+00:00",
"number": "115",
"summary": "New remediations available"
},
{
"date": "2018-04-10T22:00:00.000+00:00",
"number": "116",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-04-10T22:00:00.000+00:00",
"number": "117",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-04-12T22:00:00.000+00:00",
"number": "118",
"summary": "New remediations available"
},
{
"date": "2018-04-17T22:00:00.000+00:00",
"number": "119",
"summary": "New remediations available"
},
{
"date": "2018-04-17T22:00:00.000+00:00",
"number": "120",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-04-23T22:00:00.000+00:00",
"number": "121",
"summary": "New remediations available"
},
{
"date": "2018-04-24T22:00:00.000+00:00",
"number": "122",
"summary": "New remediations available"
},
{
"date": "2018-04-25T22:00:00.000+00:00",
"number": "123",
"summary": "Added references"
},
{
"date": "2018-04-26T22:00:00.000+00:00",
"number": "124",
"summary": "New remediations available"
},
{
"date": "2018-05-02T22:00:00.000+00:00",
"number": "125",
"summary": "New remediations available"
},
{
"date": "2018-05-03T22:00:00.000+00:00",
"number": "126",
"summary": "New remediations available"
},
{
"date": "2018-05-03T22:00:00.000+00:00",
"number": "127",
"summary": "New remediations available"
},
{
"date": "2018-05-08T22:00:00.000+00:00",
"number": "128",
"summary": "New remediations available"
},
{
"date": "2018-05-08T22:00:00.000+00:00",
"number": "129",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-05-15T22:00:00.000+00:00",
"number": "130",
"summary": "New remediations available"
},
{
"date": "2018-05-21T22:00:00.000+00:00",
"number": "131",
"summary": "New remediations available"
},
{
"date": "2018-06-04T22:00:00.000+00:00",
"number": "132",
"summary": "New Information F5"
},
{
"date": "2018-06-10T22:00:00.000+00:00",
"number": "133",
"summary": "Added references"
},
{
"date": "2018-06-27T22:00:00.000+00:00",
"number": "134",
"summary": "Added references"
},
{
"date": "2018-08-05T22:00:00.000+00:00",
"number": "135",
"summary": "Added references"
},
{
"date": "2018-08-27T22:00:00.000+00:00",
"number": "136",
"summary": "Added references"
},
{
"date": "2019-03-26T23:00:00.000+00:00",
"number": "137",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-04-03T22:00:00.000+00:00",
"number": "138",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2019-04-03T22:00:00.000+00:00",
"number": "139",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2019-05-08T22:00:00.000+00:00",
"number": "140",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-06-06T22:00:00.000+00:00",
"number": "141",
"summary": "Referenz(en) aufgenommen: ELSA-2019-4668"
},
{
"date": "2019-06-18T22:00:00.000+00:00",
"number": "142",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-06-23T22:00:00.000+00:00",
"number": "143",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2019-07-10T22:00:00.000+00:00",
"number": "144",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-07-11T22:00:00.000+00:00",
"number": "145",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2019-08-04T22:00:00.000+00:00",
"number": "146",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-06T22:00:00.000+00:00",
"number": "147",
"summary": "Schreibfehler korrigiert"
},
{
"date": "2019-09-24T22:00:00.000+00:00",
"number": "148",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-04-01T22:00:00.000+00:00",
"number": "149",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2020-06-22T22:00:00.000+00:00",
"number": "150",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-08-11T22:00:00.000+00:00",
"number": "151",
"summary": "Neue Updates von Huawei aufgenommen"
},
{
"date": "2020-08-12T22:00:00.000+00:00",
"number": "152",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2021-06-08T22:00:00.000+00:00",
"number": "153",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2021-08-15T22:00:00.000+00:00",
"number": "154",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2021-08-29T22:00:00.000+00:00",
"number": "155",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-12-06T23:00:00.000+00:00",
"number": "156",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-03-08T23:00:00.000+00:00",
"number": "157",
"summary": "Neue Updates von LENOVO und AMD aufgenommen"
},
{
"date": "2022-05-10T22:00:00.000+00:00",
"number": "158",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-01-17T23:00:00.000+00:00",
"number": "159",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-01-18T23:00:00.000+00:00",
"number": "160",
"summary": "doppelte Cisco Referenz bereinigt"
},
{
"date": "2023-01-19T23:00:00.000+00:00",
"number": "161",
"summary": "Schreibfehler korrigiert"
},
{
"date": "2023-03-07T23:00:00.000+00:00",
"number": "162",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-04-10T22:00:00.000+00:00",
"number": "163",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-04-16T22:00:00.000+00:00",
"number": "164",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-04-18T22:00:00.000+00:00",
"number": "165",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-05-18T22:00:00.000+00:00",
"number": "166",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-06-13T22:00:00.000+00:00",
"number": "167",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-07-10T22:00:00.000+00:00",
"number": "168",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "169",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-02-16T23:00:00.000+00:00",
"number": "170",
"summary": "Neue Updates von openSUSE aufgenommen"
}
],
"status": "final",
"version": "170"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Apple Mac OS X",
"product": {
"name": "Apple Mac OS X",
"product_id": "699",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os_x:-"
}
}
},
{
"category": "product_name",
"name": "Apple Safari",
"product": {
"name": "Apple Safari",
"product_id": "717",
"product_identification_helper": {
"cpe": "cpe:/a:apple:safari:-"
}
}
},
{
"category": "product_name",
"name": "Apple iOS",
"product": {
"name": "Apple iOS",
"product_id": "T005205",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:-"
}
}
}
],
"category": "vendor",
"name": "Apple"
},
{
"branches": [
{
"category": "product_name",
"name": "Cisco Nexus",
"product": {
"name": "Cisco Nexus",
"product_id": "T004033",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:nexus:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Router",
"product": {
"name": "Cisco Router",
"product_id": "T003258",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:router:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Unified Computing System (UCS)",
"product": {
"name": "Cisco Unified Computing System (UCS)",
"product_id": "163824",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:unified_computing_system:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Wide Area Application Services",
"product": {
"name": "Cisco Wide Area Application Services",
"product_id": "2186",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:wide_area_application_services:-"
}
}
}
],
"category": "vendor",
"name": "Cisco"
},
{
"branches": [
{
"category": "product_name",
"name": "Citrix Systems NetScaler",
"product": {
"name": "Citrix Systems NetScaler",
"product_id": "70427",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:netscaler:-"
}
}
},
{
"category": "product_name",
"name": "Citrix Systems Xen App",
"product": {
"name": "Citrix Systems Xen App",
"product_id": "T004075",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenapp:-"
}
}
},
{
"category": "product_name",
"name": "Citrix Systems Xen Desktop",
"product": {
"name": "Citrix Systems Xen Desktop",
"product_id": "T004076",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xen_desktop:-"
}
}
},
{
"category": "product_name",
"name": "Citrix Systems XenServer",
"product": {
"name": "Citrix Systems XenServer",
"product_id": "T004077",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:-"
}
}
}
],
"category": "vendor",
"name": "Citrix Systems"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "EMC Data Domain OS",
"product": {
"name": "EMC Data Domain OS",
"product_id": "T006099",
"product_identification_helper": {
"cpe": "cpe:/o:emc:data_domain_os:-"
}
}
}
],
"category": "vendor",
"name": "EMC"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "13.0.0",
"product": {
"name": "F5 BIG-IP 13.0.0",
"product_id": "T009498",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:13.0.0"
}
}
},
{
"category": "product_version",
"name": "13.1.0",
"product": {
"name": "F5 BIG-IP 13.1.0",
"product_id": "T011463",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:13.1.0"
}
}
},
{
"category": "product_version",
"name": "12.1.0-12.1.3",
"product": {
"name": "F5 BIG-IP 12.1.0-12.1.3",
"product_id": "T011954",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:12.1.0_-_12.1.3"
}
}
},
{
"category": "product_version",
"name": "11.5.1-11.5.5",
"product": {
"name": "F5 BIG-IP 11.5.1-11.5.5",
"product_id": "T011955",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:11.5.1_-_11.5.5"
}
}
},
{
"category": "product_version",
"name": "11.2.1",
"product": {
"name": "F5 BIG-IP 11.2.1",
"product_id": "T011962",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:11.2.1_-_11.6.3"
}
}
},
{
"category": "product_version",
"name": "11.6.1-11.6.2",
"product": {
"name": "F5 BIG-IP 11.6.1-11.6.2",
"product_id": "T011964",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:11.6.1_-_11.6.2"
}
}
}
],
"category": "product_name",
"name": "BIG-IP"
},
{
"branches": [
{
"category": "product_version",
"name": "3.1.1",
"product": {
"name": "F5 Enterprise Manager 3.1.1",
"product_id": "T011961",
"product_identification_helper": {
"cpe": "cpe:/a:f5:enterprise_manager:3.1.1"
}
}
}
],
"category": "product_name",
"name": "Enterprise Manager"
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "FreeBSD Project FreeBSD OS",
"product": {
"name": "FreeBSD Project FreeBSD OS",
"product_id": "4035",
"product_identification_helper": {
"cpe": "cpe:/o:freebsd:freebsd:-"
}
}
}
],
"category": "vendor",
"name": "FreeBSD Project"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE ProLiant",
"product": {
"name": "HPE ProLiant",
"product_id": "T009310",
"product_identification_helper": {
"cpe": "cpe:/h:hp:proliant:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Huawei OceanStor",
"product": {
"name": "Huawei OceanStor",
"product_id": "T017101",
"product_identification_helper": {
"cpe": "cpe:/h:huawei:oceanstor_uds:-"
}
}
}
],
"category": "vendor",
"name": "Huawei"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel Prozessor",
"product": {
"name": "Intel Prozessor",
"product_id": "T011586",
"product_identification_helper": {
"cpe": "cpe:/h:intel:intel_prozessor:-"
}
}
},
{
"category": "product_name",
"name": "Intel Xeon",
"product": {
"name": "Intel Xeon",
"product_id": "T011286",
"product_identification_helper": {
"cpe": "cpe:/h:intel:xeon:-"
}
}
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "5930",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
},
{
"category": "product_name",
"name": "Juniper Junos Space",
"product": {
"name": "Juniper Junos Space",
"product_id": "T003343",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "Lenovo Computer",
"product": {
"name": "Lenovo Computer",
"product_id": "T006520",
"product_identification_helper": {
"cpe": "cpe:/o:lenovo:lenovo_computer:-"
}
}
}
],
"category": "vendor",
"name": "Lenovo"
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Edge",
"product": {
"name": "Microsoft Edge",
"product_id": "T005922",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:edge:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "11",
"product": {
"name": "Microsoft Internet Explorer 11",
"product_id": "T003302",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:internet_explorer:11"
}
}
}
],
"category": "product_name",
"name": "Internet Explorer"
},
{
"branches": [
{
"category": "product_version",
"name": "2017 x64",
"product": {
"name": "Microsoft SQL Server (MSSQL) 2017 x64",
"product_id": "T011516",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:sql_server:2017::x64"
}
}
}
],
"category": "product_name",
"name": "SQL Server (MSSQL)"
},
{
"branches": [
{
"category": "product_version",
"name": "SP1 x64",
"product": {
"name": "Microsoft SQL Server 2016 SP1 x64",
"product_id": "T011514",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:sql_server_2016:sp1"
}
}
},
{
"category": "product_version",
"name": "SP1 (CU) x64",
"product": {
"name": "Microsoft SQL Server 2016 SP1 (CU) x64",
"product_id": "T011515",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:sql_server_2016:sp1:cu:x64"
}
}
}
],
"category": "product_name",
"name": "SQL Server 2016"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions",
"product": {
"name": "Microsoft Windows All versions",
"product_id": "7107"
}
}
],
"category": "product_name",
"name": "Windows"
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2008",
"product": {
"name": "Microsoft Windows Server 2008",
"product_id": "103824",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2008:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012 R2",
"product": {
"name": "Microsoft Windows Server 2012 R2",
"product_id": "185379",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2016",
"product": {
"name": "Microsoft Windows Server 2016",
"product_id": "T008880",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2016:-"
}
}
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c57.0.4",
"product": {
"name": "Mozilla Firefox \u003c57.0.4",
"product_id": "T011585"
}
},
{
"category": "product_version",
"name": "57.0.4",
"product": {
"name": "Mozilla Firefox 57.0.4",
"product_id": "T011585-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox:57.0.4"
}
}
}
],
"category": "product_name",
"name": "Firefox"
}
],
"category": "vendor",
"name": "Mozilla"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp FAS",
"product": {
"name": "NetApp FAS",
"product_id": "T011540",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"category": "product_name",
"name": "Open Source QEMU",
"product": {
"name": "Open Source QEMU",
"product_id": "T007150",
"product_identification_helper": {
"cpe": "cpe:/a:qemu:qemu:-"
}
}
},
{
"category": "product_name",
"name": "Open Source Xen",
"product": {
"name": "Open Source Xen",
"product_id": "T000611",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle VM",
"product": {
"name": "Oracle VM",
"product_id": "T011119",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "6",
"product": {
"name": "Red Hat Enterprise Linux 6",
"product_id": "120737",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "7",
"product": {
"name": "Red Hat Enterprise Linux 7",
"product_id": "T007579",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7"
}
}
},
{
"category": "product_version",
"name": "6.6 AUS",
"product": {
"name": "Red Hat Enterprise Linux 6.6 AUS",
"product_id": "T008764",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6.6:advanced_update_support"
}
}
},
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "Red Hat Enterprise Linux 7.3",
"product_id": "T008930",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7.3"
}
}
},
{
"category": "product_version",
"name": "7.3 EUS",
"product": {
"name": "Red Hat Enterprise Linux 7.3 EUS",
"product_id": "T010722",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7.3_eus"
}
}
},
{
"category": "product_version",
"name": "7 RT",
"product": {
"name": "Red Hat Enterprise Linux 7 RT",
"product_id": "T011506",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::real_time"
}
}
},
{
"category": "product_version",
"name": "7.3 x86_64 EUS",
"product": {
"name": "Red Hat Enterprise Linux Server EUS 7.3 x86_64 EUS",
"product_id": "T011507",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7.3:x86_64:eus"
}
}
},
{
"category": "product_version",
"name": "7.3 x86_64 AUS",
"product": {
"name": "Red Hat Enterprise Linux Server AUS 7.3 x86_64 AUS",
"product_id": "T011508",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7.3:x86_64:aus"
}
}
},
{
"category": "product_version",
"name": "7.3 x86_64 TUS",
"product": {
"name": "Red Hat Enterprise Linux Server 7.3 x86_64 TUS",
"product_id": "T011509",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7.3:x86_64:tus"
}
}
},
{
"category": "product_version",
"name": "7.3 x86_64 4 year extended Update Support",
"product": {
"name": "Red Hat Enterprise Linux Server 7.3 x86_64 4 year extended Update Support",
"product_id": "T011510",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7.3:x86_64:4_year_extended_update_support"
}
}
},
{
"category": "product_version",
"name": "6.7 EUS",
"product": {
"name": "Red Hat Enterprise Linux 6.7 EUS",
"product_id": "T011511",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6.7::eus"
}
}
},
{
"category": "product_version",
"name": "7.2 AUS",
"product": {
"name": "Red Hat Enterprise Linux 7.2 AUS",
"product_id": "T011513",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7.2::aus"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "5.5",
"product": {
"name": "VMware ESXi 5.5",
"product_id": "228240",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:5.5"
}
}
},
{
"category": "product_version",
"name": "6",
"product": {
"name": "VMware ESXi 6.0",
"product_id": "328679",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:6.0"
}
}
},
{
"category": "product_version",
"name": "6.5",
"product": {
"name": "VMware ESXi 6.5",
"product_id": "T010749",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:6.5"
}
}
}
],
"category": "product_name",
"name": "ESXi"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.5.9",
"product": {
"name": "VMware Fusion (for MAC) \u003c8.5.9",
"product_id": "T011502"
}
},
{
"category": "product_version",
"name": "8.5.9",
"product": {
"name": "VMware Fusion (for MAC) 8.5.9",
"product_id": "T011502-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:fusion:8.5.9"
}
}
}
],
"category": "product_name",
"name": "Fusion"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.5.9",
"product": {
"name": "VMware Workstation \u003c12.5.9",
"product_id": "T011562"
}
},
{
"category": "product_version",
"name": "12.5.9",
"product": {
"name": "VMware Workstation 12.5.9",
"product_id": "T011562-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:workstation:12.5.9"
}
}
}
],
"category": "product_name",
"name": "Workstation"
}
],
"category": "vendor",
"name": "VMware"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"product_status": {
"known_affected": [
"T004033",
"T004077",
"T003343",
"T011962",
"T011961",
"T003302",
"T011964",
"T005205",
"T011562",
"T005922",
"T011286",
"T004914",
"5930",
"228240",
"T010749",
"717",
"70427",
"T004075",
"T004076",
"T006099",
"T006520",
"T011119",
"T011515",
"T011955",
"T011514",
"T011954",
"163824",
"T011516",
"T011511",
"T011510",
"T003258",
"T007579",
"T011513",
"2951",
"T002207",
"120737",
"T027843",
"T011508",
"T011507",
"T009310",
"T011509",
"T008930",
"T011506",
"67646",
"4035",
"T011502",
"T011463",
"T011540",
"T011586",
"T011585",
"T000611",
"699",
"328679",
"103824",
"T010722",
"T008764",
"2186",
"185379",
"T017101",
"T000126",
"7107",
"T007150",
"1727",
"T009498",
"T008880"
]
},
"release_date": "2018-01-03T23:00:00.000+00:00",
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"product_status": {
"known_affected": [
"T004033",
"T004077",
"T003343",
"T011962",
"T011961",
"T003302",
"T011964",
"T005205",
"T011562",
"T005922",
"T011286",
"T004914",
"5930",
"228240",
"T010749",
"717",
"70427",
"T004075",
"T004076",
"T006099",
"T006520",
"T011119",
"T011515",
"T011955",
"T011514",
"T011954",
"163824",
"T011516",
"T011511",
"T011510",
"T003258",
"T007579",
"T011513",
"2951",
"T002207",
"120737",
"T027843",
"T011508",
"T011507",
"T009310",
"T011509",
"T008930",
"T011506",
"67646",
"4035",
"T011502",
"T011463",
"T011540",
"T011586",
"T011585",
"T000611",
"699",
"328679",
"103824",
"T010722",
"T008764",
"2186",
"185379",
"T017101",
"T000126",
"7107",
"T007150",
"1727",
"T009498",
"T008880"
]
},
"release_date": "2018-01-03T23:00:00.000+00:00",
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"product_status": {
"known_affected": [
"T004033",
"T004077",
"T003343",
"T011962",
"T011961",
"T003302",
"T011964",
"T005205",
"T011562",
"T005922",
"T011286",
"T004914",
"5930",
"228240",
"T010749",
"717",
"70427",
"T004075",
"T004076",
"T006099",
"T006520",
"T011119",
"T011515",
"T011955",
"T011514",
"T011954",
"163824",
"T011516",
"T011511",
"T011510",
"T003258",
"T007579",
"T011513",
"2951",
"T002207",
"120737",
"T027843",
"T011508",
"T011507",
"T009310",
"T011509",
"T008930",
"T011506",
"67646",
"4035",
"T011502",
"T011463",
"T011540",
"T011586",
"T011585",
"T000611",
"699",
"328679",
"103824",
"T010722",
"T008764",
"2186",
"185379",
"T000126",
"7107",
"T007150",
"1727",
"T009498",
"T008880"
]
},
"release_date": "2018-01-03T23:00:00.000+00:00",
"title": "CVE-2017-5754"
}
]
}
WID-SEC-W-2024-2008
Vulnerability from csaf_certbund - Published: 2018-01-16 23:00 - Updated: 2024-09-02 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Oracle Secure Global Desktop bietet einen sicheren Zugang zu zentralisierten, serverbasierten Windows, UNIX und \"leagacy\" Applikationen von verschiedenen Client-Ger\u00e4ten.\r\nOracle VM Virtual Box ist eine Virtualisierungsplattform, die das Host Betriebssystem beinhaltet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box ausnutzen, um die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-2008 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2024-2008.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-2008 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2008"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - Januar 2018 - Virtualization vom 2018-01-16",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixOVIR"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20180117-0002 vom 2018-01-18",
"url": "https://security.netapp.com/advisory/ntap-20180117-0002/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-0093 vom 2018-01-18",
"url": "http://linux.oracle.com/errata/ELSA-2018-0093.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4012 vom 2018-01-19",
"url": "http://linux.oracle.com/errata/ELSA-2018-4012.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1196 vom 2018-04-24",
"url": "https://access.redhat.com/errata/RHSA-2018:1196"
},
{
"category": "external",
"summary": "Oracle VM Server f\u00fcr x86 Bulletin - Juli 2019",
"url": "https://www.oracle.com/technetwork/topics/security/ovmbulletinjul2019-5600406.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12605 vom 2024-09-02",
"url": "https://linux.oracle.com/errata/ELSA-2024-12605.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12604 vom 2024-09-02",
"url": "https://linux.oracle.com/errata/ELSA-2024-12604.html"
}
],
"source_lang": "en-US",
"title": "Oracle Virtualization: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-09-02T22:00:00.000+00:00",
"generator": {
"date": "2024-09-03T08:16:47.014+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.6"
}
},
"id": "WID-SEC-W-2024-2008",
"initial_release_date": "2018-01-16T23:00:00.000+00:00",
"revision_history": [
{
"date": "2018-01-16T23:00:00.000+00:00",
"number": "1",
"summary": "Initial Release"
},
{
"date": "2018-01-16T23:00:00.000+00:00",
"number": "2",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-01-17T23:00:00.000+00:00",
"number": "3",
"summary": "New remediations available"
},
{
"date": "2018-01-21T23:00:00.000+00:00",
"number": "4",
"summary": "New remediations available"
},
{
"date": "2018-02-11T23:00:00.000+00:00",
"number": "5",
"summary": "Added references"
},
{
"date": "2018-06-05T22:00:00.000+00:00",
"number": "6",
"summary": "Added references"
},
{
"date": "2024-09-02T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "5.3",
"product": {
"name": "Oracle Secure Global Desktop 5.3",
"product_id": "T011009",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:secure_global_desktop:5.3"
}
}
}
],
"category": "product_name",
"name": "Secure Global Desktop"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.1.32",
"product": {
"name": "Oracle VM Virtual Box \u003c5.1.32",
"product_id": "T011675"
}
},
{
"category": "product_version",
"name": "5.1.32",
"product": {
"name": "Oracle VM Virtual Box 5.1.32",
"product_id": "T011675-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm_virtualbox:5.1.32"
}
}
},
{
"category": "product_version_range",
"name": "\u003c5.2.6",
"product": {
"name": "Oracle VM Virtual Box \u003c5.2.6",
"product_id": "T011676"
}
},
{
"category": "product_version",
"name": "5.2.6",
"product": {
"name": "Oracle VM Virtual Box 5.2.6",
"product_id": "T011676-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm_virtualbox:5.2.6"
}
}
}
],
"category": "product_name",
"name": "VM Virtual Box"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-3735",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T011009",
"T011676",
"67646",
"T011675",
"T004914"
]
},
"release_date": "2018-01-16T23:00:00.000+00:00",
"title": "CVE-2017-3735"
},
{
"cve": "CVE-2017-3736",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T011009",
"T011676",
"67646",
"T011675",
"T004914"
]
},
"release_date": "2018-01-16T23:00:00.000+00:00",
"title": "CVE-2017-3736"
},
{
"cve": "CVE-2017-5645",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T011009",
"T011676",
"67646",
"T011675",
"T004914"
]
},
"release_date": "2018-01-16T23:00:00.000+00:00",
"title": "CVE-2017-5645"
},
{
"cve": "CVE-2017-5715",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T011009",
"T011676",
"67646",
"T011675",
"T004914"
]
},
"release_date": "2018-01-16T23:00:00.000+00:00",
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-2676",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T011009",
"T011676",
"67646",
"T011675",
"T004914"
]
},
"release_date": "2018-01-16T23:00:00.000+00:00",
"title": "CVE-2018-2676"
},
{
"cve": "CVE-2018-2685",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T011009",
"T011676",
"67646",
"T011675",
"T004914"
]
},
"release_date": "2018-01-16T23:00:00.000+00:00",
"title": "CVE-2018-2685"
},
{
"cve": "CVE-2018-2686",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T011009",
"T011676",
"67646",
"T011675",
"T004914"
]
},
"release_date": "2018-01-16T23:00:00.000+00:00",
"title": "CVE-2018-2686"
},
{
"cve": "CVE-2018-2687",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T011009",
"T011676",
"67646",
"T011675",
"T004914"
]
},
"release_date": "2018-01-16T23:00:00.000+00:00",
"title": "CVE-2018-2687"
},
{
"cve": "CVE-2018-2688",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T011009",
"T011676",
"67646",
"T011675",
"T004914"
]
},
"release_date": "2018-01-16T23:00:00.000+00:00",
"title": "CVE-2018-2688"
},
{
"cve": "CVE-2018-2689",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T011009",
"T011676",
"67646",
"T011675",
"T004914"
]
},
"release_date": "2018-01-16T23:00:00.000+00:00",
"title": "CVE-2018-2689"
},
{
"cve": "CVE-2018-2690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T011009",
"T011676",
"67646",
"T011675",
"T004914"
]
},
"release_date": "2018-01-16T23:00:00.000+00:00",
"title": "CVE-2018-2690"
},
{
"cve": "CVE-2018-2693",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T011009",
"T011676",
"67646",
"T011675",
"T004914"
]
},
"release_date": "2018-01-16T23:00:00.000+00:00",
"title": "CVE-2018-2693"
},
{
"cve": "CVE-2018-2694",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T011009",
"T011676",
"67646",
"T011675",
"T004914"
]
},
"release_date": "2018-01-16T23:00:00.000+00:00",
"title": "CVE-2018-2694"
},
{
"cve": "CVE-2018-2698",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Oracle Secure Global Desktop und Oracle VM Virtual Box. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T011009",
"T011676",
"67646",
"T011675",
"T004914"
]
},
"release_date": "2018-01-16T23:00:00.000+00:00",
"title": "CVE-2018-2698"
}
]
}
WID-SEC-W-2023-2917
Vulnerability from csaf_certbund - Published: 2023-11-14 23:00 - Updated: 2024-12-15 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2917 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2917.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2917 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2917"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX23-016 vom 2023-11-14",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2023/11/XRX23-016_FFPSv7-S10_MediaInstall_Nov2023.pdf"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX23-017 vom 2023-11-14",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2023/11/XRX23-017_FFPSv7-S11_MediaInstall_Nov2023.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX23-019 vom 2023-11-16",
"url": "https://security.business.xerox.com/wp-content/uploads/2023/11/Xerox-Security-Bulletin-XRX23-019-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX23-021",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2023/11/XRX23-021_FFPSv2_Win10_SecurityBulletin_Nov2023.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX23-022 vom 2023-12-01",
"url": "https://security.business.xerox.com/wp-content/uploads/2023/11/XRX23-022_FFPSv9-S11_MediaInstall_Nov2023.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-005 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox-Security-Bulletin-XRX24-005-Xerox-FreeFlow%C2%AE-Print-Server-v9_Feb-2024.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-001 vom 2024-03-11",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox%C2%AE-Security-Bulletin-XRX24-001-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3949-1 vom 2024-11-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019796.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14572-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/"
}
],
"source_lang": "en-US",
"title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-12-15T23:00:00.000+00:00",
"generator": {
"date": "2024-12-16T09:17:44.516+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2023-2917",
"initial_release_date": "2023-11-14T23:00:00.000+00:00",
"revision_history": [
{
"date": "2023-11-14T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-11-16T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2023-11-28T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2023-11-30T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-03-03T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-03-11T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-11-07T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von openSUSE aufgenommen"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9",
"product": {
"name": "Xerox FreeFlow Print Server 9",
"product_id": "T002977",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:9"
}
}
},
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T015631",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
},
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
},
{
"category": "product_version",
"name": "v9 for Solaris",
"product": {
"name": "Xerox FreeFlow Print Server v9 for Solaris",
"product_id": "T028053",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris"
}
}
},
{
"category": "product_version",
"name": "v2 / Windows 10",
"product": {
"name": "Xerox FreeFlow Print Server v2 / Windows 10",
"product_id": "T031383",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v2__windows_10"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-3639",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2021-44917",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2021-44917"
},
{
"cve": "CVE-2021-46784",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2021-46784"
},
{
"cve": "CVE-2022-31008",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-31008"
},
{
"cve": "CVE-2022-32206",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32221",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-3924",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-3924"
},
{
"cve": "CVE-2022-41409",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-41409"
},
{
"cve": "CVE-2022-48337",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-48337"
},
{
"cve": "CVE-2022-48338",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-48338"
},
{
"cve": "CVE-2022-48339",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-48339"
},
{
"cve": "CVE-2022-4899",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-4899"
},
{
"cve": "CVE-2023-0049",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0049"
},
{
"cve": "CVE-2023-0051",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0051"
},
{
"cve": "CVE-2023-0054",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0054"
},
{
"cve": "CVE-2023-0288",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0288"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0512",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0512"
},
{
"cve": "CVE-2023-0666",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0666"
},
{
"cve": "CVE-2023-0668",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0668"
},
{
"cve": "CVE-2023-1127",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-1127"
},
{
"cve": "CVE-2023-1170",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-1170"
},
{
"cve": "CVE-2023-1175",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-1175"
},
{
"cve": "CVE-2023-1393",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-1393"
},
{
"cve": "CVE-2023-1906",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-1906"
},
{
"cve": "CVE-2023-1981",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-1981"
},
{
"cve": "CVE-2023-2004",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2004"
},
{
"cve": "CVE-2023-22025",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-22025"
},
{
"cve": "CVE-2023-22043",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-22043"
},
{
"cve": "CVE-2023-22067",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-22067"
},
{
"cve": "CVE-2023-22081",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-22081"
},
{
"cve": "CVE-2023-22128",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-22128"
},
{
"cve": "CVE-2023-22129",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-22129"
},
{
"cve": "CVE-2023-23914",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-23914"
},
{
"cve": "CVE-2023-23915",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-23915"
},
{
"cve": "CVE-2023-23916",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-24805",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-24805"
},
{
"cve": "CVE-2023-25193",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-25193"
},
{
"cve": "CVE-2023-2650",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-27985",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-27985"
},
{
"cve": "CVE-2023-27986",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-27986"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28319",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-28319"
},
{
"cve": "CVE-2023-28320",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-28320"
},
{
"cve": "CVE-2023-28321",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-28321"
},
{
"cve": "CVE-2023-28322",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-28450",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-28450"
},
{
"cve": "CVE-2023-2854",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2854"
},
{
"cve": "CVE-2023-2855",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2855"
},
{
"cve": "CVE-2023-2857",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2857"
},
{
"cve": "CVE-2023-2858",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2858"
},
{
"cve": "CVE-2023-2879",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2879"
},
{
"cve": "CVE-2023-28879",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-28879"
},
{
"cve": "CVE-2023-2911",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2911"
},
{
"cve": "CVE-2023-29402",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2023-29403",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29403"
},
{
"cve": "CVE-2023-29404",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29404"
},
{
"cve": "CVE-2023-29405",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29405"
},
{
"cve": "CVE-2023-29406",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29406"
},
{
"cve": "CVE-2023-29409",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29409"
},
{
"cve": "CVE-2023-29491",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29491"
},
{
"cve": "CVE-2023-29499",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29499"
},
{
"cve": "CVE-2023-30581",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30581"
},
{
"cve": "CVE-2023-30582",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30582"
},
{
"cve": "CVE-2023-30583",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30583"
},
{
"cve": "CVE-2023-30584",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30584"
},
{
"cve": "CVE-2023-30585",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30585"
},
{
"cve": "CVE-2023-30586",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30586"
},
{
"cve": "CVE-2023-30587",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30587"
},
{
"cve": "CVE-2023-30588",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30588"
},
{
"cve": "CVE-2023-30589",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30589"
},
{
"cve": "CVE-2023-30590",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30590"
},
{
"cve": "CVE-2023-31122",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-31122"
},
{
"cve": "CVE-2023-31124",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-31124"
},
{
"cve": "CVE-2023-31130",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-31130"
},
{
"cve": "CVE-2023-31147",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-31147"
},
{
"cve": "CVE-2023-3138",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-3138"
},
{
"cve": "CVE-2023-31484",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-31484"
},
{
"cve": "CVE-2023-31486",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-31486"
},
{
"cve": "CVE-2023-3195",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-3195"
},
{
"cve": "CVE-2023-32002",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32002"
},
{
"cve": "CVE-2023-32003",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32003"
},
{
"cve": "CVE-2023-32004",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32004"
},
{
"cve": "CVE-2023-32005",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32005"
},
{
"cve": "CVE-2023-32006",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32006"
},
{
"cve": "CVE-2023-32067",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32067"
},
{
"cve": "CVE-2023-3247",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-3247"
},
{
"cve": "CVE-2023-32558",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32558"
},
{
"cve": "CVE-2023-32559",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32559"
},
{
"cve": "CVE-2023-32573",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32573"
},
{
"cve": "CVE-2023-32611",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32611"
},
{
"cve": "CVE-2023-32636",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32636"
},
{
"cve": "CVE-2023-32643",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32643"
},
{
"cve": "CVE-2023-32665",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32665"
},
{
"cve": "CVE-2023-32681",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32681"
},
{
"cve": "CVE-2023-32762",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32762"
},
{
"cve": "CVE-2023-32763",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32763"
},
{
"cve": "CVE-2023-34241",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-34241"
},
{
"cve": "CVE-2023-34969",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-34969"
},
{
"cve": "CVE-2023-36053",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-36053"
},
{
"cve": "CVE-2023-36191",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-36191"
},
{
"cve": "CVE-2023-3666",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-3666"
},
{
"cve": "CVE-2023-36664",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-36664"
},
{
"cve": "CVE-2023-37201",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-37201"
},
{
"cve": "CVE-2023-37202",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-37202"
},
{
"cve": "CVE-2023-37207",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-37207"
},
{
"cve": "CVE-2023-37208",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-37208"
},
{
"cve": "CVE-2023-37211",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-37211"
},
{
"cve": "CVE-2023-3823",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-3823"
},
{
"cve": "CVE-2023-3824",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-3824"
},
{
"cve": "CVE-2023-38403",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-38403"
},
{
"cve": "CVE-2023-4045",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4045"
},
{
"cve": "CVE-2023-4046",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4046"
},
{
"cve": "CVE-2023-4047",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4047"
},
{
"cve": "CVE-2023-40477",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-40477"
},
{
"cve": "CVE-2023-4048",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4048"
},
{
"cve": "CVE-2023-4049",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4049"
},
{
"cve": "CVE-2023-4050",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4050"
},
{
"cve": "CVE-2023-4054",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4054"
},
{
"cve": "CVE-2023-4055",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4055"
},
{
"cve": "CVE-2023-4056",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4056"
},
{
"cve": "CVE-2023-41080",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-41080"
},
{
"cve": "CVE-2023-41081",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-41081"
},
{
"cve": "CVE-2023-43622",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-43622"
},
{
"cve": "CVE-2023-4504",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4504"
},
{
"cve": "CVE-2023-4573",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4573"
},
{
"cve": "CVE-2023-4574",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4574"
},
{
"cve": "CVE-2023-4575",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4575"
},
{
"cve": "CVE-2023-4576",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4576"
},
{
"cve": "CVE-2023-45802",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-45802"
},
{
"cve": "CVE-2023-4581",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4581"
},
{
"cve": "CVE-2023-4584",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4584"
}
]
}
WID-SEC-W-2022-0532
Vulnerability from csaf_certbund - Published: 2018-05-01 22:00 - Updated: 2025-04-14 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Debian ist eine Linux-Distribution, die ausschlie\u00dflich Freie Software enth\u00e4lt.\r\nOracle Linux ist ein Open Source Betriebssystem, welches unter der GNU General Public License (GPL) verf\u00fcgbar ist.\r\nDer Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, einen Denial of Service Angriff durchzuf\u00fchren, Sicherheitsmechanismen zu umgehen, vertrauliche Daten einzusehen oder seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Appliance\n- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0532 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2022-0532.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0532 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0532"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4187-1 vom 2018-05-01",
"url": "https://www.debian.org/security/2018/dsa-4187"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4188-1 vom 2018-05-01",
"url": "https://www.debian.org/security/2018/dsa-4188"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4088 vom 2018-05-01",
"url": "https://linux.oracle.com/errata/ELSA-2018-4088.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4087 vom 2018-05-01",
"url": "https://linux.oracle.com/errata/ELSA-2018-4087.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4089 vom 2018-05-02",
"url": "http://linux.oracle.com/errata/ELSA-2018-4089.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1173-1 vom 2018-05-09",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181173-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1172-1 vom 2018-05-09",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181172-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1318 vom 2018-05-09",
"url": "http://www.auscert.org.au/bulletins/62478"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1355 vom 2018-05-09",
"url": "https://access.redhat.com/errata/RHSA-2018:1355"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-1318 vom 2018-05-09",
"url": "http://linux.oracle.com/errata/ELSA-2018-1318.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1217-1 vom 2018-05-11",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181217-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1238-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181238-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1225-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181225-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1240-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181240-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1230-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181230-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1223-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181223-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1228-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181228-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1236-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181236-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1239-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181239-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1231-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181231-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1229-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181229-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1237-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181237-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1232-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181232-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1227-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181227-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1234-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181234-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1233-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181233-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1226-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181226-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1235-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181235-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1222-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181222-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1224-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181224-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1263-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181263-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1221-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181221-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1220-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181220-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1249-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181249-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1246-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181246-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1252-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181252-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1260-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181260-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1270-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181270-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1262-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181262-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1242-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181242-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1268-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181268-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1248-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181248-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1258-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181258-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1272-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181272-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1250-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181250-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1253-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181253-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1241-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181241-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1259-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181259-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1256-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181256-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1245-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181245-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1264-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181264-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1254-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181254-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1266-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181266-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1269-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181269-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1251-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181251-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1255-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181255-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1273-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181273-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1243-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181243-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1244-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181244-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1261-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181261-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1267-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181267-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1247-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181247-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1257-1 vom 2018-05-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181257-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1374 vom 2018-05-16",
"url": "https://access.redhat.com/errata/RHSA-2018:1374"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1309-1 vom 2018-05-17",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181309-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-1629 vom 2018-05-22",
"url": "http://linux.oracle.com/errata/ELSA-2018-1629.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4114 vom 2018-05-23",
"url": "http://linux.oracle.com/errata/ELSA-2018-4114.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1366-1 vom 2018-05-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181366-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1375-1 vom 2018-05-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181375-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1376-1 vom 2018-05-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181376-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1386-1 vom 2018-05-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181386-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1368-1 vom 2018-05-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181368-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1374-1 vom 2018-05-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181374-1.html"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2018-0223 vom 2018-05-23",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-May/000858.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1465-1 vom 2018-05-30",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181465-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1498-1 vom 2018-06-05",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181498-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1508-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181508-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1551-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181551-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1525-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181525-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1536-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181536-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1511-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181511-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1545-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181545-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1522-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181522-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1530-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181530-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1534-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181534-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1524-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181524-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1505-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181505-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1510-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181510-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1516-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181516-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1523-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181523-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1532-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181532-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1531-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181531-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1521-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181521-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1518-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181518-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1506-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181506-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1548-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181548-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1514-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181514-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1541-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181541-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1546-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181546-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1519-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181519-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1509-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181509-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1528-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181528-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1537-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181537-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1513-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181513-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1512-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181512-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1538-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181538-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1517-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181517-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1535-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181535-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1529-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181529-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1549-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181549-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1540-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181540-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1520-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181520-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1526-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181526-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1533-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181533-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1539-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181539-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1543-1 vom 2018-06-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181543-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1571-1 vom 2018-06-07",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181571-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1570-1 vom 2018-06-07",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181570-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1567-1 vom 2018-06-07",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181567-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1636-1 vom 2018-06-11",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181636-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1644-1 vom 2018-06-11",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181644-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1639-1 vom 2018-06-11",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181639-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1645-1 vom 2018-06-11",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181645-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1641-1 vom 2018-06-11",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181641-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1640-1 vom 2018-06-11",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181640-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1637-1 vom 2018-06-11",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181637-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1648-1 vom 2018-06-11",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181648-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1642-1 vom 2018-06-11",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181642-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1643-1 vom 2018-06-11",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181643-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4145 vom 2018-06-16",
"url": "http://linux.oracle.com/errata/ELSA-2018-4145.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4134 vom 2018-06-16",
"url": "http://linux.oracle.com/errata/ELSA-2018-4134.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory",
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1762-1 vom 2018-06-20",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181762-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1761-1 vom 2018-06-20",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181761-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1772-1 vom 2018-06-21",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181772-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1816-1 vom 2018-06-26",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181816-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-1854 vom 2018-06-26",
"url": "http://linux.oracle.com/errata/ELSA-2018-1854.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3698-1 vom 2018-07-03",
"url": "http://www.ubuntu.com/usn/usn-3698-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3697-1 vom 2018-07-03",
"url": "http://www.ubuntu.com/usn/usn-3697-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3696-1 vom 2018-07-03",
"url": "http://www.ubuntu.com/usn/usn-3696-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4161 vom 2018-07-10",
"url": "http://linux.oracle.com/errata/ELSA-2018-4161.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4164 vom 2018-07-11",
"url": "http://linux.oracle.com/errata/ELSA-2018-4164.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-2162 vom 2018-07-11",
"url": "http://linux.oracle.com/errata/ELSA-2018-2162.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2082-1 vom 2018-07-28",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182082-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2092-1 vom 2018-07-28",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182092-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2150-1 vom 2018-08-01",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182150-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2222-1 vom 2018-08-07",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182222-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4193 vom 2018-08-10",
"url": "http://linux.oracle.com/errata/ELSA-2018-4193.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-2384 vom 2018-08-15",
"url": "http://linux.oracle.com/errata/ELSA-2018-2384.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-2390 vom 2018-08-15",
"url": "http://linux.oracle.com/errata/ELSA-2018-2390.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2390 vom 2018-08-14",
"url": "http://rhn.redhat.com/errata/RHSA-2018-2390.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2384 vom 2018-08-14",
"url": "http://rhn.redhat.com/errata/RHSA-2018-2384.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2384 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2384"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2387 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2388 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2388"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2390 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2390"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2389 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2389"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2395 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2395"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2391 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2391"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2392 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2392"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2393 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2393"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2394 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2396 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2332-1 vom 2018-08-15",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182332-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2366-1 vom 2018-08-16",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182366-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4200 vom 2018-08-17",
"url": "http://linux.oracle.com/errata/ELSA-2018-4200.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2637-1 vom 2018-09-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182637-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2631-1 vom 2018-09-06",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182631-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4211 vom 2018-09-10",
"url": "http://linux.oracle.com/errata/ELSA-2018-4211.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4308 vom 2018-10-01",
"url": "https://www.debian.org/security/2018/dsa-4308"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:3003-1 vom 2018-10-04",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:3004-1 vom 2018-10-04",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183004-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:3084-1 vom 2018-10-09",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183084-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4242 vom 2018-10-10",
"url": "http://linux.oracle.com/errata/ELSA-2018-4242.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4245 vom 2018-10-11",
"url": "http://linux.oracle.com/errata/ELSA-2018-4245.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4250 vom 2018-10-13",
"url": "http://linux.oracle.com/errata/ELSA-2018-4250.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2948 vom 2018-10-31",
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:3096 vom 2018-10-31",
"url": "https://access.redhat.com/errata/RHSA-2018:3096"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:3083 vom 2018-10-31",
"url": "https://access.redhat.com/errata/RHSA-2018:3083"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:3589-1 vom 2018-11-01",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183589-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:3593-1 vom 2018-11-01",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183593-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-3083 vom 2018-11-06",
"url": "http://linux.oracle.com/errata/ELSA-2018-3083.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:3659-1 vom 2018-11-08",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183659-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4268 vom 2018-11-08",
"url": "http://linux.oracle.com/errata/ELSA-2018-4268.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4269 vom 2018-11-08",
"url": "http://linux.oracle.com/errata/ELSA-2018-4269.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4285 vom 2018-11-21",
"url": "http://linux.oracle.com/errata/ELSA-2018-4285.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:3934-1 vom 2018-11-29",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183934-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:3961-1 vom 2018-12-01",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183961-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4301 vom 2018-12-10",
"url": "http://linux.oracle.com/errata/ELSA-2018-4301.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4304 vom 2018-12-12",
"url": "http://linux.oracle.com/errata/ELSA-2018-4304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:4069-1 vom 2018-12-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20184069-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:4072-1 vom 2018-12-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20184072-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-4315 vom 2019-01-03",
"url": "http://linux.oracle.com/errata/ELSA-2019-4315.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-4316 vom 2019-01-04",
"url": "http://linux.oracle.com/errata/ELSA-2019-4316.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-4317 vom 2019-01-05",
"url": "http://linux.oracle.com/errata/ELSA-2019-4317.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:0095-1 vom 2019-01-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190095-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3880-2 vom 2019-02-05",
"url": "https://usn.ubuntu.com/3880-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3910-1 vom 2019-03-16",
"url": "https://usn.ubuntu.com/3910-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3910-1 vom 2019-03-16",
"url": "https://usn.ubuntu.com/3910-2/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:0641 vom 2019-03-26",
"url": "https://access.redhat.com/errata/RHSA-2019:0641"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-4596 vom 2019-04-01",
"url": "http://linux.oracle.com/errata/ELSA-2019-4596.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2019-0014 vom 2019-05-03",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-May/000936.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1190 vom 2019-05-15",
"url": "https://access.redhat.com/errata/RHSA-2019:1190"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1170 vom 2019-05-15",
"url": "https://access.redhat.com/errata/RHSA-2019:1170"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1487 vom 2019-06-18",
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1483 vom 2019-06-18",
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2029 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2029"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2043 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2043"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-4742 vom 2019-08-10",
"url": "http://linux.oracle.com/errata/ELSA-2019-4742.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2029 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2029.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2430-1 vom 2019-09-23",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192430-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2450-1 vom 2019-09-24",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192450-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4163-1 vom 2019-10-22",
"url": "https://usn.ubuntu.com/4163-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4163-2 vom 2019-10-23",
"url": "https://usn.ubuntu.com/4163-2/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:4154 vom 2019-12-10",
"url": "https://access.redhat.com/errata/RHSA-2019:4154"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:4159 vom 2019-12-10",
"url": "https://access.redhat.com/errata/RHSA-2019:4159"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2018-252 vom 2020-01-07",
"url": "https://downloads.avaya.com/css/P8/documents/101051981"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0036 vom 2020-01-07",
"url": "https://access.redhat.com/errata/RHSA-2020:0036"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA 2148 vom 2020-04-01",
"url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202003/msg00025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1587-1 vom 2020-06-10",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1603-1 vom 2020-06-11",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1599-1 vom 2020-06-10",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1602-1 vom 2020-06-11",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006932.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1604-1 vom 2020-06-11",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1602-1 vom 2020-06-11",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1599-1 vom 2020-06-10",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006924.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1605-1 vom 2020-06-11",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006930.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1605-1 vom 2020-06-11",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1671-1 vom 2020-06-18",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1656-1 vom 2020-06-18",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1663-1 vom 2020-06-18",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1646-1 vom 2020-06-18",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006970.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1754-1 vom 2020-06-26",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007033.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1758-1 vom 2020-06-26",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1775-1 vom 2020-06-26",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007036.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2156-1 vom 2020-08-07",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2323 vom 2020-08-12",
"url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202008/msg00019.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4486-1 vom 2020-09-02",
"url": "https://usn.ubuntu.com/4486-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2478-1 vom 2020-09-03",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2487-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2861-1 vom 2021-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2862-1 vom 2021-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009367.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9473 vom 2021-10-08",
"url": "http://linux.oracle.com/errata/ELSA-2021-9473.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2021-0035 vom 2021-10-12",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2021-October/001033.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1988 vom 2022-05-10",
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1975 vom 2022-05-10",
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3065 vom 2022-07-01",
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-9969 vom 2022-11-01",
"url": "https://linux.oracle.com/errata/ELSA-2022-9969.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:1848-1 vom 2023-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014466.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:1897-1 vom 2023-04-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014485.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:1992-1 vom 2023-04-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014572.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2232-1 vom 2023-05-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014918.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1195-1 vom 2025-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020680.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1194-1 vom 2025-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-04-14T22:00:00.000+00:00",
"generator": {
"date": "2025-04-15T11:13:48.454+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2022-0532",
"initial_release_date": "2018-05-01T22:00:00.000+00:00",
"revision_history": [
{
"date": "2018-05-01T22:00:00.000+00:00",
"number": "1",
"summary": "Initial Release"
},
{
"date": "2018-05-01T22:00:00.000+00:00",
"number": "2",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-05-02T22:00:00.000+00:00",
"number": "3",
"summary": "New remediations available"
},
{
"date": "2018-05-08T22:00:00.000+00:00",
"number": "4",
"summary": "New remediations available"
},
{
"date": "2018-05-10T22:00:00.000+00:00",
"number": "5",
"summary": "New remediations available"
},
{
"date": "2018-05-13T22:00:00.000+00:00",
"number": "6",
"summary": "New remediations available"
},
{
"date": "2018-05-15T22:00:00.000+00:00",
"number": "7",
"summary": "New remediations available"
},
{
"date": "2018-05-16T22:00:00.000+00:00",
"number": "8",
"summary": "New remediations available"
},
{
"date": "2018-05-21T22:00:00.000+00:00",
"number": "9",
"summary": "New remediations available"
},
{
"date": "2018-05-22T22:00:00.000+00:00",
"number": "10",
"summary": "New remediations available"
},
{
"date": "2018-05-23T22:00:00.000+00:00",
"number": "11",
"summary": "New remediations available"
},
{
"date": "2018-05-23T22:00:00.000+00:00",
"number": "12",
"summary": "New remediations available"
},
{
"date": "2018-05-23T22:00:00.000+00:00",
"number": "13",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-05-29T22:00:00.000+00:00",
"number": "14",
"summary": "New remediations available"
},
{
"date": "2018-06-05T22:00:00.000+00:00",
"number": "15",
"summary": "New remediations available"
},
{
"date": "2018-06-06T22:00:00.000+00:00",
"number": "16",
"summary": "New remediations available"
},
{
"date": "2018-06-07T22:00:00.000+00:00",
"number": "17",
"summary": "New remediations available"
},
{
"date": "2018-06-11T22:00:00.000+00:00",
"number": "18",
"summary": "New remediations available"
},
{
"date": "2018-06-17T22:00:00.000+00:00",
"number": "19",
"summary": "New remediations available"
},
{
"date": "2018-06-18T22:00:00.000+00:00",
"number": "20",
"summary": "New remediations available"
},
{
"date": "2018-06-19T22:00:00.000+00:00",
"number": "21",
"summary": "Added references"
},
{
"date": "2018-06-21T22:00:00.000+00:00",
"number": "22",
"summary": "New remediations available"
},
{
"date": "2018-06-24T22:00:00.000+00:00",
"number": "23",
"summary": "Added references"
},
{
"date": "2018-06-27T22:00:00.000+00:00",
"number": "24",
"summary": "Added references"
},
{
"date": "2018-07-10T22:00:00.000+00:00",
"number": "25",
"summary": "New remediations available"
},
{
"date": "2018-07-29T22:00:00.000+00:00",
"number": "26",
"summary": "New remediations available"
},
{
"date": "2018-08-01T22:00:00.000+00:00",
"number": "27",
"summary": "New remediations available"
},
{
"date": "2018-08-06T22:00:00.000+00:00",
"number": "28",
"summary": "New remediations available"
},
{
"date": "2018-08-09T22:00:00.000+00:00",
"number": "29",
"summary": "New remediations available"
},
{
"date": "2018-08-14T22:00:00.000+00:00",
"number": "30",
"summary": "New remediations available"
},
{
"date": "2018-08-14T22:00:00.000+00:00",
"number": "31",
"summary": "New remediations available"
},
{
"date": "2018-08-15T22:00:00.000+00:00",
"number": "32",
"summary": "New remediations available"
},
{
"date": "2018-08-16T22:00:00.000+00:00",
"number": "33",
"summary": "New remediations available"
},
{
"date": "2018-08-16T22:00:00.000+00:00",
"number": "34",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-08-16T22:00:00.000+00:00",
"number": "35",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-08-27T22:00:00.000+00:00",
"number": "36",
"summary": "Added references"
},
{
"date": "2018-09-06T22:00:00.000+00:00",
"number": "37",
"summary": "New remediations available"
},
{
"date": "2018-09-10T22:00:00.000+00:00",
"number": "38",
"summary": "New remediations available"
},
{
"date": "2018-10-01T22:00:00.000+00:00",
"number": "39",
"summary": "New remediations available"
},
{
"date": "2018-10-04T22:00:00.000+00:00",
"number": "40",
"summary": "New remediations available"
},
{
"date": "2018-10-09T22:00:00.000+00:00",
"number": "41",
"summary": "New remediations available"
},
{
"date": "2018-10-10T22:00:00.000+00:00",
"number": "42",
"summary": "New remediations available"
},
{
"date": "2018-10-14T22:00:00.000+00:00",
"number": "43",
"summary": "New remediations available"
},
{
"date": "2018-10-30T23:00:00.000+00:00",
"number": "44",
"summary": "New remediations available"
},
{
"date": "2018-10-31T23:00:00.000+00:00",
"number": "45",
"summary": "New remediations available"
},
{
"date": "2018-11-05T23:00:00.000+00:00",
"number": "46",
"summary": "New remediations available"
},
{
"date": "2018-11-07T23:00:00.000+00:00",
"number": "47",
"summary": "New remediations available"
},
{
"date": "2018-11-08T23:00:00.000+00:00",
"number": "48",
"summary": "New remediations available"
},
{
"date": "2018-11-20T23:00:00.000+00:00",
"number": "49",
"summary": "New remediations available"
},
{
"date": "2018-11-28T23:00:00.000+00:00",
"number": "50",
"summary": "New remediations available"
},
{
"date": "2018-12-02T23:00:00.000+00:00",
"number": "51",
"summary": "New remediations available"
},
{
"date": "2018-12-03T23:00:00.000+00:00",
"number": "52",
"summary": "Minor corrections"
},
{
"date": "2018-12-09T23:00:00.000+00:00",
"number": "53",
"summary": "New remediations available"
},
{
"date": "2018-12-11T23:00:00.000+00:00",
"number": "54",
"summary": "New remediations available"
},
{
"date": "2018-12-12T23:00:00.000+00:00",
"number": "55",
"summary": "New remediations available"
},
{
"date": "2019-01-03T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-01-06T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-01-15T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-02-04T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-03-17T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-03-25T23:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-03-31T22:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-05-05T22:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2019-05-15T22:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-06-17T22:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-08-06T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-08-11T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-13T22:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-09-23T22:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-09-24T22:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-10-21T22:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-10-22T22:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-12-09T23:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-12-09T23:00:00.000+00:00",
"number": "74",
"summary": "Version nicht vorhanden"
},
{
"date": "2020-01-06T23:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2020-01-07T23:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-04-01T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2020-06-09T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-06-11T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-06-18T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-06-25T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-08-06T22:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-08-12T22:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2020-09-01T22:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2020-09-03T22:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-09-06T22:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-08-29T22:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-10-10T22:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-10-11T22:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2022-05-10T22:00:00.000+00:00",
"number": "90",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-07-03T22:00:00.000+00:00",
"number": "91",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2022-11-01T23:00:00.000+00:00",
"number": "92",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-04-16T22:00:00.000+00:00",
"number": "93",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-04-18T22:00:00.000+00:00",
"number": "94",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-04-24T22:00:00.000+00:00",
"number": "95",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-05-18T22:00:00.000+00:00",
"number": "96",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-08T22:00:00.000+00:00",
"number": "97",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "98",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-10T22:00:00.000+00:00",
"number": "99",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-14T22:00:00.000+00:00",
"number": "100",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "100"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Application Enablement Services",
"product": {
"name": "Avaya Aura Application Enablement Services",
"product_id": "T015516",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_application_enablement_services:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Communication Manager",
"product": {
"name": "Avaya Aura Communication Manager",
"product_id": "T015126",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:communication_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Experience Portal",
"product": {
"name": "Avaya Aura Experience Portal",
"product_id": "T015519",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_experience_portal:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Session Manager",
"product": {
"name": "Avaya Aura Session Manager",
"product_id": "T015127",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:session_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura System Manager",
"product": {
"name": "Avaya Aura System Manager",
"product_id": "T015518",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_system_manager:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "6368",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7",
"product": {
"name": "Oracle Linux 7",
"product_id": "287065",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:7"
}
}
},
{
"category": "product_version",
"name": "6",
"product": {
"name": "Oracle Linux 6",
"product_id": "T002988",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:6"
}
}
},
{
"category": "product_version",
"name": "5",
"product": {
"name": "Oracle Linux 5",
"product_id": "T003616",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:5"
}
}
},
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
},
{
"category": "product_name",
"name": "Oracle VM",
"product": {
"name": "Oracle VM",
"product_id": "T011119",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-9016",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2015-9016"
},
{
"cve": "CVE-2017-0861",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-0861"
},
{
"cve": "CVE-2017-13166",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-13166"
},
{
"cve": "CVE-2017-13220",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-13220"
},
{
"cve": "CVE-2017-16526",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-16526"
},
{
"cve": "CVE-2017-16911",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-16911"
},
{
"cve": "CVE-2017-16912",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-16912"
},
{
"cve": "CVE-2017-16913",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-16913"
},
{
"cve": "CVE-2017-16914",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-16914"
},
{
"cve": "CVE-2017-17975",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-17975"
},
{
"cve": "CVE-2017-18017",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-18017"
},
{
"cve": "CVE-2017-18193",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-18193"
},
{
"cve": "CVE-2017-18203",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-18203"
},
{
"cve": "CVE-2017-18216",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-18216"
},
{
"cve": "CVE-2017-18218",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-18218"
},
{
"cve": "CVE-2017-18222",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-18222"
},
{
"cve": "CVE-2017-18224",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-18224"
},
{
"cve": "CVE-2017-18232",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-18232"
},
{
"cve": "CVE-2017-18241",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-18241"
},
{
"cve": "CVE-2017-18257",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-18257"
},
{
"cve": "CVE-2017-5715",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2018-1000004",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-1000199",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-1000199"
},
{
"cve": "CVE-2018-10323",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-10323"
},
{
"cve": "CVE-2018-1065",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-1065"
},
{
"cve": "CVE-2018-1066",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-1066"
},
{
"cve": "CVE-2018-1068",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-1068"
},
{
"cve": "CVE-2018-1092",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-1092"
},
{
"cve": "CVE-2018-1093",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-1093"
},
{
"cve": "CVE-2018-1108",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-1108"
},
{
"cve": "CVE-2018-5332",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-5332"
},
{
"cve": "CVE-2018-5333",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-5333"
},
{
"cve": "CVE-2018-5750",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-5750"
},
{
"cve": "CVE-2018-5803",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-5803"
},
{
"cve": "CVE-2018-6927",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-6927"
},
{
"cve": "CVE-2018-7480",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-7480"
},
{
"cve": "CVE-2018-7492",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-7492"
},
{
"cve": "CVE-2018-7566",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-7566"
},
{
"cve": "CVE-2018-7740",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-7740"
},
{
"cve": "CVE-2018-7757",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-7757"
},
{
"cve": "CVE-2018-7995",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-7995"
},
{
"cve": "CVE-2018-8087",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-8087"
},
{
"cve": "CVE-2018-8781",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-8781"
},
{
"cve": "CVE-2018-8822",
"product_status": {
"known_affected": [
"T011119",
"T015519",
"T015518",
"67646",
"T015516",
"6368",
"T015127",
"T015126",
"T002988",
"T003616",
"T004914",
"2951",
"T002207",
"T000126",
"287065"
]
},
"release_date": "2018-05-01T22:00:00.000+00:00",
"title": "CVE-2018-8822"
}
]
}
GSD-2017-5715
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2017-5715",
"description": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"id": "GSD-2017-5715",
"references": [
"https://www.suse.com/security/cve/CVE-2017-5715.html",
"https://www.debian.org/security/2018/dsa-4213",
"https://www.debian.org/security/2018/dsa-4188",
"https://www.debian.org/security/2018/dsa-4187",
"https://www.debian.org/security/2018/dsa-4120",
"https://access.redhat.com/errata/RHSA-2018:1967",
"https://access.redhat.com/errata/RHSA-2018:1346",
"https://access.redhat.com/errata/RHSA-2018:1319",
"https://access.redhat.com/errata/RHSA-2018:1252",
"https://access.redhat.com/errata/RHSA-2018:1216",
"https://access.redhat.com/errata/RHSA-2018:1196",
"https://access.redhat.com/errata/RHSA-2018:1130",
"https://access.redhat.com/errata/RHSA-2018:1129",
"https://access.redhat.com/errata/RHSA-2018:1062",
"https://access.redhat.com/errata/RHBA-2018:0042",
"https://access.redhat.com/errata/RHSA-2018:0022",
"https://access.redhat.com/errata/RHSA-2018:0021",
"https://access.redhat.com/errata/RHSA-2018:0020",
"https://access.redhat.com/errata/RHSA-2018:0018",
"https://access.redhat.com/errata/RHSA-2018:0017",
"https://access.redhat.com/errata/RHSA-2018:0016",
"https://ubuntu.com/security/CVE-2017-5715",
"https://advisories.mageia.org/CVE-2017-5715.html",
"https://security.archlinux.org/CVE-2017-5715",
"https://alas.aws.amazon.com/cve/html/CVE-2017-5715.html",
"https://linux.oracle.com/cve/CVE-2017-5715.html",
"https://packetstormsecurity.com/files/cve/CVE-2017-5715"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-5715"
],
"details": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"id": "GSD-2017-5715",
"modified": "2023-12-13T01:21:13.941071Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2018-01-03T00:00:00",
"ID": "CVE-2017-5715",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microprocessors with Speculative Execution",
"version": {
"version_data": [
{
"version_value": "All"
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
},
{
"name": "USN-3560-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3560-1/"
},
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"name": "DSA-4187",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4187"
},
{
"name": "USN-3542-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3542-2/"
},
{
"name": "GLSA-201810-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201810-06"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name": "USN-3540-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3540-2/"
},
{
"name": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"name": "USN-3597-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3597-1/"
},
{
"name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"name": "SUSE-SU-2018:0012",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
},
{
"name": "SUSE-SU-2018:0011",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
},
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
},
{
"name": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
"refsource": "MISC",
"url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
},
{
"name": "DSA-4213",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4213"
},
{
"name": "https://cert.vde.com/en-us/advisories/vde-2018-002",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
},
{
"name": "DSA-4120",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4120"
},
{
"name": "openSUSE-SU-2018:0013",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"
},
{
"name": "USN-3580-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3580-1/"
},
{
"name": "https://support.f5.com/csp/article/K91229003",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K91229003"
},
{
"name": "USN-3531-3",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3531-3/"
},
{
"name": "USN-3620-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3620-2/"
},
{
"name": "openSUSE-SU-2018:0022",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
},
{
"name": "USN-3582-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3582-1/"
},
{
"name": "DSA-4188",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4188"
},
{
"name": "RHSA-2018:0292",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
},
{
"name": "http://xenbits.xen.org/xsa/advisory-254.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-254.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180104-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
},
{
"name": "SUSE-SU-2018:0019",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"
},
{
"name": "https://www.synology.com/support/security/Synology_SA_18_01",
"refsource": "CONFIRM",
"url": "https://www.synology.com/support/security/Synology_SA_18_01"
},
{
"name": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
},
{
"name": "102376",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102376"
},
{
"name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
"refsource": "CONFIRM",
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"name": "USN-3594-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3594-1/"
},
{
"name": "VU#584653",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/584653"
},
{
"name": "VU#180049",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"name": "https://cert.vde.com/en-us/advisories/vde-2018-003",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"name": "SUSE-SU-2018:0009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"
},
{
"name": "USN-3690-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3690-1/"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
},
{
"name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
"refsource": "CONFIRM",
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us"
},
{
"name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html",
"refsource": "CONFIRM",
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"
},
{
"name": "USN-3549-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3549-1/"
},
{
"name": "SUSE-SU-2018:0007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"
},
{
"name": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
"refsource": "CONFIRM",
"url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
},
{
"name": "https://support.citrix.com/article/CTX231399",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX231399"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name": "https://spectreattack.com/",
"refsource": "MISC",
"url": "https://spectreattack.com/"
},
{
"name": "USN-3531-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3531-1/"
},
{
"name": "FreeBSD-SA-18:03",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
},
{
"name": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
"refsource": "CONFIRM",
"url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
},
{
"name": "SUSE-SU-2018:0006",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"
},
{
"name": "USN-3581-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3581-1/"
},
{
"name": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
"refsource": "CONFIRM",
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
},
{
"name": "1040071",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040071"
},
{
"name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr",
"refsource": "CONFIRM",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr"
},
{
"name": "USN-3597-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3597-2/"
},
{
"name": "USN-3581-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3581-2/"
},
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
},
{
"name": "SUSE-SU-2018:0010",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
},
{
"name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
},
{
"name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"name": "USN-3516-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/usn/usn-3516-1/"
},
{
"name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
"refsource": "CONFIRM",
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
},
{
"name": "43427",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43427/"
},
{
"name": "SUSE-SU-2018:0020",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"
},
{
"name": "USN-3541-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3541-2/"
},
{
"name": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"refsource": "MISC",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"name": "https://support.lenovo.com/us/en/solutions/LEN-18282",
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
},
{
"name": "USN-3777-3",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"name": "openSUSE-SU-2018:0023",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
},
{
"name": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html",
"refsource": "CONFIRM",
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
},
{
"name": "SUSE-SU-2018:0008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"
},
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
},
{
"name": "USN-3561-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3561-1/"
},
{
"name": "USN-3582-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3582-2/"
},
{
"name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Jun/36"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"refsource": "MISC",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"name": "FreeBSD-SA-19:26",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"name": "20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Nov/16"
},
{
"name": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-5715",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2017-5715"
},
{
"name": "[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"
},
{
"name": "[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_firmware:2010:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_firmware:2010:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_firmware:2010:sp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_winac_rtx_\\(f\\)_2010:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.1.32",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.2.6",
"versionStartIncluding": "5.2.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2017-5715"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.synology.com/support/security/Synology_SA_18_01",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_01"
},
{
"name": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
},
{
"name": "https://support.lenovo.com/us/en/solutions/LEN-18282",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
},
{
"name": "https://support.f5.com/csp/article/K91229003",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K91229003"
},
{
"name": "https://spectreattack.com/",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://spectreattack.com/"
},
{
"name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr"
},
{
"name": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"name": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"name": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
},
{
"name": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
},
{
"name": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"name": "http://xenbits.xen.org/xsa/advisory-254.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://xenbits.xen.org/xsa/advisory-254.html"
},
{
"name": "1040071",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040071"
},
{
"name": "VU#584653",
"refsource": "CERT-VN",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/584653"
},
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
},
{
"name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
},
{
"name": "43427",
"refsource": "EXPLOIT-DB",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/43427/"
},
{
"name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
"refsource": "CISCO",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"name": "https://support.citrix.com/article/CTX231399",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.citrix.com/article/CTX231399"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180104-0001/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
},
{
"name": "102376",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/102376"
},
{
"name": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
},
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
},
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
},
{
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
},
{
"name": "openSUSE-SU-2018:0023",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
},
{
"name": "openSUSE-SU-2018:0022",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
},
{
"name": "SUSE-SU-2018:0020",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"
},
{
"name": "SUSE-SU-2018:0019",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"
},
{
"name": "openSUSE-SU-2018:0013",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"
},
{
"name": "SUSE-SU-2018:0012",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
},
{
"name": "SUSE-SU-2018:0011",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
},
{
"name": "SUSE-SU-2018:0010",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
},
{
"name": "SUSE-SU-2018:0009",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"
},
{
"name": "SUSE-SU-2018:0008",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"
},
{
"name": "SUSE-SU-2018:0007",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"
},
{
"name": "SUSE-SU-2018:0006",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"
},
{
"name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
},
{
"name": "USN-3516-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/usn/usn-3516-1/"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name": "RHSA-2018:0292",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
},
{
"name": "DSA-4120",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4120"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
},
{
"name": "FreeBSD-SA-18:03",
"refsource": "FREEBSD",
"tags": [
"Third Party Advisory"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
},
{
"name": "USN-3597-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3597-2/"
},
{
"name": "USN-3597-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3597-1/"
},
{
"name": "USN-3594-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3594-1/"
},
{
"name": "USN-3582-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3582-2/"
},
{
"name": "USN-3582-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3582-1/"
},
{
"name": "USN-3581-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3581-2/"
},
{
"name": "USN-3581-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3581-1/"
},
{
"name": "USN-3580-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3580-1/"
},
{
"name": "USN-3561-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3561-1/"
},
{
"name": "USN-3560-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3560-1/"
},
{
"name": "USN-3549-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3549-1/"
},
{
"name": "USN-3531-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3531-1/"
},
{
"name": "USN-3542-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3542-2/"
},
{
"name": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
},
{
"name": "USN-3541-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3541-2/"
},
{
"name": "USN-3540-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3540-2/"
},
{
"name": "USN-3531-3",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3531-3/"
},
{
"name": "USN-3620-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3620-2/"
},
{
"name": "DSA-4188",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4188"
},
{
"name": "DSA-4187",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4187"
},
{
"name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
},
{
"name": "https://cert.vde.com/en-us/advisories/vde-2018-003",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
},
{
"name": "https://cert.vde.com/en-us/advisories/vde-2018-002",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
},
{
"name": "VU#180049",
"refsource": "CERT-VN",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"name": "DSA-4213",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4213"
},
{
"name": "USN-3690-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3690-1/"
},
{
"name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us"
},
{
"name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name": "USN-3777-3",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
},
{
"name": "GLSA-201810-06",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201810-06"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update",
"refsource": "BUGTRAQ",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Jun/36"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"name": "FreeBSD-SA-19:26",
"refsource": "FREEBSD",
"tags": [
"Third Party Advisory"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"name": "20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu",
"refsource": "BUGTRAQ",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Nov/16"
},
{
"name": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2017-5715",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.paloaltonetworks.com/CVE-2017-5715"
},
{
"name": "[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"
},
{
"name": "[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.1,
"impactScore": 4.0
}
},
"lastModifiedDate": "2021-08-16T09:15Z",
"publishedDate": "2018-01-04T13:29Z"
}
}
}
FKIE_CVE-2017-5715
Vulnerability from fkie_nvd - Published: 2018-01-04 13:29 - Updated: 2025-05-06 15:155.6 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html | Broken Link | |
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html | Broken Link | |
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html | Broken Link | |
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html | Broken Link | |
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html | Broken Link | |
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html | Broken Link | |
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html | Broken Link | |
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html | Broken Link | |
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html | Broken Link | |
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html | Broken Link | |
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html | Broken Link | |
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html | Broken Link | |
| secure@intel.com | http://nvidia.custhelp.com/app/answers/detail/a_id/4609 | Third Party Advisory | |
| secure@intel.com | http://nvidia.custhelp.com/app/answers/detail/a_id/4611 | Third Party Advisory | |
| secure@intel.com | http://nvidia.custhelp.com/app/answers/detail/a_id/4613 | Third Party Advisory | |
| secure@intel.com | http://nvidia.custhelp.com/app/answers/detail/a_id/4614 | Third Party Advisory | |
| secure@intel.com | http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html | Exploit, Third Party Advisory, VDB Entry | |
| secure@intel.com | http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html | Third Party Advisory, VDB Entry | |
| secure@intel.com | http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt | Third Party Advisory | |
| secure@intel.com | http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt | Third Party Advisory | |
| secure@intel.com | http://www.kb.cert.org/vuls/id/584653 | Third Party Advisory, US Government Resource | |
| secure@intel.com | http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html | Third Party Advisory | |
| secure@intel.com | http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html | Third Party Advisory | |
| secure@intel.com | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | Third Party Advisory | |
| secure@intel.com | http://www.securityfocus.com/bid/102376 | Third Party Advisory, VDB Entry | |
| secure@intel.com | http://www.securitytracker.com/id/1040071 | Third Party Advisory, VDB Entry | |
| secure@intel.com | http://xenbits.xen.org/xsa/advisory-254.html | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:0292 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/security/vulnerabilities/speculativeexecution | Third Party Advisory | |
| secure@intel.com | https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ | Third Party Advisory | |
| secure@intel.com | https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ | Third Party Advisory | |
| secure@intel.com | https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf | Third Party Advisory | |
| secure@intel.com | https://cert.vde.com/en-us/advisories/vde-2018-002 | Third Party Advisory | |
| secure@intel.com | https://cert.vde.com/en-us/advisories/vde-2018-003 | Third Party Advisory | |
| secure@intel.com | https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability | Third Party Advisory | |
| secure@intel.com | https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html | Third Party Advisory | |
| secure@intel.com | https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes | Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html | ||
| secure@intel.com | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 | Patch, Third Party Advisory, Vendor Advisory | |
| secure@intel.com | https://seclists.org/bugtraq/2019/Jun/36 | Issue Tracking, Mailing List, Third Party Advisory | |
| secure@intel.com | https://seclists.org/bugtraq/2019/Nov/16 | Issue Tracking, Mailing List, Third Party Advisory | |
| secure@intel.com | https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr | Vendor Advisory | |
| secure@intel.com | https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc | Third Party Advisory | |
| secure@intel.com | https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc | Third Party Advisory | |
| secure@intel.com | https://security.gentoo.org/glsa/201810-06 | Third Party Advisory | |
| secure@intel.com | https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html | Third Party Advisory | |
| secure@intel.com | https://security.netapp.com/advisory/ntap-20180104-0001/ | Third Party Advisory | |
| secure@intel.com | https://security.paloaltonetworks.com/CVE-2017-5715 | Third Party Advisory | |
| secure@intel.com | https://spectreattack.com/ | Third Party Advisory | |
| secure@intel.com | https://support.citrix.com/article/CTX231399 | Third Party Advisory | |
| secure@intel.com | https://support.f5.com/csp/article/K91229003 | Third Party Advisory | |
| secure@intel.com | https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us | Third Party Advisory | |
| secure@intel.com | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us | Third Party Advisory | |
| secure@intel.com | https://support.lenovo.com/us/en/solutions/LEN-18282 | Third Party Advisory | |
| secure@intel.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3531-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3531-3/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3540-2/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3541-2/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3542-2/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3549-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3560-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3561-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3580-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3581-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3581-2/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3582-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3582-2/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3594-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3597-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3597-2/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3620-2/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3690-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3777-3/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/usn/usn-3516-1/ | Third Party Advisory | |
| secure@intel.com | https://www.debian.org/security/2018/dsa-4120 | Third Party Advisory | |
| secure@intel.com | https://www.debian.org/security/2018/dsa-4187 | Third Party Advisory | |
| secure@intel.com | https://www.debian.org/security/2018/dsa-4188 | Third Party Advisory | |
| secure@intel.com | https://www.debian.org/security/2018/dsa-4213 | Third Party Advisory | |
| secure@intel.com | https://www.exploit-db.com/exploits/43427/ | Exploit, Third Party Advisory, VDB Entry | |
| secure@intel.com | https://www.kb.cert.org/vuls/id/180049 | Third Party Advisory, US Government Resource | |
| secure@intel.com | https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 | Third Party Advisory | |
| secure@intel.com | https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | Third Party Advisory | |
| secure@intel.com | https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ | Third Party Advisory | |
| secure@intel.com | https://www.synology.com/support/security/Synology_SA_18_01 | Third Party Advisory | |
| secure@intel.com | https://www.vmware.com/security/advisories/VMSA-2018-0007.html | Third Party Advisory | |
| secure@intel.com | https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html | Third Party Advisory | |
| secure@intel.com | https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://nvidia.custhelp.com/app/answers/detail/a_id/4609 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://nvidia.custhelp.com/app/answers/detail/a_id/4611 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://nvidia.custhelp.com/app/answers/detail/a_id/4613 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://nvidia.custhelp.com/app/answers/detail/a_id/4614 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/584653 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102376 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040071 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://xenbits.xen.org/xsa/advisory-254.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:0292 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/vulnerabilities/speculativeexecution | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en-us/advisories/vde-2018-002 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en-us/advisories/vde-2018-003 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 | Patch, Third Party Advisory, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Jun/36 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Nov/16 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201810-06 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180104-0001/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.paloaltonetworks.com/CVE-2017-5715 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://spectreattack.com/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX231399 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K91229003 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.lenovo.com/us/en/solutions/LEN-18282 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3531-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3531-3/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3540-2/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3541-2/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3542-2/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3549-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3560-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3561-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3580-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3581-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3581-2/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3582-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3582-2/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3594-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3597-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3597-2/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3620-2/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3690-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3777-3/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/usn/usn-3516-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4120 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4187 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4188 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4213 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/43427/ | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/180049 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.synology.com/support/security/Synology_SA_18_01 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0007.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| intel | atom_c | c2308 | |
| intel | atom_c | c2316 | |
| intel | atom_c | c2338 | |
| intel | atom_c | c2350 | |
| intel | atom_c | c2358 | |
| intel | atom_c | c2508 | |
| intel | atom_c | c2516 | |
| intel | atom_c | c2518 | |
| intel | atom_c | c2530 | |
| intel | atom_c | c2538 | |
| intel | atom_c | c2550 | |
| intel | atom_c | c2558 | |
| intel | atom_c | c2718 | |
| intel | atom_c | c2730 | |
| intel | atom_c | c2738 | |
| intel | atom_c | c2750 | |
| intel | atom_c | c2758 | |
| intel | atom_c | c3308 | |
| intel | atom_c | c3338 | |
| intel | atom_c | c3508 | |
| intel | atom_c | c3538 | |
| intel | atom_c | c3558 | |
| intel | atom_c | c3708 | |
| intel | atom_c | c3750 | |
| intel | atom_c | c3758 | |
| intel | atom_c | c3808 | |
| intel | atom_c | c3830 | |
| intel | atom_c | c3850 | |
| intel | atom_c | c3858 | |
| intel | atom_c | c3950 | |
| intel | atom_c | c3955 | |
| intel | atom_c | c3958 | |
| intel | atom_e | e3805 | |
| intel | atom_e | e3815 | |
| intel | atom_e | e3825 | |
| intel | atom_e | e3826 | |
| intel | atom_e | e3827 | |
| intel | atom_e | e3845 | |
| intel | atom_x3 | c3130 | |
| intel | atom_x3 | c3200rk | |
| intel | atom_x3 | c3205rk | |
| intel | atom_x3 | c3230rk | |
| intel | atom_x3 | c3235rk | |
| intel | atom_x3 | c3265rk | |
| intel | atom_x3 | c3295rk | |
| intel | atom_x3 | c3405 | |
| intel | atom_x3 | c3445 | |
| intel | atom_x5-e3930 | - | |
| intel | atom_x5-e3940 | - | |
| intel | atom_x7-e3950 | - | |
| intel | atom_z | z2420 | |
| intel | atom_z | z2460 | |
| intel | atom_z | z2480 | |
| intel | atom_z | z2520 | |
| intel | atom_z | z2560 | |
| intel | atom_z | z2580 | |
| intel | atom_z | z2760 | |
| intel | atom_z | z3460 | |
| intel | atom_z | z3480 | |
| intel | atom_z | z3530 | |
| intel | atom_z | z3560 | |
| intel | atom_z | z3570 | |
| intel | atom_z | z3580 | |
| intel | atom_z | z3590 | |
| intel | atom_z | z3735d | |
| intel | atom_z | z3735e | |
| intel | atom_z | z3735f | |
| intel | atom_z | z3735g | |
| intel | atom_z | z3736f | |
| intel | atom_z | z3736g | |
| intel | atom_z | z3740 | |
| intel | atom_z | z3740d | |
| intel | atom_z | z3745 | |
| intel | atom_z | z3745d | |
| intel | atom_z | z3770 | |
| intel | atom_z | z3770d | |
| intel | atom_z | z3775 | |
| intel | atom_z | z3775d | |
| intel | atom_z | z3785 | |
| intel | atom_z | z3795 | |
| intel | celeron_j | j1750 | |
| intel | celeron_j | j1800 | |
| intel | celeron_j | j1850 | |
| intel | celeron_j | j1900 | |
| intel | celeron_j | j3060 | |
| intel | celeron_j | j3160 | |
| intel | celeron_j | j3355 | |
| intel | celeron_j | j3455 | |
| intel | celeron_j | j4005 | |
| intel | celeron_j | j4105 | |
| intel | celeron_n | n2805 | |
| intel | celeron_n | n2806 | |
| intel | celeron_n | n2807 | |
| intel | celeron_n | n2808 | |
| intel | celeron_n | n2810 | |
| intel | celeron_n | n2815 | |
| intel | celeron_n | n2820 | |
| intel | celeron_n | n2830 | |
| intel | celeron_n | n2840 | |
| intel | celeron_n | n2910 | |
| intel | celeron_n | n2920 | |
| intel | celeron_n | n2930 | |
| intel | celeron_n | n2940 | |
| intel | celeron_n | n3000 | |
| intel | celeron_n | n3010 | |
| intel | celeron_n | n3050 | |
| intel | celeron_n | n3060 | |
| intel | celeron_n | n3150 | |
| intel | celeron_n | n3160 | |
| intel | celeron_n | n3350 | |
| intel | celeron_n | n3450 | |
| intel | celeron_n | n4000 | |
| intel | celeron_n | n4100 | |
| intel | core_i3 | 330e | |
| intel | core_i3 | 330m | |
| intel | core_i3 | 330um | |
| intel | core_i3 | 350m | |
| intel | core_i3 | 370m | |
| intel | core_i3 | 380m | |
| intel | core_i3 | 380um | |
| intel | core_i3 | 390m | |
| intel | core_i3 | 530 | |
| intel | core_i3 | 540 | |
| intel | core_i3 | 550 | |
| intel | core_i3 | 560 | |
| intel | core_i3 | 2100 | |
| intel | core_i3 | 2100t | |
| intel | core_i3 | 2102 | |
| intel | core_i3 | 2105 | |
| intel | core_i3 | 2115c | |
| intel | core_i3 | 2120 | |
| intel | core_i3 | 2120t | |
| intel | core_i3 | 2125 | |
| intel | core_i3 | 2130 | |
| intel | core_i3 | 2310e | |
| intel | core_i3 | 2310m | |
| intel | core_i3 | 2312m | |
| intel | core_i3 | 2328m | |
| intel | core_i3 | 2330e | |
| intel | core_i3 | 2330m | |
| intel | core_i3 | 2340ue | |
| intel | core_i3 | 2348m | |
| intel | core_i3 | 2350m | |
| intel | core_i3 | 2357m | |
| intel | core_i3 | 2365m | |
| intel | core_i3 | 2367m | |
| intel | core_i3 | 2370m | |
| intel | core_i3 | 2375m | |
| intel | core_i3 | 2377m | |
| intel | core_i3 | 3110m | |
| intel | core_i3 | 3115c | |
| intel | core_i3 | 3120m | |
| intel | core_i3 | 3120me | |
| intel | core_i3 | 3130m | |
| intel | core_i3 | 3210 | |
| intel | core_i3 | 3217u | |
| intel | core_i3 | 3217ue | |
| intel | core_i3 | 3220 | |
| intel | core_i3 | 3220t | |
| intel | core_i3 | 3225 | |
| intel | core_i3 | 3227u | |
| intel | core_i3 | 3229y | |
| intel | core_i3 | 3240 | |
| intel | core_i3 | 3240t | |
| intel | core_i3 | 3245 | |
| intel | core_i3 | 3250 | |
| intel | core_i3 | 3250t | |
| intel | core_i3 | 4000m | |
| intel | core_i3 | 4005u | |
| intel | core_i3 | 4010u | |
| intel | core_i3 | 4010y | |
| intel | core_i3 | 4012y | |
| intel | core_i3 | 4020y | |
| intel | core_i3 | 4025u | |
| intel | core_i3 | 4030u | |
| intel | core_i3 | 4030y | |
| intel | core_i3 | 4100e | |
| intel | core_i3 | 4100m | |
| intel | core_i3 | 4100u | |
| intel | core_i3 | 4102e | |
| intel | core_i3 | 4110e | |
| intel | core_i3 | 4110m | |
| intel | core_i3 | 4112e | |
| intel | core_i3 | 4120u | |
| intel | core_i3 | 4130 | |
| intel | core_i3 | 4130t | |
| intel | core_i3 | 4150 | |
| intel | core_i3 | 4150t | |
| intel | core_i3 | 4158u | |
| intel | core_i3 | 4160 | |
| intel | core_i3 | 4160t | |
| intel | core_i3 | 4170 | |
| intel | core_i3 | 4170t | |
| intel | core_i3 | 4330 | |
| intel | core_i3 | 4330t | |
| intel | core_i3 | 4330te | |
| intel | core_i3 | 4340 | |
| intel | core_i3 | 4340te | |
| intel | core_i3 | 4350 | |
| intel | core_i3 | 4350t | |
| intel | core_i3 | 4360 | |
| intel | core_i3 | 4360t | |
| intel | core_i3 | 4370 | |
| intel | core_i3 | 4370t | |
| intel | core_i3 | 5005u | |
| intel | core_i3 | 5010u | |
| intel | core_i3 | 5015u | |
| intel | core_i3 | 5020u | |
| intel | core_i3 | 5157u | |
| intel | core_i3 | 6006u | |
| intel | core_i3 | 6098p | |
| intel | core_i3 | 6100 | |
| intel | core_i3 | 6100e | |
| intel | core_i3 | 6100h | |
| intel | core_i3 | 6100t | |
| intel | core_i3 | 6100te | |
| intel | core_i3 | 6100u | |
| intel | core_i3 | 6102e | |
| intel | core_i3 | 6157u | |
| intel | core_i3 | 6167u | |
| intel | core_i3 | 6300 | |
| intel | core_i3 | 6300t | |
| intel | core_i3 | 6320 | |
| intel | core_i3 | 8100 | |
| intel | core_i3 | 8350k | |
| intel | core_i5 | 430m | |
| intel | core_i5 | 430um | |
| intel | core_i5 | 450m | |
| intel | core_i5 | 460m | |
| intel | core_i5 | 470um | |
| intel | core_i5 | 480m | |
| intel | core_i5 | 520e | |
| intel | core_i5 | 520m | |
| intel | core_i5 | 520um | |
| intel | core_i5 | 540m | |
| intel | core_i5 | 540um | |
| intel | core_i5 | 560m | |
| intel | core_i5 | 560um | |
| intel | core_i5 | 580m | |
| intel | core_i5 | 650 | |
| intel | core_i5 | 655k | |
| intel | core_i5 | 660 | |
| intel | core_i5 | 661 | |
| intel | core_i5 | 670 | |
| intel | core_i5 | 680 | |
| intel | core_i5 | 750 | |
| intel | core_i5 | 750s | |
| intel | core_i5 | 760 | |
| intel | core_i5 | 2300 | |
| intel | core_i5 | 2310 | |
| intel | core_i5 | 2320 | |
| intel | core_i5 | 2380p | |
| intel | core_i5 | 2390t | |
| intel | core_i5 | 2400 | |
| intel | core_i5 | 2400s | |
| intel | core_i5 | 2405s | |
| intel | core_i5 | 2410m | |
| intel | core_i5 | 2430m | |
| intel | core_i5 | 2435m | |
| intel | core_i5 | 2450m | |
| intel | core_i5 | 2450p | |
| intel | core_i5 | 2467m | |
| intel | core_i5 | 2500 | |
| intel | core_i5 | 2500k | |
| intel | core_i5 | 2500s | |
| intel | core_i5 | 2500t | |
| intel | core_i5 | 2510e | |
| intel | core_i5 | 2515e | |
| intel | core_i5 | 2520m | |
| intel | core_i5 | 2537m | |
| intel | core_i5 | 2540m | |
| intel | core_i5 | 2550k | |
| intel | core_i5 | 2557m | |
| intel | core_i5 | 3210m | |
| intel | core_i5 | 3230m | |
| intel | core_i5 | 3317u | |
| intel | core_i5 | 3320m | |
| intel | core_i5 | 3330 | |
| intel | core_i5 | 3330s | |
| intel | core_i5 | 3337u | |
| intel | core_i5 | 3339y | |
| intel | core_i5 | 3340 | |
| intel | core_i5 | 3340m | |
| intel | core_i5 | 3340s | |
| intel | core_i5 | 3350p | |
| intel | core_i5 | 3360m | |
| intel | core_i5 | 3380m | |
| intel | core_i5 | 3427u | |
| intel | core_i5 | 3437u | |
| intel | core_i5 | 3439y | |
| intel | core_i5 | 3450 | |
| intel | core_i5 | 3450s | |
| intel | core_i5 | 3470 | |
| intel | core_i5 | 3470s | |
| intel | core_i5 | 3470t | |
| intel | core_i5 | 3475s | |
| intel | core_i5 | 3550 | |
| intel | core_i5 | 3550s | |
| intel | core_i5 | 3570 | |
| intel | core_i5 | 3570k | |
| intel | core_i5 | 3570s | |
| intel | core_i5 | 3570t | |
| intel | core_i5 | 3610me | |
| intel | core_i5 | 4200h | |
| intel | core_i5 | 4200m | |
| intel | core_i5 | 4200u | |
| intel | core_i5 | 4200y | |
| intel | core_i5 | 4202y | |
| intel | core_i5 | 4210h | |
| intel | core_i5 | 4210m | |
| intel | core_i5 | 4210u | |
| intel | core_i5 | 4210y | |
| intel | core_i5 | 4220y | |
| intel | core_i5 | 4250u | |
| intel | core_i5 | 4258u | |
| intel | core_i5 | 4260u | |
| intel | core_i5 | 4278u | |
| intel | core_i5 | 4288u | |
| intel | core_i5 | 4300m | |
| intel | core_i5 | 4300u | |
| intel | core_i5 | 4300y | |
| intel | core_i5 | 4302y | |
| intel | core_i5 | 4308u | |
| intel | core_i5 | 4310m | |
| intel | core_i5 | 4310u | |
| intel | core_i5 | 4330m | |
| intel | core_i5 | 4340m | |
| intel | core_i5 | 4350u | |
| intel | core_i5 | 4360u | |
| intel | core_i5 | 4400e | |
| intel | core_i5 | 4402e | |
| intel | core_i5 | 4402ec | |
| intel | core_i5 | 4410e | |
| intel | core_i5 | 4422e | |
| intel | core_i5 | 4430 | |
| intel | core_i5 | 4430s | |
| intel | core_i5 | 4440 | |
| intel | core_i5 | 4440s | |
| intel | core_i5 | 4460 | |
| intel | core_i5 | 4460s | |
| intel | core_i5 | 4460t | |
| intel | core_i5 | 4570 | |
| intel | core_i5 | 4570r | |
| intel | core_i5 | 4570s | |
| intel | core_i5 | 4570t | |
| intel | core_i5 | 4570te | |
| intel | core_i5 | 4590 | |
| intel | core_i5 | 4590s | |
| intel | core_i5 | 4590t | |
| intel | core_i5 | 4670 | |
| intel | core_i5 | 4670k | |
| intel | core_i5 | 4670r | |
| intel | core_i5 | 4670s | |
| intel | core_i5 | 4670t | |
| intel | core_i5 | 4690 | |
| intel | core_i5 | 4690k | |
| intel | core_i5 | 4690s | |
| intel | core_i5 | 4690t | |
| intel | core_i5 | 5200u | |
| intel | core_i5 | 5250u | |
| intel | core_i5 | 5257u | |
| intel | core_i5 | 5287u | |
| intel | core_i5 | 5300u | |
| intel | core_i5 | 5350h | |
| intel | core_i5 | 5350u | |
| intel | core_i5 | 5575r | |
| intel | core_i5 | 5675c | |
| intel | core_i5 | 5675r | |
| intel | core_i5 | 6200u | |
| intel | core_i5 | 6260u | |
| intel | core_i5 | 6267u | |
| intel | core_i5 | 6287u | |
| intel | core_i5 | 6300hq | |
| intel | core_i5 | 6300u | |
| intel | core_i5 | 6350hq | |
| intel | core_i5 | 6360u | |
| intel | core_i5 | 6400 | |
| intel | core_i5 | 6400t | |
| intel | core_i5 | 6402p | |
| intel | core_i5 | 6440eq | |
| intel | core_i5 | 6440hq | |
| intel | core_i5 | 6442eq | |
| intel | core_i5 | 6500 | |
| intel | core_i5 | 6500t | |
| intel | core_i5 | 6500te | |
| intel | core_i5 | 6585r | |
| intel | core_i5 | 6600 | |
| intel | core_i5 | 6600k | |
| intel | core_i5 | 6600t | |
| intel | core_i5 | 6685r | |
| intel | core_i5 | 8250u | |
| intel | core_i5 | 8350u | |
| intel | core_i5 | 8400 | |
| intel | core_i5 | 8600k | |
| intel | core_i7 | 7y75 | |
| intel | core_i7 | 610e | |
| intel | core_i7 | 620le | |
| intel | core_i7 | 620lm | |
| intel | core_i7 | 620m | |
| intel | core_i7 | 620ue | |
| intel | core_i7 | 620um | |
| intel | core_i7 | 640lm | |
| intel | core_i7 | 640m | |
| intel | core_i7 | 640um | |
| intel | core_i7 | 660lm | |
| intel | core_i7 | 660ue | |
| intel | core_i7 | 660um | |
| intel | core_i7 | 680um | |
| intel | core_i7 | 720qm | |
| intel | core_i7 | 740qm | |
| intel | core_i7 | 820qm | |
| intel | core_i7 | 840qm | |
| intel | core_i7 | 860 | |
| intel | core_i7 | 860s | |
| intel | core_i7 | 870 | |
| intel | core_i7 | 870s | |
| intel | core_i7 | 875k | |
| intel | core_i7 | 880 | |
| intel | core_i7 | 920 | |
| intel | core_i7 | 920xm | |
| intel | core_i7 | 930 | |
| intel | core_i7 | 940 | |
| intel | core_i7 | 940xm | |
| intel | core_i7 | 950 | |
| intel | core_i7 | 960 | |
| intel | core_i7 | 965 | |
| intel | core_i7 | 970 | |
| intel | core_i7 | 975 | |
| intel | core_i7 | 980 | |
| intel | core_i7 | 980x | |
| intel | core_i7 | 990x | |
| intel | core_i7 | 2600 | |
| intel | core_i7 | 2600k | |
| intel | core_i7 | 2600s | |
| intel | core_i7 | 2610ue | |
| intel | core_i7 | 2617m | |
| intel | core_i7 | 2620m | |
| intel | core_i7 | 2629m | |
| intel | core_i7 | 2630qm | |
| intel | core_i7 | 2635qm | |
| intel | core_i7 | 2637m | |
| intel | core_i7 | 2640m | |
| intel | core_i7 | 2649m | |
| intel | core_i7 | 2655le | |
| intel | core_i7 | 2657m | |
| intel | core_i7 | 2670qm | |
| intel | core_i7 | 2675qm | |
| intel | core_i7 | 2677m | |
| intel | core_i7 | 2700k | |
| intel | core_i7 | 2710qe | |
| intel | core_i7 | 2715qe | |
| intel | core_i7 | 2720qm | |
| intel | core_i7 | 2760qm | |
| intel | core_i7 | 2820qm | |
| intel | core_i7 | 2860qm | |
| intel | core_i7 | 2920xm | |
| intel | core_i7 | 2960xm | |
| intel | core_i7 | 3517u | |
| intel | core_i7 | 3517ue | |
| intel | core_i7 | 3520m | |
| intel | core_i7 | 3537u | |
| intel | core_i7 | 3540m | |
| intel | core_i7 | 3555le | |
| intel | core_i7 | 3610qe | |
| intel | core_i7 | 3610qm | |
| intel | core_i7 | 3612qe | |
| intel | core_i7 | 3612qm | |
| intel | core_i7 | 3615qe | |
| intel | core_i7 | 3615qm | |
| intel | core_i7 | 3630qm | |
| intel | core_i7 | 3632qm | |
| intel | core_i7 | 3635qm | |
| intel | core_i7 | 3667u | |
| intel | core_i7 | 3687u | |
| intel | core_i7 | 3689y | |
| intel | core_i7 | 3720qm | |
| intel | core_i7 | 3740qm | |
| intel | core_i7 | 3770 | |
| intel | core_i7 | 3770k | |
| intel | core_i7 | 3770s | |
| intel | core_i7 | 3770t | |
| intel | core_i7 | 3820qm | |
| intel | core_i7 | 3840qm | |
| intel | core_i7 | 4500u | |
| intel | core_i7 | 4510u | |
| intel | core_i7 | 4550u | |
| intel | core_i7 | 4558u | |
| intel | core_i7 | 4578u | |
| intel | core_i7 | 4600m | |
| intel | core_i7 | 4600u | |
| intel | core_i7 | 4610m | |
| intel | core_i7 | 4610y | |
| intel | core_i7 | 4650u | |
| intel | core_i7 | 4700ec | |
| intel | core_i7 | 4700eq | |
| intel | core_i7 | 4700hq | |
| intel | core_i7 | 4700mq | |
| intel | core_i7 | 4702ec | |
| intel | core_i7 | 4702hq | |
| intel | core_i7 | 4702mq | |
| intel | core_i7 | 4710hq | |
| intel | core_i7 | 4710mq | |
| intel | core_i7 | 4712hq | |
| intel | core_i7 | 4712mq | |
| intel | core_i7 | 4720hq | |
| intel | core_i7 | 4722hq | |
| intel | core_i7 | 4750hq | |
| intel | core_i7 | 4760hq | |
| intel | core_i7 | 4765t | |
| intel | core_i7 | 4770 | |
| intel | core_i7 | 4770hq | |
| intel | core_i7 | 4770k | |
| intel | core_i7 | 4770r | |
| intel | core_i7 | 4770s | |
| intel | core_i7 | 4770t | |
| intel | core_i7 | 4770te | |
| intel | core_i7 | 4771 | |
| intel | core_i7 | 4785t | |
| intel | core_i7 | 4790 | |
| intel | core_i7 | 4790k | |
| intel | core_i7 | 4790s | |
| intel | core_i7 | 4790t | |
| intel | core_i7 | 4800mq | |
| intel | core_i7 | 4810mq | |
| intel | core_i7 | 4850hq | |
| intel | core_i7 | 4860hq | |
| intel | core_i7 | 4870hq | |
| intel | core_i7 | 4900mq | |
| intel | core_i7 | 4910mq | |
| intel | core_i7 | 4950hq | |
| intel | core_i7 | 4960hq | |
| intel | core_i7 | 4980hq | |
| intel | core_i7 | 5500u | |
| intel | core_i7 | 5550u | |
| intel | core_i7 | 5557u | |
| intel | core_i7 | 5600u | |
| intel | core_i7 | 5650u | |
| intel | core_i7 | 5700eq | |
| intel | core_i7 | 5700hq | |
| intel | core_i7 | 5750hq | |
| intel | core_i7 | 5775c | |
| intel | core_i7 | 5775r | |
| intel | core_i7 | 5850eq | |
| intel | core_i7 | 5850hq | |
| intel | core_i7 | 5950hq | |
| intel | core_i7 | 7500u | |
| intel | core_i7 | 7560u | |
| intel | core_i7 | 7567u | |
| intel | core_i7 | 7600u | |
| intel | core_i7 | 7660u | |
| intel | core_i7 | 7700 | |
| intel | core_i7 | 7700hq | |
| intel | core_i7 | 7700k | |
| intel | core_i7 | 7700t | |
| intel | core_i7 | 7820eq | |
| intel | core_i7 | 7820hk | |
| intel | core_i7 | 7820hq | |
| intel | core_i7 | 7920hq | |
| intel | core_i7 | 8550u | |
| intel | core_i7 | 8650u | |
| intel | core_i7 | 8700 | |
| intel | core_i7 | 8700k | |
| intel | core_m | 5y10 | |
| intel | core_m | 5y10a | |
| intel | core_m | 5y10c | |
| intel | core_m | 5y31 | |
| intel | core_m | 5y51 | |
| intel | core_m | 5y70 | |
| intel | core_m | 5y71 | |
| intel | core_m3 | 6y30 | |
| intel | core_m3 | 7y30 | |
| intel | core_m3 | 7y32 | |
| intel | core_m5 | 6y54 | |
| intel | core_m5 | 6y57 | |
| intel | core_m7 | 6y75 | |
| intel | pentium_j | j2850 | |
| intel | pentium_j | j2900 | |
| intel | pentium_j | j3710 | |
| intel | pentium_j | j4205 | |
| intel | pentium_n | n3510 | |
| intel | pentium_n | n3520 | |
| intel | pentium_n | n3530 | |
| intel | pentium_n | n3540 | |
| intel | pentium_n | n3700 | |
| intel | pentium_n | n3710 | |
| intel | pentium_n | n4200 | |
| intel | xeon | e5502 | |
| intel | xeon | e5503 | |
| intel | xeon | e5504 | |
| intel | xeon | e5506 | |
| intel | xeon | e5507 | |
| intel | xeon | e5520 | |
| intel | xeon | e5530 | |
| intel | xeon | e5540 | |
| intel | xeon | e5603 | |
| intel | xeon | e5606 | |
| intel | xeon | e5607 | |
| intel | xeon | e5620 | |
| intel | xeon | e5630 | |
| intel | xeon | e5640 | |
| intel | xeon | e5645 | |
| intel | xeon | e5649 | |
| intel | xeon | e6510 | |
| intel | xeon | e6540 | |
| intel | xeon | e7520 | |
| intel | xeon | e7530 | |
| intel | xeon | e7540 | |
| intel | xeon | ec5509 | |
| intel | xeon | ec5539 | |
| intel | xeon | ec5549 | |
| intel | xeon | l3406 | |
| intel | xeon | l3426 | |
| intel | xeon | l5506 | |
| intel | xeon | l5508 | |
| intel | xeon | l5518 | |
| intel | xeon | l5520 | |
| intel | xeon | l5530 | |
| intel | xeon | l5609 | |
| intel | xeon | l5618 | |
| intel | xeon | l5630 | |
| intel | xeon | l5638 | |
| intel | xeon | l5640 | |
| intel | xeon | l7545 | |
| intel | xeon | l7555 | |
| intel | xeon | lc5518 | |
| intel | xeon | lc5528 | |
| intel | xeon | w3670 | |
| intel | xeon | w3680 | |
| intel | xeon | w3690 | |
| intel | xeon | w5580 | |
| intel | xeon | w5590 | |
| intel | xeon | x3430 | |
| intel | xeon | x3440 | |
| intel | xeon | x3450 | |
| intel | xeon | x3460 | |
| intel | xeon | x3470 | |
| intel | xeon | x3480 | |
| intel | xeon | x5550 | |
| intel | xeon | x5560 | |
| intel | xeon | x5570 | |
| intel | xeon | x5647 | |
| intel | xeon | x5650 | |
| intel | xeon | x5660 | |
| intel | xeon | x5667 | |
| intel | xeon | x5670 | |
| intel | xeon | x5672 | |
| intel | xeon | x5675 | |
| intel | xeon | x5677 | |
| intel | xeon | x5680 | |
| intel | xeon | x5687 | |
| intel | xeon | x5690 | |
| intel | xeon | x6550 | |
| intel | xeon | x7542 | |
| intel | xeon | x7550 | |
| intel | xeon | x7560 | |
| intel | xeon_bronze_3104 | - | |
| intel | xeon_bronze_3106 | - | |
| intel | xeon_e-1105c | - | |
| intel | xeon_e3 | 1505m_v6 | |
| intel | xeon_e3 | 1515m_v5 | |
| intel | xeon_e3 | 1535m_v5 | |
| intel | xeon_e3 | 1535m_v6 | |
| intel | xeon_e3 | 1545m_v5 | |
| intel | xeon_e3 | 1558l_v5 | |
| intel | xeon_e3 | 1565l_v5 | |
| intel | xeon_e3 | 1575m_v5 | |
| intel | xeon_e3 | 1578l_v5 | |
| intel | xeon_e3 | 1585_v5 | |
| intel | xeon_e3 | 1585l_v5 | |
| intel | xeon_e3_1105c_v2 | - | |
| intel | xeon_e3_1125c | - | |
| intel | xeon_e3_1125c_v2 | - | |
| intel | xeon_e3_1220 | - | |
| intel | xeon_e3_1220_v2 | - | |
| intel | xeon_e3_1220_v3 | - | |
| intel | xeon_e3_1220_v5 | - | |
| intel | xeon_e3_1220_v6 | - | |
| intel | xeon_e3_12201 | - | |
| intel | xeon_e3_12201_v2 | - | |
| intel | xeon_e3_1220l_v3 | - | |
| intel | xeon_e3_1225 | - | |
| intel | xeon_e3_1225_v2 | - | |
| intel | xeon_e3_1225_v3 | - | |
| intel | xeon_e3_1225_v5 | - | |
| intel | xeon_e3_1225_v6 | - | |
| intel | xeon_e3_1226_v3 | - | |
| intel | xeon_e3_1230 | - | |
| intel | xeon_e3_1230_v2 | - | |
| intel | xeon_e3_1230_v3 | - | |
| intel | xeon_e3_1230_v5 | - | |
| intel | xeon_e3_1230_v6 | - | |
| intel | xeon_e3_1230l_v3 | - | |
| intel | xeon_e3_1231_v3 | - | |
| intel | xeon_e3_1235 | - | |
| intel | xeon_e3_1235l_v5 | - | |
| intel | xeon_e3_1240 | - | |
| intel | xeon_e3_1240_v2 | - | |
| intel | xeon_e3_1240_v3 | - | |
| intel | xeon_e3_1240_v5 | - | |
| intel | xeon_e3_1240_v6 | - | |
| intel | xeon_e3_1240l_v3 | - | |
| intel | xeon_e3_1240l_v5 | - | |
| intel | xeon_e3_1241_v3 | - | |
| intel | xeon_e3_1245 | - | |
| intel | xeon_e3_1245_v2 | - | |
| intel | xeon_e3_1245_v3 | - | |
| intel | xeon_e3_1245_v5 | - | |
| intel | xeon_e3_1245_v6 | - | |
| intel | xeon_e3_1246_v3 | - | |
| intel | xeon_e3_1258l_v4 | - | |
| intel | xeon_e3_1260l | - | |
| intel | xeon_e3_1260l_v5 | - | |
| intel | xeon_e3_1265l_v2 | - | |
| intel | xeon_e3_1265l_v3 | - | |
| intel | xeon_e3_1265l_v4 | - | |
| intel | xeon_e3_1268l_v3 | - | |
| intel | xeon_e3_1268l_v5 | - | |
| intel | xeon_e3_1270 | - | |
| intel | xeon_e3_1270_v2 | - | |
| intel | xeon_e3_1270_v3 | - | |
| intel | xeon_e3_1270_v5 | - | |
| intel | xeon_e3_1270_v6 | - | |
| intel | xeon_e3_1271_v3 | - | |
| intel | xeon_e3_1275 | - | |
| intel | xeon_e3_1275_v2 | - | |
| intel | xeon_e3_1275_v3 | - | |
| intel | xeon_e3_1275_v5 | - | |
| intel | xeon_e3_1275_v6 | - | |
| intel | xeon_e3_1275l_v3 | - | |
| intel | xeon_e3_1276_v3 | - | |
| intel | xeon_e3_1278l_v4 | - | |
| intel | xeon_e3_1280 | - | |
| intel | xeon_e3_1280_v2 | - | |
| intel | xeon_e3_1280_v3 | - | |
| intel | xeon_e3_1280_v5 | - | |
| intel | xeon_e3_1280_v6 | - | |
| intel | xeon_e3_1281_v3 | - | |
| intel | xeon_e3_1285_v3 | - | |
| intel | xeon_e3_1285_v4 | - | |
| intel | xeon_e3_1285_v6 | - | |
| intel | xeon_e3_1285l_v3 | - | |
| intel | xeon_e3_1285l_v4 | - | |
| intel | xeon_e3_1286_v3 | - | |
| intel | xeon_e3_1286l_v3 | - | |
| intel | xeon_e3_1290 | - | |
| intel | xeon_e3_1290_v2 | - | |
| intel | xeon_e3_1501l_v6 | - | |
| intel | xeon_e3_1501m_v6 | - | |
| intel | xeon_e3_1505l_v5 | - | |
| intel | xeon_e3_1505l_v6 | - | |
| intel | xeon_e3_1505m_v5 | - | |
| intel | xeon_e5 | 2650l_v4 | |
| intel | xeon_e5 | 2658 | |
| intel | xeon_e5 | 2658_v2 | |
| intel | xeon_e5 | 2658_v3 | |
| intel | xeon_e5 | 2658_v4 | |
| intel | xeon_e5 | 2658a_v3 | |
| intel | xeon_e5 | 2660 | |
| intel | xeon_e5 | 2660_v2 | |
| intel | xeon_e5 | 2660_v3 | |
| intel | xeon_e5 | 2660_v4 | |
| intel | xeon_e5 | 2665 | |
| intel | xeon_e5 | 2667 | |
| intel | xeon_e5 | 2667_v2 | |
| intel | xeon_e5 | 2667_v3 | |
| intel | xeon_e5 | 2667_v4 | |
| intel | xeon_e5 | 2670 | |
| intel | xeon_e5 | 2670_v2 | |
| intel | xeon_e5 | 2670_v3 | |
| intel | xeon_e5 | 2680 | |
| intel | xeon_e5 | 2680_v2 | |
| intel | xeon_e5 | 2680_v3 | |
| intel | xeon_e5 | 2680_v4 | |
| intel | xeon_e5 | 2683_v3 | |
| intel | xeon_e5 | 2683_v4 | |
| intel | xeon_e5 | 2687w | |
| intel | xeon_e5 | 2687w_v2 | |
| intel | xeon_e5 | 2687w_v3 | |
| intel | xeon_e5 | 2687w_v4 | |
| intel | xeon_e5 | 2690 | |
| intel | xeon_e5 | 2690_v2 | |
| intel | xeon_e5 | 2690_v3 | |
| intel | xeon_e5 | 2690_v4 | |
| intel | xeon_e5 | 2695_v2 | |
| intel | xeon_e5 | 2695_v3 | |
| intel | xeon_e5 | 2695_v4 | |
| intel | xeon_e5 | 2697_v2 | |
| intel | xeon_e5 | 2697_v3 | |
| intel | xeon_e5 | 2697_v4 | |
| intel | xeon_e5 | 2697a_v4 | |
| intel | xeon_e5 | 2698_v3 | |
| intel | xeon_e5 | 2698_v4 | |
| intel | xeon_e5 | 2699_v3 | |
| intel | xeon_e5 | 2699_v4 | |
| intel | xeon_e5 | 2699a_v4 | |
| intel | xeon_e5 | 2699r_v4 | |
| intel | xeon_e5 | 4603 | |
| intel | xeon_e5 | 4603_v2 | |
| intel | xeon_e5 | 4607 | |
| intel | xeon_e5 | 4607_v2 | |
| intel | xeon_e5 | 4610 | |
| intel | xeon_e5 | 4610_v2 | |
| intel | xeon_e5 | 4610_v3 | |
| intel | xeon_e5 | 4610_v4 | |
| intel | xeon_e5 | 4617 | |
| intel | xeon_e5 | 4620 | |
| intel | xeon_e5 | 4620_v2 | |
| intel | xeon_e5 | 4620_v3 | |
| intel | xeon_e5 | 4620_v4 | |
| intel | xeon_e5 | 4624l_v2 | |
| intel | xeon_e5 | 4627_v2 | |
| intel | xeon_e5 | 4627_v3 | |
| intel | xeon_e5 | 4627_v4 | |
| intel | xeon_e5 | 4628l_v4 | |
| intel | xeon_e5 | 4640 | |
| intel | xeon_e5 | 4640_v2 | |
| intel | xeon_e5 | 4640_v3 | |
| intel | xeon_e5 | 4640_v4 | |
| intel | xeon_e5 | 4648_v3 | |
| intel | xeon_e5 | 4650 | |
| intel | xeon_e5 | 4650_v2 | |
| intel | xeon_e5 | 4650_v3 | |
| intel | xeon_e5 | 4650_v4 | |
| intel | xeon_e5 | 4650l | |
| intel | xeon_e5 | 4655_v3 | |
| intel | xeon_e5 | 4655_v4 | |
| intel | xeon_e5 | 4657l_v2 | |
| intel | xeon_e5 | 4660_v3 | |
| intel | xeon_e5 | 4660_v4 | |
| intel | xeon_e5 | 4667_v3 | |
| intel | xeon_e5 | 4667_v4 | |
| intel | xeon_e5 | 4669_v3 | |
| intel | xeon_e5 | 4669_v4 | |
| intel | xeon_e5_1428l | - | |
| intel | xeon_e5_1428l_v2 | - | |
| intel | xeon_e5_1428l_v3 | - | |
| intel | xeon_e5_1620 | - | |
| intel | xeon_e5_1620_v2 | - | |
| intel | xeon_e5_1620_v3 | - | |
| intel | xeon_e5_1620_v4 | - | |
| intel | xeon_e5_1630_v3 | - | |
| intel | xeon_e5_1630_v4 | - | |
| intel | xeon_e5_1650 | - | |
| intel | xeon_e5_1650_v2 | - | |
| intel | xeon_e5_1650_v3 | - | |
| intel | xeon_e5_1650_v4 | - | |
| intel | xeon_e5_1660 | - | |
| intel | xeon_e5_1660_v2 | - | |
| intel | xeon_e5_1660_v3 | - | |
| intel | xeon_e5_1660_v4 | - | |
| intel | xeon_e5_1680_v3 | - | |
| intel | xeon_e5_1680_v4 | - | |
| intel | xeon_e5_2403 | - | |
| intel | xeon_e5_2403_v2 | - | |
| intel | xeon_e5_2407 | - | |
| intel | xeon_e5_2407_v2 | - | |
| intel | xeon_e5_2408l_v3 | - | |
| intel | xeon_e5_2418l | - | |
| intel | xeon_e5_2418l_v2 | - | |
| intel | xeon_e5_2418l_v3 | - | |
| intel | xeon_e5_2420 | - | |
| intel | xeon_e5_2420_v2 | - | |
| intel | xeon_e5_2428l | - | |
| intel | xeon_e5_2428l_v2 | - | |
| intel | xeon_e5_2428l_v3 | - | |
| intel | xeon_e5_2430 | - | |
| intel | xeon_e5_2430_v2 | - | |
| intel | xeon_e5_2430l | - | |
| intel | xeon_e5_2430l_v2 | - | |
| intel | xeon_e5_2438l_v3 | - | |
| intel | xeon_e5_2440 | - | |
| intel | xeon_e5_2440_v2 | - | |
| intel | xeon_e5_2448l | - | |
| intel | xeon_e5_2448l_v2 | - | |
| intel | xeon_e5_2450 | - | |
| intel | xeon_e5_2450_v2 | - | |
| intel | xeon_e5_2450l | - | |
| intel | xeon_e5_2450l_v2 | - | |
| intel | xeon_e5_2470 | - | |
| intel | xeon_e5_2470_v2 | - | |
| intel | xeon_e5_2603 | - | |
| intel | xeon_e5_2603_v2 | - | |
| intel | xeon_e5_2603_v3 | - | |
| intel | xeon_e5_2603_v4 | - | |
| intel | xeon_e5_2608l_v3 | - | |
| intel | xeon_e5_2608l_v4 | - | |
| intel | xeon_e5_2609 | - | |
| intel | xeon_e5_2609_v2 | - | |
| intel | xeon_e5_2609_v3 | - | |
| intel | xeon_e5_2609_v4 | - | |
| intel | xeon_e5_2618l_v2 | - | |
| intel | xeon_e5_2618l_v3 | - | |
| intel | xeon_e5_2618l_v4 | - | |
| intel | xeon_e5_2620 | - | |
| intel | xeon_e5_2620_v2 | - | |
| intel | xeon_e5_2620_v3 | - | |
| intel | xeon_e5_2620_v4 | - | |
| intel | xeon_e5_2623_v3 | - | |
| intel | xeon_e5_2623_v4 | - | |
| intel | xeon_e5_2628l_v2 | - | |
| intel | xeon_e5_2628l_v3 | - | |
| intel | xeon_e5_2628l_v4 | - | |
| intel | xeon_e5_2630 | - | |
| intel | xeon_e5_2630_v2 | - | |
| intel | xeon_e5_2630_v3 | - | |
| intel | xeon_e5_2630_v4 | - | |
| intel | xeon_e5_2630l | - | |
| intel | xeon_e5_2630l_v2 | - | |
| intel | xeon_e5_2630l_v3 | - | |
| intel | xeon_e5_2630l_v4 | - | |
| intel | xeon_e5_2637 | - | |
| intel | xeon_e5_2637_v2 | - | |
| intel | xeon_e5_2637_v3 | - | |
| intel | xeon_e5_2637_v4 | - | |
| intel | xeon_e5_2640 | - | |
| intel | xeon_e5_2640_v2 | - | |
| intel | xeon_e5_2640_v3 | - | |
| intel | xeon_e5_2640_v4 | - | |
| intel | xeon_e5_2643 | - | |
| intel | xeon_e5_2643_v2 | - | |
| intel | xeon_e5_2643_v3 | - | |
| intel | xeon_e5_2643_v4 | - | |
| intel | xeon_e5_2648l | - | |
| intel | xeon_e5_2648l_v2 | - | |
| intel | xeon_e5_2648l_v3 | - | |
| intel | xeon_e5_2648l_v4 | - | |
| intel | xeon_e5_2650 | - | |
| intel | xeon_e5_2650_v2 | - | |
| intel | xeon_e5_2650_v3 | - | |
| intel | xeon_e5_2650_v4 | - | |
| intel | xeon_e5_2650l | - | |
| intel | xeon_e5_2650l_v2 | - | |
| intel | xeon_e5_2650l_v3 | - | |
| intel | xeon_e7 | 2803 | |
| intel | xeon_e7 | 2820 | |
| intel | xeon_e7 | 2830 | |
| intel | xeon_e7 | 2850 | |
| intel | xeon_e7 | 2850_v2 | |
| intel | xeon_e7 | 2860 | |
| intel | xeon_e7 | 2870 | |
| intel | xeon_e7 | 2870_v2 | |
| intel | xeon_e7 | 2880_v2 | |
| intel | xeon_e7 | 2890_v2 | |
| intel | xeon_e7 | 4807 | |
| intel | xeon_e7 | 4809_v2 | |
| intel | xeon_e7 | 4809_v3 | |
| intel | xeon_e7 | 4809_v4 | |
| intel | xeon_e7 | 4820 | |
| intel | xeon_e7 | 4820_v2 | |
| intel | xeon_e7 | 4820_v3 | |
| intel | xeon_e7 | 4820_v4 | |
| intel | xeon_e7 | 4830 | |
| intel | xeon_e7 | 4830_v2 | |
| intel | xeon_e7 | 4830_v3 | |
| intel | xeon_e7 | 4830_v4 | |
| intel | xeon_e7 | 4850 | |
| intel | xeon_e7 | 4850_v2 | |
| intel | xeon_e7 | 4850_v3 | |
| intel | xeon_e7 | 4850_v4 | |
| intel | xeon_e7 | 4860 | |
| intel | xeon_e7 | 4860_v2 | |
| intel | xeon_e7 | 4870 | |
| intel | xeon_e7 | 4870_v2 | |
| intel | xeon_e7 | 4880_v2 | |
| intel | xeon_e7 | 4890_v2 | |
| intel | xeon_e7 | 8830 | |
| intel | xeon_e7 | 8837 | |
| intel | xeon_e7 | 8850 | |
| intel | xeon_e7 | 8850_v2 | |
| intel | xeon_e7 | 8857_v2 | |
| intel | xeon_e7 | 8860 | |
| intel | xeon_e7 | 8860_v3 | |
| intel | xeon_e7 | 8860_v4 | |
| intel | xeon_e7 | 8867_v3 | |
| intel | xeon_e7 | 8867_v4 | |
| intel | xeon_e7 | 8867l | |
| intel | xeon_e7 | 8870 | |
| intel | xeon_e7 | 8870_v2 | |
| intel | xeon_e7 | 8870_v3 | |
| intel | xeon_e7 | 8870_v4 | |
| intel | xeon_e7 | 8880_v2 | |
| intel | xeon_e7 | 8880_v3 | |
| intel | xeon_e7 | 8880_v4 | |
| intel | xeon_e7 | 8880l_v2 | |
| intel | xeon_e7 | 8880l_v3 | |
| intel | xeon_e7 | 8890_v2 | |
| intel | xeon_e7 | 8890_v3 | |
| intel | xeon_e7 | 8890_v4 | |
| intel | xeon_e7 | 8891_v2 | |
| intel | xeon_e7 | 8891_v3 | |
| intel | xeon_e7 | 8891_v4 | |
| intel | xeon_e7 | 8893_v2 | |
| intel | xeon_e7 | 8893_v3 | |
| intel | xeon_e7 | 8893_v4 | |
| intel | xeon_e7 | 8894_v4 | |
| intel | xeon_gold | 5115 | |
| intel | xeon_gold | 5118 | |
| intel | xeon_gold | 5119t | |
| intel | xeon_gold | 5120 | |
| intel | xeon_gold | 5120t | |
| intel | xeon_gold | 5122 | |
| intel | xeon_gold | 6126 | |
| intel | xeon_gold | 6126f | |
| intel | xeon_gold | 6126t | |
| intel | xeon_gold | 6128 | |
| intel | xeon_gold | 6130 | |
| intel | xeon_gold | 6130f | |
| intel | xeon_gold | 6130t | |
| intel | xeon_gold | 6132 | |
| intel | xeon_gold | 6134 | |
| intel | xeon_gold | 6134m | |
| intel | xeon_gold | 6136 | |
| intel | xeon_gold | 6138 | |
| intel | xeon_gold | 6138f | |
| intel | xeon_gold | 6138t | |
| intel | xeon_gold | 6140 | |
| intel | xeon_gold | 6140m | |
| intel | xeon_gold | 6142 | |
| intel | xeon_gold | 6142f | |
| intel | xeon_gold | 6142m | |
| intel | xeon_gold | 6144 | |
| intel | xeon_gold | 6146 | |
| intel | xeon_gold | 6148 | |
| intel | xeon_gold | 6148f | |
| intel | xeon_gold | 6150 | |
| intel | xeon_gold | 6152 | |
| intel | xeon_gold | 6154 | |
| intel | xeon_phi | 7210 | |
| intel | xeon_phi | 7210f | |
| intel | xeon_phi | 7230 | |
| intel | xeon_phi | 7230f | |
| intel | xeon_phi | 7235 | |
| intel | xeon_phi | 7250 | |
| intel | xeon_phi | 7250f | |
| intel | xeon_phi | 7285 | |
| intel | xeon_phi | 7290 | |
| intel | xeon_phi | 7290f | |
| intel | xeon_phi | 7295 | |
| intel | xeon_platinum | 8153 | |
| intel | xeon_platinum | 8156 | |
| intel | xeon_platinum | 8158 | |
| intel | xeon_platinum | 8160 | |
| intel | xeon_platinum | 8160f | |
| intel | xeon_platinum | 8160m | |
| intel | xeon_platinum | 8160t | |
| intel | xeon_platinum | 8164 | |
| intel | xeon_platinum | 8168 | |
| intel | xeon_platinum | 8170 | |
| intel | xeon_platinum | 8170m | |
| intel | xeon_platinum | 8176 | |
| intel | xeon_platinum | 8176f | |
| intel | xeon_platinum | 8176m | |
| intel | xeon_platinum | 8180 | |
| intel | xeon_silver | 4108 | |
| intel | xeon_silver | 4109t | |
| intel | xeon_silver | 4110 | |
| intel | xeon_silver | 4112 | |
| intel | xeon_silver | 4114 | |
| intel | xeon_silver | 4114t | |
| intel | xeon_silver | 4116 | |
| intel | xeon_silver | 4116t | |
| arm | cortex-a | 9 | |
| arm | cortex-a | 15 | |
| arm | cortex-a | 17 | |
| arm | cortex-a | 57 | |
| arm | cortex-a | 72 | |
| arm | cortex-a | 73 | |
| arm | cortex-a | 75 | |
| canonical | ubuntu_linux | 12.04 | |
| canonical | ubuntu_linux | 14.04 | |
| canonical | ubuntu_linux | 16.04 | |
| canonical | ubuntu_linux | 17.04 | |
| canonical | ubuntu_linux | 17.10 | |
| canonical | ubuntu_linux | 18.04 | |
| netapp | hci_management_node | - | |
| netapp | solidfire | - | |
| netapp | hci_compute_node | - | |
| siemens | simatic_winac_rtx_\(f\)_firmware | 2010 | |
| siemens | simatic_winac_rtx_\(f\)_firmware | 2010 | |
| siemens | simatic_winac_rtx_\(f\)_firmware | 2010 | |
| siemens | simatic_winac_rtx_\(f\)_2010 | - | |
| debian | debian_linux | 7.0 | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 | |
| oracle | communications_diameter_signaling_router | 8.0.0 | |
| oracle | communications_diameter_signaling_router | 8.1 | |
| oracle | communications_diameter_signaling_router | 8.2 | |
| oracle | communications_diameter_signaling_router | 8.3 | |
| oracle | vm_virtualbox | * | |
| oracle | vm_virtualbox | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*",
"matchCriteriaId": "CD028C10-FD07-4206-A732-CCAC1B6D043D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*",
"matchCriteriaId": "704FAA50-1B7D-4917-AC4A-4C58785340F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6B95D3-75BD-4826-BFBE-9701CC0FF052",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*",
"matchCriteriaId": "F66E31A6-EA01-40C8-8718-CE2C1F45EEB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*",
"matchCriteriaId": "DBBE3B05-2063-49DE-A1D3-9D0A62E0CF5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*",
"matchCriteriaId": "022F2CBE-EFB1-4962-AC91-D25AAB057DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*",
"matchCriteriaId": "69C05CD9-551B-46EE-85F8-D18FF878FE8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*",
"matchCriteriaId": "2DCCB5A5-20E3-4EC5-956C-EA7C0F33A026",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*",
"matchCriteriaId": "3C38C609-242E-4923-A81F-DAFBE7B6A927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*",
"matchCriteriaId": "2AEB08B5-7CBA-479A-A41B-FD8A6D9E0875",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C4FDD7-F2EC-4EDB-ACC9-3D6B9152C855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*",
"matchCriteriaId": "8E51DD0B-1EED-4BE9-B0A7-BE2E91CCA84C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*",
"matchCriteriaId": "D7AC7C56-2205-4121-99E2-001A7488E0FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*",
"matchCriteriaId": "A1677313-FF8F-493B-9DA3-C78F87581A17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*",
"matchCriteriaId": "4B2A3CCE-FA57-43B5-B7DE-CFD0CC2ECD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*",
"matchCriteriaId": "85CA4444-5103-4451-8A7C-F6BBE714BBB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*",
"matchCriteriaId": "FA1EB745-46D7-4088-93C6-E7156520B144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*",
"matchCriteriaId": "A93010C0-33B3-438F-94F6-8DA7A9D7B451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*",
"matchCriteriaId": "2A988A78-6B3D-4599-A85C-42B4A294D86D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*",
"matchCriteriaId": "1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*",
"matchCriteriaId": "246AA1B0-B6C8-406B-817D-26113DC63858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*",
"matchCriteriaId": "00EE5B42-FF05-447C-BACC-0E650E773E49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*",
"matchCriteriaId": "B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*",
"matchCriteriaId": "A1F0E3C4-7E9B-435F-907E-4BF4F12AF314",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*",
"matchCriteriaId": "5D616C72-0863-478C-9E87-3963C83B87E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*",
"matchCriteriaId": "CC333B0D-3A0E-4629-8016-68C060343874",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*",
"matchCriteriaId": "6655535C-FF64-4F9E-8168-253AABCC4F5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*",
"matchCriteriaId": "B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*",
"matchCriteriaId": "BBD68F3F-7E38-40B9-A20B-B9BB45E8D042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*",
"matchCriteriaId": "1EACEF19-83BC-4579-9274-BE367F914432",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*",
"matchCriteriaId": "1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*",
"matchCriteriaId": "24128A7F-2B0B-4923-BA9E-9F5093D29423",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*",
"matchCriteriaId": "0990DD71-9E83-499D-9DAF-A466CF896CFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*",
"matchCriteriaId": "9B7FEDEF-9772-4FB1-9261-020487A795AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7B0F72-DEDF-40C4-887C-83725C52C92E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*",
"matchCriteriaId": "9568C222-9816-4520-B01C-C1DC2A79002D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*",
"matchCriteriaId": "4B2F8FAD-1688-4369-BB4B-9FA9F30A80A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*",
"matchCriteriaId": "53A1F23D-7226-4479-B51F-36376CC80B04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*",
"matchCriteriaId": "BAB245C8-9918-41A0-9DFB-A11E4185C87A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*",
"matchCriteriaId": "9990DD08-BD81-4BFA-B3D4-0DECBF8CCC54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*",
"matchCriteriaId": "F752A3C8-18ED-4765-B6EC-C664154EB701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*",
"matchCriteriaId": "B4F31C3F-7C0D-4D95-B4B9-89FD38076913",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*",
"matchCriteriaId": "5BEEE36E-E735-4A33-80B7-9407D072F6BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB3D3DE-21BE-40C7-A510-AC97C92390DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*",
"matchCriteriaId": "0D9A9545-38A3-460D-AB1A-8B03BEB405A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*",
"matchCriteriaId": "1860D932-777D-41F2-94A2-D14AB1494AA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*",
"matchCriteriaId": "75165A10-2FD5-4370-814C-B60FDE339AFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*",
"matchCriteriaId": "65AAC7A7-77CA-4C6C-BD96-92A253512F09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD16C07-0050-495A-8722-7AC46F5920F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*",
"matchCriteriaId": "01423706-C82C-4457-9638-1A2380DE3826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*",
"matchCriteriaId": "A881E2D3-A668-465F-862B-F8C145BD5E8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*",
"matchCriteriaId": "3E5B9B98-0EF0-4ACD-B378-F9DE5AB36CBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDC6806-E4FC-4A6E-A6BB-88C18E47ABFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*",
"matchCriteriaId": "6602DD69-E59A-417D-B19F-CA16B01E652C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*",
"matchCriteriaId": "05C493EE-EF9F-47E2-8F88-86DF6C5F1FF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*",
"matchCriteriaId": "40010DAE-DD1A-4A81-B6E9-EDC1B0DDCAB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*",
"matchCriteriaId": "ED96AC16-12CC-43F6-ACC8-009A06CDD8F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*",
"matchCriteriaId": "2CE9DC29-C192-4553-AF29-D39290976F47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*",
"matchCriteriaId": "F625E647-B47E-404C-9C5B-72F3EB1C46F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*",
"matchCriteriaId": "E3AF3279-89E7-4C91-8C5F-5AD5937CD0C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*",
"matchCriteriaId": "B5878612-9825-4737-85A5-8227BA97CBA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*",
"matchCriteriaId": "F453D348-28CE-402B-9D40-A29436A24ECC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*",
"matchCriteriaId": "36322F4B-83D7-468A-BB34-1C03729E9BF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD22811-C3C6-4B5E-98D5-D3F2240E6C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*",
"matchCriteriaId": "A3C7D0BA-8F07-42AD-8BB9-C65472BE41C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*",
"matchCriteriaId": "B0A2A50E-94FA-44E9-A45D-3016750CFBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*",
"matchCriteriaId": "5625CAD8-4A62-4747-B6D9-90E56F09B731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*",
"matchCriteriaId": "43A234CE-D6AA-4A32-8425-1A4DDA0F6B6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE1A01-3AEF-41E6-97EE-CB93429C4A1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*",
"matchCriteriaId": "410184AF-B932-4AC9-984F-73FD58BB4CF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*",
"matchCriteriaId": "B265F073-9E0A-4CA0-8296-AB52DEB1C323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*",
"matchCriteriaId": "3F664223-1CBC-4D8A-921B-F03AACA6672B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*",
"matchCriteriaId": "987A8470-08BA-45DE-8EC0-CD2B4451EECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*",
"matchCriteriaId": "8BBC9542-FB77-4769-BF67-D42829703920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*",
"matchCriteriaId": "74FDC18B-4662-422E-A86A-48FE821C056F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*",
"matchCriteriaId": "CAB4AA2C-D1D9-44D8-9471-66EBDE9DC66D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA3E7AE-CB74-48A8-A2B8-9FCADB6E40D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*",
"matchCriteriaId": "78E4461B-72F8-4F3D-A405-4AFA99EC8A32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*",
"matchCriteriaId": "663DDC1C-E48A-4E84-A6CC-B46FC45D6A6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*",
"matchCriteriaId": "8CEEC75B-10CE-4B7E-BA5F-6D661EC07FFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*",
"matchCriteriaId": "DAEDED56-9387-4DAC-BF52-C32ECCB7D407",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*",
"matchCriteriaId": "FA13F31C-BBD9-48C7-8499-92D0B5CA8CF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*",
"matchCriteriaId": "E57A9B28-734B-401D-B24C-A295F364D8E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*",
"matchCriteriaId": "F02289DF-4A02-4602-89B7-E9148236EE1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*",
"matchCriteriaId": "723E7155-493D-4B5A-99E2-AB261838190E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*",
"matchCriteriaId": "82E37264-E4BA-4D9D-92E7-56DE6B5F918F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*",
"matchCriteriaId": "8704BE6D-2857-4328-9298-E0273376F2CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*",
"matchCriteriaId": "731F1E65-1D53-443B-8E2F-8AF11191AFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*",
"matchCriteriaId": "02A83822-822D-4A4D-B29B-A5BE6367A7DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C32738-F08E-469C-8DE0-2708F30574A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*",
"matchCriteriaId": "B292187E-8EAD-49D2-B469-B14CA0656035",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*",
"matchCriteriaId": "C7D131E1-24C1-48CF-B3DD-46B09A718FB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*",
"matchCriteriaId": "0ABF1231-73CF-4D1B-860C-E76CD26A645E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*",
"matchCriteriaId": "F7F88E38-4EC4-41DB-A59D-800997440C0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*",
"matchCriteriaId": "32FD6647-4101-4B36-9A9A-F70C29997148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*",
"matchCriteriaId": "D248D668-A895-43B3-ADEF-1B22EE7DC76E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*",
"matchCriteriaId": "858411B5-E904-45FA-8B33-5CC73B915B22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB9336C-C893-4AB0-9402-868CE9960058",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*",
"matchCriteriaId": "A4695F94-7AAE-4219-9EF6-CE6D0838192D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*",
"matchCriteriaId": "BD7A0991-73F0-410D-855C-BFC88A66E61F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*",
"matchCriteriaId": "FAF5CF9A-B3F2-4686-B933-7DB13AD2CF35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*",
"matchCriteriaId": "9858EAC3-C1CE-449B-A605-FFA337DA825D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*",
"matchCriteriaId": "E7A8F905-A4C6-4EC6-B9E8-800948350B89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*",
"matchCriteriaId": "565B48E3-1406-4E3C-B4A5-35865C5614E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*",
"matchCriteriaId": "46B6C4D7-B0A2-4DF1-B8DE-19C806D5FABB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*",
"matchCriteriaId": "8AB82A90-C0BC-4BA8-88CA-4967BC3A4A7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*",
"matchCriteriaId": "191A094B-E354-4767-AD43-87CE140BF851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*",
"matchCriteriaId": "C1289B9E-5725-42EF-8848-F545421A29E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*",
"matchCriteriaId": "238A21CB-F8C5-468B-B523-6D014E2EA8AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*",
"matchCriteriaId": "0DC52CDD-614D-4EA0-8DA8-D71189C42E8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*",
"matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*",
"matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*",
"matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*",
"matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*",
"matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*",
"matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*",
"matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*",
"matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*",
"matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*",
"matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*",
"matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*",
"matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*",
"matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*",
"matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*",
"matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*",
"matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*",
"matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*",
"matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*",
"matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*",
"matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*",
"matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*",
"matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*",
"matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*",
"matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*",
"matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*",
"matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*",
"matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*",
"matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*",
"matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*",
"matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*",
"matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*",
"matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*",
"matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*",
"matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*",
"matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*",
"matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*",
"matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*",
"matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*",
"matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*",
"matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*",
"matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*",
"matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*",
"matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*",
"matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*",
"matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*",
"matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*",
"matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*",
"matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*",
"matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
"matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
"matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
"matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
"matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
"matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
"matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
"matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
"matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
"matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
"matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
"matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
"matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
"matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
"matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
"matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
"matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
"matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
"matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
"matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
"matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
"matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
"matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
"matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
"matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
"matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
"matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
"matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
"matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
"matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
"matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
"matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
"matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
"matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
"matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
"matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
"matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
"matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
"matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
"matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
"matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
"matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
"matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
"matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
"matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
"matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
"matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
"matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
"matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
"matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
"matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
"matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
"matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*",
"matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*",
"matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*",
"matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*",
"matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*",
"matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*",
"matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*",
"matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*",
"matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*",
"matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*",
"matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*",
"matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*",
"matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*",
"matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*",
"matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*",
"matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*",
"matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*",
"matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*",
"matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*",
"matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*",
"matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*",
"matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*",
"matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*",
"matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*",
"matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*",
"matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*",
"matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*",
"matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*",
"matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*",
"matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*",
"matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*",
"matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*",
"matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*",
"matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*",
"matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*",
"matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*",
"matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*",
"matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*",
"matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*",
"matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*",
"matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*",
"matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*",
"matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*",
"matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*",
"matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*",
"matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*",
"matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*",
"matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*",
"matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*",
"matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*",
"matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*",
"matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*",
"matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*",
"matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*",
"matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*",
"matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*",
"matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*",
"matchCriteriaId": "AF813AD9-D296-4915-861C-8DE929E45FE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*",
"matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*",
"matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*",
"matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*",
"matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*",
"matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*",
"matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*",
"matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*",
"matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*",
"matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*",
"matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*",
"matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
"matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
"matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
"matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
"matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
"matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
"matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
"matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
"matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
"matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
"matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
"matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
"matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
"matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
"matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
"matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
"matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
"matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
"matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
"matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
"matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
"matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
"matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
"matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
"matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
"matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
"matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
"matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
"matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
"matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
"matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
"matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
"matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
"matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
"matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
"matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
"matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
"matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
"matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
"matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
"matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
"matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
"matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
"matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
"matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
"matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*",
"matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
"matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
"matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
"matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
"matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
"matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
"matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
"matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
"matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
"matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
"matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
"matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
"matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
"matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
"matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
"matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
"matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
"matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
"matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
"matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
"matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
"matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
"matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
"matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
"matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
"matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
"matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
"matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
"matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
"matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
"matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
"matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
"matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
"matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*",
"matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*",
"matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*",
"matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*",
"matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*",
"matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*",
"matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*",
"matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*",
"matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*",
"matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*",
"matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*",
"matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*",
"matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*",
"matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*",
"matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*",
"matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*",
"matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*",
"matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*",
"matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*",
"matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*",
"matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*",
"matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*",
"matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*",
"matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*",
"matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*",
"matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*",
"matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*",
"matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*",
"matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*",
"matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*",
"matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*",
"matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*",
"matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*",
"matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*",
"matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*",
"matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*",
"matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*",
"matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*",
"matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*",
"matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*",
"matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*",
"matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*",
"matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*",
"matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*",
"matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*",
"matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*",
"matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*",
"matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*",
"matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*",
"matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*",
"matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*",
"matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*",
"matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*",
"matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*",
"matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*",
"matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*",
"matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*",
"matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*",
"matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*",
"matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*",
"matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*",
"matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*",
"matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*",
"matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*",
"matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*",
"matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*",
"matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*",
"matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*",
"matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*",
"matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*",
"matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*",
"matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*",
"matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*",
"matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*",
"matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*",
"matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*",
"matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*",
"matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*",
"matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*",
"matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*",
"matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*",
"matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*",
"matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
"matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
"matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
"matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
"matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
"matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
"matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
"matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
"matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
"matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
"matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
"matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
"matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
"matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
"matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
"matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
"matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
"matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
"matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
"matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
"matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
"matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
"matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
"matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
"matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
"matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
"matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
"matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
"matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
"matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
"matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
"matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
"matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
"matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
"matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
"matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
"matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
"matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
"matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
"matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
"matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
"matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
"matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
"matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
"matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
"matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
"matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
"matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
"matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
"matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
"matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
"matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
"matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
"matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*",
"matchCriteriaId": "5079AA70-C864-4AE2-809C-52B50632F2B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*",
"matchCriteriaId": "5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*",
"matchCriteriaId": "6A86291B-C986-4320-BCEF-9F5AD8B309D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*",
"matchCriteriaId": "1227659F-1393-4189-978B-CC3DC53BF407",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*",
"matchCriteriaId": "4C2DB843-638F-41EF-B486-409318AA2DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*",
"matchCriteriaId": "A0004D8A-A186-4DA2-A7AB-18A6456438FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*",
"matchCriteriaId": "75B6BE9F-F113-4976-951D-53F2E183A95A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB005F1-9719-4985-B9D9-2140C962ADD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*",
"matchCriteriaId": "A94D0C1B-F30F-4724-915E-192C53FAE58A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*",
"matchCriteriaId": "3F247860-1D2C-415C-AFBD-26BD875AAF02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*",
"matchCriteriaId": "9697EDCD-A742-4AC6-876E-1080AD684207",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*",
"matchCriteriaId": "6E73924A-875B-44D0-8F7C-A822B0488126",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*",
"matchCriteriaId": "03751B92-EE07-4F16-A476-BD25561810BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*",
"matchCriteriaId": "A3A630E1-6CAE-4809-AB18-5002F158AE90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*",
"matchCriteriaId": "A67750FF-EF4B-414F-8ED4-299CAF33B0DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*",
"matchCriteriaId": "5A82D885-82F5-4755-BC11-5899E28CEE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*",
"matchCriteriaId": "88AF1366-8A14-4741-8146-886C31D8D347",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*",
"matchCriteriaId": "7FD75301-E29C-47DC-B53F-DC44EA0C1885",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*",
"matchCriteriaId": "8C944024-BEAA-43AF-A339-FD69C75E8240",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*",
"matchCriteriaId": "435C69D1-3932-4379-8D18-B1E12D558325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*",
"matchCriteriaId": "3572B700-73C0-41D1-95FD-FE9D5B0C1F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*",
"matchCriteriaId": "97A40DC9-0D4E-4C91-8D1B-3CED95B3952E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*",
"matchCriteriaId": "16FB3E4B-05F8-411A-8C86-4ACE03815553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*",
"matchCriteriaId": "8E55EBC1-6F96-47CD-9503-7855EFB07240",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*",
"matchCriteriaId": "4208DBA1-7F85-4876-9B6C-D1B43EAAB2AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*",
"matchCriteriaId": "F5ADC8E5-1CE7-4481-A9B5-61BFC6B4FF50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*",
"matchCriteriaId": "A1789924-FADB-4076-8874-120B29EE6B86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*",
"matchCriteriaId": "BC246667-2F6F-4024-9EAA-2CE3018235C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*",
"matchCriteriaId": "B21BA7F8-D4B5-4E6B-8FCE-04BBD3501AA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*",
"matchCriteriaId": "1341A5D4-A5CE-4D31-A178-01C3069D7A55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*",
"matchCriteriaId": "86A5C199-92E5-435C-AC40-175849285104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*",
"matchCriteriaId": "67589F54-0A54-4DE7-9A47-A73DD05F7965",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*",
"matchCriteriaId": "DDC34C8E-1BB9-43CC-9D89-9E6DC435B7EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*",
"matchCriteriaId": "8BE5163E-9BCF-4BF8-BCB9-B48C4E7E1564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*",
"matchCriteriaId": "92C5DC8C-3318-440B-8B29-4827F343927B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*",
"matchCriteriaId": "0ECC47D8-F602-4CEA-B19A-209CE76C9D36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*",
"matchCriteriaId": "7514ADD3-DECC-4CC2-9421-A609E526FDC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*",
"matchCriteriaId": "6ED2EC97-8B2D-47A9-8EC7-D1E0ACBB6C52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*",
"matchCriteriaId": "691097C3-F91B-499B-BAEB-4E7E9C43B517",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*",
"matchCriteriaId": "0B3DB1ED-017B-43EF-92A3-A8A88669FBC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*",
"matchCriteriaId": "19A49AAF-0F08-4151-8F74-4EF9C3415B00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*",
"matchCriteriaId": "3F7A2018-BB4D-4DC1-813D-A4AA3F270893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*",
"matchCriteriaId": "A95D91C4-C539-4458-A6C9-8AE17207AE30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*",
"matchCriteriaId": "37F9D218-8198-42C7-88FE-7C5382138324",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8FDD81-95EE-4241-93C8-925085A4CE7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*",
"matchCriteriaId": "614D9E35-10E0-4CCB-B817-C7C8C3947BE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*",
"matchCriteriaId": "F75F987E-F4DB-46FF-B048-21B4A4C07B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*",
"matchCriteriaId": "05376F2C-30B6-406D-90F7-6C2E00E85171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDD3DF6-24BF-4C13-8F07-AF07327E5622",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*",
"matchCriteriaId": "B1520A64-2157-45D7-A135-F900798C4EB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*",
"matchCriteriaId": "05A30F85-5367-4369-B7A5-176D71279FC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*",
"matchCriteriaId": "B8803FF9-48D7-4AB0-8A17-4590CABD0BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC63B6B-5D6D-477B-9125-007F835981B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*",
"matchCriteriaId": "BF385AC9-963E-4670-95A6-BE1EBC3890B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*",
"matchCriteriaId": "943FA088-2902-45A9-A1BA-D612B46A50D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*",
"matchCriteriaId": "8C80902D-9A6C-47D4-B56F-35C378FC0E63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*",
"matchCriteriaId": "1100B46C-8485-4048-BFF8-2BAB311EC04A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9E1646-E154-41BA-B9FA-0839A898023D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*",
"matchCriteriaId": "03F4C8E6-0043-41A8-94EA-EEBAA1A081E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*",
"matchCriteriaId": "31C10985-CBF7-4717-A7D6-2594887D7CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*",
"matchCriteriaId": "8C49886C-B6A0-4D95-8533-329FE5A66F6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*",
"matchCriteriaId": "0788CF23-3FAF-44C9-9AAA-96E4818A1AEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*",
"matchCriteriaId": "24AF7001-64D1-4BFB-9280-0BA0FAD97A0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*",
"matchCriteriaId": "8C6E420E-16DA-4FB1-9968-C93E229614FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*",
"matchCriteriaId": "07469E04-B3D2-41FE-A2E4-E25A977026CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*",
"matchCriteriaId": "60FF402E-5E4F-414A-A3AB-149548303616",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*",
"matchCriteriaId": "79E2B875-A270-45C0-A1B1-041264E5B290",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*",
"matchCriteriaId": "8C828C8C-7ECB-4167-87A9-0F522C400C66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*",
"matchCriteriaId": "0C2C887F-1EF7-468A-A6AE-440793C78DAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*",
"matchCriteriaId": "6F2F3D7F-D884-4ACD-A103-060F57A9867B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1FCAAD-7072-45EC-9ACB-08556458BAF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*",
"matchCriteriaId": "C4446224-40E8-4AD0-8197-921D3473E19B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*",
"matchCriteriaId": "4EA159D9-8C7F-4BE5-9093-A21C7D00F7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*",
"matchCriteriaId": "B92B68FD-771A-4401-8B1D-B1A252356F62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*",
"matchCriteriaId": "1B933941-0BE3-4EEB-8FDD-2DAA63343EE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*",
"matchCriteriaId": "8D060EF0-B29C-4B54-86A0-FD5CFF7B80BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*",
"matchCriteriaId": "36F737C1-6011-42D2-9690-CA81EA0A283C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*",
"matchCriteriaId": "19CA7EB6-D1C9-48D9-A69A-2618800A6CE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*",
"matchCriteriaId": "0CA1F3E5-ED7F-4E4C-AD0D-0EEC542A9E51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*",
"matchCriteriaId": "ED6E3C9B-A661-4B37-B76D-A3F7BD638D4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*",
"matchCriteriaId": "56C909B0-8FB2-4220-AF93-EECB8D650CC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*",
"matchCriteriaId": "FF36BAD0-A762-4F84-BE0B-060FE666ED67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*",
"matchCriteriaId": "007337CD-94FB-4ED9-B4A3-9E0EC52D79B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*",
"matchCriteriaId": "BCDFA137-F1FC-46BD-9872-D62671B1434D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*",
"matchCriteriaId": "2E6DBCB3-E912-43A1-914B-5C7CCFAADE25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCF36E2-0B42-4F23-97D6-9E79ECCA8FAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*",
"matchCriteriaId": "E2C67312-E128-4833-A91E-D7A9F96A7AD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*",
"matchCriteriaId": "3F19F408-FABD-4A68-8CDC-C763F0321FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*",
"matchCriteriaId": "68A06EC2-E491-4CD5-9904-61A88EBB7FD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*",
"matchCriteriaId": "789A8CAE-8D9E-4244-880D-FBE28EC53AED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*",
"matchCriteriaId": "F901EE11-D0C9-46F6-8316-D8F4F1D50260",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*",
"matchCriteriaId": "E549F600-B9CE-4843-A772-2DACC528903E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*",
"matchCriteriaId": "3F28E733-87ED-4610-A8EE-BD37BED7685B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2832E8BF-7AC7-444C-B297-66F770860571",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*",
"matchCriteriaId": "44AA72FB-E78D-419E-AA82-B0538C6504D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "687C3BF3-D71A-49AD-8A05-EAC07CBCD949",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "90AF90D9-16C4-4F8A-9868-3E2823E3445C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*",
"matchCriteriaId": "3C063C53-8970-45B1-85F8-FB2080BF4695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "64596ED7-794A-4D23-987B-D9AD59D48EA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "3FDA48F0-0F35-4A8F-8117-B0B28E00AB95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "A561A8E8-79E2-4071-B57D-590C22EF86A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "92E46658-60AB-4758-9236-3AC0E6464383",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "207B8FBA-E2FF-485A-9AD9-E604AE0FB903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "33F99640-C753-40BE-A0A1-4C2D92E7DB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA1EC6D3-01CD-4CAB-817D-AE2E72FD0D03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F98247B-1839-4676-855B-827A4B6C016B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDBA35BD-1048-4B6E-96B2-1CFF615EB49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6CEEEE2-D6A2-4342-8A73-934093948824",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "979FEE9F-A957-43B6-BB6D-1A851D6FA11C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7AF59D-D05E-47F9-B493-B5CD6781FDDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EF7EC93-0170-45A9-86C7-5460320B2AE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A7B1C2-D2CE-485A-9376-27E14F3FA05A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5F803AC-DCC7-43FC-BEB3-AA7984E0506C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "560993AA-299D-42B7-B77F-1BD0D2114CCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C582B1C-1DAC-48FD-82DD-7334C10A2175",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7862B0C-2C44-4110-A62A-083116129612",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "048C5996-F719-4338-B148-0DD1C13E02FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0196DA2F-CFA7-44D0-BDF5-37C7403E3B9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF7FB-AB5A-4549-8C15-E69458C649E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CEF6608-B650-4C77-9823-0AD57B3484F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE6A2D7-901C-45F9-B487-D674047D522E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCFCAC5E-6CF1-4EC1-A24C-688DD1016A96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1ADCB509-5B0E-4592-8B23-EC25A3F79D41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB51691F-089F-4016-B25E-238074B06C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBAAC728-6A0F-4675-9677-AAF7DD5D38ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7E1AFD-9BCE-4487-A8DE-F9C60529CA7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EA37503-FD3D-4220-933C-234631D6EDEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72992831-2A76-456B-A80C-944BDD8591E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A79C2131-5566-4CC2-B6ED-38E3F6964500",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60BFDAA6-3DFC-4908-BC33-B05BAB462F94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6266056-770A-4E2D-A4FC-F1475257648E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "929AA8F3-8BDF-4614-9806-6D4231735616",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "605D7552-8184-4B11-96FD-FE501A6C97DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3144BBDE-CC96-4408-AA02-ECC3BF902A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8BA77A-34E3-4B9E-822A-7B7A90D35790",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7165B43-ED22-4714-8FA4-1E201D1BFA69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67CFB133-FAF0-431A-9765-8A9738D6D87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2975B0F2-DB7C-4257-985A-482ED2725883",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70221E07-3C2E-4A82-8259-AD583EB5CDDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "427DFD78-56CD-43C4-948E-F53AF9D669F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75AD7649-3FEA-4971-9886-6C9312B937A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EE972C-6BAE-4342-BA01-1D685487F9C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27CDFE3B-C064-49A9-BD43-3F7612257A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BD0EEC1-D695-41A5-8CD6-9E987A547CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBF25B8-D474-4C6B-8E45-F57DDC7074E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DF18FD1-6670-4C3C-8000-A079C69D575E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D760EEAF-5CF5-4F25-8FA2-D4F75F4F5A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "921EB5A5-F911-4FCE-A6F1-C66818B34678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13878C13-1C7C-4B83-AF27-4998E8F659DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "023063E1-2DD7-487C-A8A7-939FAEE666A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77255CE6-D7B7-4B48-993C-7100A1170BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B40AC368-3A14-4EFF-A8D0-7EFB4C83045D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C07E80D5-70A5-49C9-9044-D683C7ECCFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63668AF4-F29C-4424-8EC5-2F0A5950DD58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E86616FE-0C3F-4984-A364-8A6A9F01DAD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09C1C7CD-538D-4D7A-A81C-10DF5376A479",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5922F749-2B23-44B8-8A46-F31BCAEAD279",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D75D0EEB-707C-4C86-A569-E91E9F00BA77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FB0E20-0243-40A1-8DEF-37150791222E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68CFF26D-8AD3-4179-9E4C-F06D7C858C9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7541572C-229F-4963-B7F0-06EB3323E53B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85DE669C-27FD-4196-8B8C-1DA4EE4C1D6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "479F7C77-D16F-4E40-9026-3EB8422E0401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A242AC2-9AA6-43FD-90F4-5BF6E80DBB5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04DB08C8-0018-4A8E-A206-097BDDF83B08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7193E85-30BE-42D5-A26B-3F88817F3574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "446E8515-45FC-4B8B-8D12-60643D64C07F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBBDF6B2-D388-4639-87D8-064AA3F6B6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00AAB8B6-B614-4EAA-BA90-C5326CB5D07A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A371DF9-E224-404F-99C2-C2A4607E62D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F40E356-365D-44B7-8C38-A0C89DDD6D3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3132029-89F8-4359-A0DC-A275785266A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B02F5685-0636-48AB-B222-434CA1F3B336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E51FDD60-88E5-4A86-BB8E-4C2D7EDEFA03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ED4693C-DECF-4434-90C0-56158F102E7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB408A6B-0842-43DA-9180-B0A299FCBCE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6215EBAC-7C75-4647-9970-482120897F1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B1BD2B6-1AF6-4AD4-94FA-94B453A21908",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D1FD6E8-80EC-461F-9ED1-CE5912399E80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E96F585E-BDEF-45EE-B0AB-94FE23753AC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "3279C067-3058-4D46-A739-05404FD0E9B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*",
"matchCriteriaId": "DB4DF0A7-8BC2-48AE-9036-FED6EEC57DF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "C0855225-F501-486A-BD03-2A86FD252B5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "214C7B0C-C438-4000-9F9B-6D83294243AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "4C91AA2E-4BB2-49C8-9364-4E363DF42CB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "DA26781F-5A1C-4DA5-835E-D984D697F22B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEA4222-F25D-4457-80AA-6D05CA918D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "9F3E60D1-5CF9-4F96-9EDB-D87F8CF57272",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "F4D321BC-6B1D-4C71-8E16-5A1319CEFD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "6777AC35-9D1F-4153-94AC-B25627D730E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F063F4-8994-4E46-BA7B-A12A112009BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*",
"matchCriteriaId": "4D6F2DE5-AF11-439A-8D37-30CB882ECD58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "E213DD86-5419-42C8-BF38-7795DDB3C582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "A972291E-5231-439D-873B-2F87BCAF800A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "C089CC54-3229-43D7-AA15-73CFA1A43EE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*",
"matchCriteriaId": "EF268D83-C15D-4559-A46F-844E1D9264F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE97C0D-3EA1-4314-A74A-7845C7778FB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "34293F29-F327-4ADD-BF62-78F63F79BB96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*",
"matchCriteriaId": "528C0A46-1CC4-4882-985A-0BB41525BC6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "643F3522-A452-4927-944D-532574EC4243",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "58F40B78-4DBA-44EE-8420-086789EFF53D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "423BFD8F-4B50-43DA-9979-75FD18FBC953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "8BAD4A68-0481-476F-BBBD-3D515331368C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "838CEB7C-7C4C-416C-86CE-6E8DD47EF25B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*",
"matchCriteriaId": "CC7D021F-3C97-45B3-B1F7-0AC26959F22B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A31AEF3-448D-417B-9589-4BA0A06F2FE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A1D96F-7FFD-413F-ABCE-4530C3D63040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB2B08B-D3C7-4B82-B170-471D6CDEFAE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*",
"matchCriteriaId": "4B8343FE-1320-40AE-A37F-70EF1A4AC4B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "CD42BA5A-7DA0-409D-8685-E43CF9B61D9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "A5FF80E9-CF28-4EF6-9CFE-4B500A434674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "7896A6C6-5918-4C27-85AF-6FEEFC7F8FD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "647B77A4-2F49-4989-AF43-961D69037370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "805B1E33-F279-4303-9DF3-C81039A40C1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "B971EA9E-AE5C-4A1D-AD55-8241F7B38C9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7E0AAE-6539-4024-9055-BE0BAD702143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "7F1A8828-0765-4799-AD6C-143F45FAAD23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "12D34618-1CCA-405B-A49C-EB384A09C2C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "575D6061-66BC-4862-BC84-ECD82D436E2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "56B6EE64-1AD4-46B2-BA65-BB6282E56EB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "11650B45-0BDA-42BF-AEF3-83B48DD6A71D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3C92BA-827B-48AF-BBB3-FB60A9053C22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC097E24-F6C9-40D9-95E9-7EFDFA61AFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB44CA7-DFE6-4B1A-9A63-97AE30017E49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "4B305EFA-6226-412C-90EE-F0691F2DDDE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*",
"matchCriteriaId": "7F3874FA-63CB-4B5D-8B64-CE920320A4E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "0800ED17-50E4-43F3-B46C-591DFA818BA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*",
"matchCriteriaId": "A46B0405-F301-4209-8766-6E12EAFAD157",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "F99F9F1F-A967-4884-96CF-4488102DC0A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*",
"matchCriteriaId": "DA9B37AD-4599-425B-B39F-E571F4975266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "C5A5F1CF-A1E6-45F1-8B09-36566778DB57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "698C8A49-888B-4675-B3B0-25EDE2FD515E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "70D98F97-8EF4-48B5-84BE-C3CC27031FDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*",
"matchCriteriaId": "B473D1FA-909B-492E-9C5B-94B0E20E1C0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*",
"matchCriteriaId": "BFD5EA7E-322E-4CE6-89D4-7DB1055C9034",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "67836379-4E1A-45CD-9506-7D3F612E47C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B1BBC61-8664-4452-93A7-DDB4D2E4C802",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4F1B50C-FC5F-47F4-87BC-60E1BD3DD1F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "044F0375-DF2F-4D9B-AD7E-473D34165E8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CEE9B72-5C4C-40C0-A8A7-9DF11655DA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0655CA-A88C-4632-9A18-560E3F63B2F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "8C1454DD-DA51-4CBC-8BB2-09D5AB5777DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "C6965851-3B29-4C21-9556-97FD731EAA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*",
"matchCriteriaId": "52984FD2-44E0-4E91-B290-0376737EEF6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C5D92E2-E718-4247-BA5D-DFE86C0F6AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "DF933366-7503-4F8D-B7AA-F6A16210EC37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "4E2DAF5D-5BB7-49C6-8426-8B547505B6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "3EABB21D-D021-434B-B147-CAF687097A5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*",
"matchCriteriaId": "7609424D-95F1-4493-A20C-B1BA4EC6439D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "966DC636-C802-4D9F-8162-652AFB931203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "A75794EB-A5AF-43F0-985F-D9E36F04C6D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "31C2CFF0-98FD-4A0D-8949-D554B2FE53D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*",
"matchCriteriaId": "05F9217F-5028-4659-AA8E-F60548DE4D52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "4AC769DC-CF2E-4A3C-A610-264F024E6279",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "9B2B1CBF-D155-49BC-81A4-4172F177A5C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "370B2B32-519E-4373-8A04-5C5025D688BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "83D9B562-C279-4A55-A347-F28FC4F9CD12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "2A8C2BA0-48A8-4107-8681-A7C34C553D8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B009DE-A82F-4569-9B42-EC1EC4DA8A40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "683B6E83-37FF-4F9B-915F-059EBB29DB53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "E218718F-4BE6-48B0-A204-9DD4A932A654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB0AB327-B60A-473C-9D36-97766EE62D7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DA249EE-4786-4E27-8787-5E8B88C2AEB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEBD0529-1CF3-44E5-85B3-19A3323C9493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D664EE97-07EC-410F-94C3-AEAB2C6A627D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D31DB981-03B1-4A84-8D87-CD407C3C149F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CBD155D-89D9-4677-A621-4D7613BE65C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D02BD0D4-FFFD-4355-97D8-170362F10B9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6635781A-2651-4EF2-A5AC-AEEEE63FDE6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DCE6930-760A-48C0-B964-1E3ED6A8517C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E52DE90-DF96-4CE7-B8D1-226BA50E4D09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8EB40E7-9B91-4106-B303-2B70AF395BFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB0D5CD-8AF3-409D-96A7-718641D4B90D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E420B0B-0CD5-41C7-B25A-3DB856055F9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B0C295B-0D63-4BE7-830D-D927E00C301C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*",
"matchCriteriaId": "605C340D-2220-4669-B827-9009CB099E8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8791879D-2908-4F57-8DB3-6D24100A9108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEBEDBBA-0427-4DE0-BA8D-737DE7DF80E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E823DC5B-98BE-4656-BFBF-3A7018F8F213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64E8D558-ADE0-4358-9C76-7BD77BF23AA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7973B3D0-F244-4E26-88F5-A2D9BF2E4503",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68E6BAB9-CBA4-4362-BC82-00D2C5CC6FB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD3F4BFF-3CBE-4E4B-8B29-B203F99CFD8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F5CB567-4F86-4466-BE4D-BFF557ACAE0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A52611B-6583-4660-90D7-C9472728072B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E80C6E89-B57C-47BB-8B95-50C03DFB3B96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AB685B-FEE1-41EF-A046-1B34619E12A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB9F6724-967A-4AF0-9896-12BF6164B2CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC1116BF-12D7-47CC-98DB-18B200CF9C16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBB28DE-726B-4AF0-88A5-35987E1E648B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA1DB22-8FBF-4CF6-AA96-5B68EE28877D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1880E2B8-5E0E-4603-8D17-3ABA43D28179",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FAFBB92-1917-4238-832B-195FBE418271",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91DFDF3F-9A3F-42B8-99A1-A3F76B198358",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8778F972-BF34-482F-9FA7-71A77F6138E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F288BB0-FE7A-4900-B227-BE80E4F4AADF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A8DC53A-90C6-47FE-89F1-A1FE8B1C07A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E16338-A094-4CA9-B77F-6FE42D3B422C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E07AB33-5351-487D-9602-495489C7C0B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22115ED6-1707-4840-B0D1-AD36BC0C75A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7C633BC-831F-4CB7-9D62-16693444B216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CF5EE7E-F41B-44EC-9F69-7963B1BF1FB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DD501E1-E78F-44C6-8A13-C29337B07EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9085BA0B-B7E2-4908-90C0-B4183891C718",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2267CB8-0EE9-4DBD-AD5F-8A13BB62673C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81971C2F-137A-4F11-8C93-3B99D4CD1B58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98E0BDAC-398E-406B-B2DB-AE049D6E98B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCB66D7E-B465-4A8B-8CBD-7E93CCA2CD6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86AFDE6C-DE58-4C4D-882E-474EF6C3D934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*",
"matchCriteriaId": "950C6BF9-AA47-4287-AC01-D183237490FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2355181D-D8EE-4F80-8280-13D5CBCF4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5209343F-66B0-4DC0-9111-E2E64CFF7409",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "720109A6-B79E-48E1-9AE7-7708B154788E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82FF0DBD-AE13-4232-80F7-F4C2E2CC9721",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E944ED-8C02-46B8-BF95-0CE4C352753B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77AEA3D1-4846-46E2-9B80-20B19F00DC11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1576978F-E93D-4A47-90B6-6A4E3A7DE558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D339FE5-001F-4005-88A5-CFFE37F9B63E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BDABA86-497E-497E-A5BA-46F913A4840A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD886F4C-DB6F-4DDD-9807-8BCBB625C226",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E16912A-7F6A-4A2B-B70F-D1FCD34BC7DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4C454B7-E5F4-4AAE-B577-FD71FA002C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38BE2781-3A06-4D62-AC8B-68B721DA526B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9AE4EA5-B8C8-4AE2-9614-F9DBDB4D79DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DA23772-2EB8-4BEE-8703-26D967EC4503",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72DC766A-B1F9-4B83-9F9B-CF603EE476BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA594740-43C5-4F42-BA5B-00CA8AE7BB60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "572B16E2-8118-43A0-9A80-5D96831D55FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FB5C551-BADC-4A3A-93E5-2EBCA0704C51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5383B7A3-1569-4FEB-B299-B87CE8C8A87B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A05BBDE0-6C47-4489-9455-7DA7D230ECA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1789AA69-EA31-44D1-82E6-228E48E18586",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A7D5FF-3B1F-4C64-BB81-7A349765520D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D93A92E9-C8D2-4F6E-A5CA-E8AFFEEC7E13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F0498B3-393A-4C32-B338-E6014B956755",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C451F752-6869-4AFA-BAE5-5C9A54427BF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83710FD1-099B-436D-9640-061D515E10BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "517B71CE-6156-40E1-B068-A2B733E205E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11DEEEE5-5055-4CE1-962C-C5F075F4CC02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8718DDAB-3208-48CF-9BCE-54DA1257C16A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE1AA901-E822-4240-9D82-C9311E4F87B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1CDE3DF-8E79-4997-94EB-B517FFCAE55C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12A0DE13-EB0B-493B-BC84-3AEB3D454776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1727697B-1F59-4E29-B036-C32E9076C523",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E69E827C-C0D0-46C7-913A-1C1E02CEAACE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2528F3F9-34DC-41DA-8926-382CB3EF5560",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E452C262-5A8D-4D97-BC7F-A4F5FF53A659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D57BF69-D750-4278-98AA-976B0D28E347",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76ADAE30-6CAD-4F5B-B6F7-C18953144C63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A25D792-E21D-43EE-8B9D-67DE066DE5DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C669783-C058-4B4F-BB9A-84B2C4682247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "159B088B-9A85-4CAA-854A-AA080E528F95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBE74A94-FE8F-4749-A35A-AB7D57E24913",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "990AC341-0E67-4A81-87E9-EE3EFD9E847E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53BC18B0-58F1-4477-9978-CA7383C197FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "474992FB-842D-4661-A565-44AF2CD78693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "476E1B79-5342-4895-96D7-E97DFC1F5334",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD318D5-89A6-4E28-939C-C5B61396806B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "981AD3FF-1D14-4ECD-8B6F-BCEB7F2409AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A32C7E89-32ED-4328-9313-FA7D3DDBDC58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2792EED8-2CBD-478E-BC09-05FE830B3147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97B1AF2F-6E48-4DBD-A60E-3088CA4C3771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*",
"matchCriteriaId": "34E1691D-65B3-45E4-A544-8B29E38D569D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*",
"matchCriteriaId": "E42F2703-B8AB-410E-AF7B-CD0BE777F061",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*",
"matchCriteriaId": "31244C94-00A3-499C-A91A-1BEF2FB0E6B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*",
"matchCriteriaId": "878FF6E8-8A6D-44CE-9DD1-2C912AB8A193",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "5078A95B-2BD8-4A37-A356-F53D1A53CB37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*",
"matchCriteriaId": "0BFE67CD-DE53-4C4E-8245-35902AEFA6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*",
"matchCriteriaId": "9F231D31-3AAD-4C5D-A225-D2DF94486718",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "5998DF5D-E785-45EC-B8D0-1F4EC4F96D50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "EADFD013-0BFB-427C-98E6-F9E4774DCBC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "58620B10-FEA6-456D-B6B5-2745F5DBE82D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*",
"matchCriteriaId": "E8F698B1-D9CF-4FE5-933D-EFCEA3056E3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "4858A1F0-97F2-4258-AB98-027BF1EC5117",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "3C961A8B-EAFD-4F66-9432-BCC0D154ECCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "052DE6CD-A1E7-4E81-B476-66EF451061C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*",
"matchCriteriaId": "3BE1AE1E-6FC0-41D8-857C-C5A99CAF5823",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "751B3AC8-D45E-46B6-83D5-311B693F3C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "9588277A-0B97-4408-9CF7-11271CDAADD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "479FE854-85E5-4ED0-BFAF-2618C9053082",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*",
"matchCriteriaId": "E048B9BF-77C8-49F7-9F2D-9999F79BA264",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "6CD16D4D-E816-486D-96F4-5A2BF75B959F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "169C558E-1A83-47D5-A66B-035BD1DD56FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "D683E509-3FB2-4175-BCAB-4EB1B5C04958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCFA915-5445-4732-9F8F-D7561BA4177F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "63A9FD98-C22D-48F6-87A1-60791C818A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "85F99F24-1783-4E6E-BE61-04C2E80356ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "74CC7EB9-3F59-4C0A-B3A1-984BCCFB25BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*",
"matchCriteriaId": "85289E4C-C813-4677-867D-EE8E98F4A1A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "27C8150F-BEFA-406D-9F0D-E7CB187E26AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*",
"matchCriteriaId": "1E807F90-819F-4103-B1F7-4CE46971BD63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "CD93203F-71B9-4F87-B5D8-FD273451C8A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "1E652C74-C48D-4F29-9E85-09325632443F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "99158191-3013-4182-8A53-5DFCA1E2C60A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*",
"matchCriteriaId": "F7E39A3E-7EAE-47C9-930B-58A980B73FC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*",
"matchCriteriaId": "FFDA54BA-C00D-4890-9B7F-328257607B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*",
"matchCriteriaId": "1F5EFB1E-334C-4B55-8E2E-6AE19B34774D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "B8260DCA-2F0C-45F7-B35F-D489AF5639F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "7778F81B-6D05-4666-B1D4-53DB0EC16858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*",
"matchCriteriaId": "5DC6706A-61F7-4AA0-B2FF-0FFDF739A644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "7EF1B16B-02F2-4ECA-938E-B5CDCFC67816",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "3C5501D8-1B0D-4F5A-AFD7-C63181D3281F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "1751F0CE-A0D3-40E2-8EEC-D31141FE33A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "5FF9AFA7-BBE8-4229-94CB-5A9596728BA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*",
"matchCriteriaId": "E23A777F-68A4-4217-A75A-4D8A27E6451A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA27DFB-CDD1-4F52-86B3-DB2320A9C7B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "392A4337-11F6-4980-A138-4FDBCAD0EBA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "E2E9BB67-F1FF-4190-889F-78B965CCE934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "F4185A70-5D10-448E-A9AB-AA9D5CDF0FF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "35607317-0928-4297-A33E-D44BEE1BBEC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "D48323B1-7FEB-451F-A064-23E7CE7F6403",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "29EF4E8A-EF37-4DCC-B5D4-DA89AF31DD18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "F5763189-7980-4A72-92C9-1908FE9E15EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "C53ACD49-DA21-4DDE-A0AA-FCCD59D29886",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "4326D350-EBC2-48E6-A2C6-0499F6826CEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "8594E6FE-B6DB-4343-B3DD-AEC19923DAF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "5BCADA00-E453-414D-9933-FCB43D21BBC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "E62212D9-F707-4A8E-AB2A-A3985E7A4049",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "561755A8-8AAD-4F41-8266-747EFDAF2D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "E6F4BB0F-DAF4-479B-B78A-7929C151AA1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "A207312E-1D35-4464-A111-22C4C793E146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B16E32-07D5-445B-BAA5-4E4A0881BFC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "7CF08F6B-2ECB-414C-82D7-C06085BF8B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "21032BE3-74D8-4C3F-B461-158F475B6853",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*",
"matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*",
"matchCriteriaId": "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*",
"matchCriteriaId": "C04EDD71-15B3-4085-828C-BB7A43DBDCC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1BA7AC-989B-4093-841A-C6D5978BF17F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*",
"matchCriteriaId": "1874F848-B15B-4369-A164-5FA11D2B9AFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*",
"matchCriteriaId": "9E46F934-9765-43ED-88A7-A4778C99A976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*",
"matchCriteriaId": "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*",
"matchCriteriaId": "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*",
"matchCriteriaId": "B206674F-1A34-470B-820C-05F9C37792CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*",
"matchCriteriaId": "63AE2051-9F8E-4477-8E1E-38A1E06AD247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*",
"matchCriteriaId": "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*",
"matchCriteriaId": "3EDC0FCF-BD22-42AD-8044-9A64215B91CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*",
"matchCriteriaId": "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*",
"matchCriteriaId": "E95A34F0-0B74-4031-BC9E-CBC93665BE68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*",
"matchCriteriaId": "0BB22DF7-15CE-4340-A05F-BD39FCA41F50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA72DC8-2E4E-453A-A3FB-20F31D32B973",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*",
"matchCriteriaId": "758E45B6-7C7A-432D-891D-CB99077AE3B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*",
"matchCriteriaId": "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*",
"matchCriteriaId": "26D7A401-BCE1-4673-93C9-67F009B75A39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*",
"matchCriteriaId": "6E62119B-2A65-4473-B570-F118614B0ED6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*",
"matchCriteriaId": "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*",
"matchCriteriaId": "8F83F9F9-D2DB-4D40-AD61-29E66B050B45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*",
"matchCriteriaId": "91BE6238-312E-4CF7-9E74-48CB5603B0FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*",
"matchCriteriaId": "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*",
"matchCriteriaId": "33BA1BE0-0A78-4E94-A619-35735C913180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*",
"matchCriteriaId": "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*",
"matchCriteriaId": "24CA40FE-80C5-4A20-8219-CEF51F3162FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*",
"matchCriteriaId": "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*",
"matchCriteriaId": "33E8F127-6EAE-4302-BD52-7C3FCCA307D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*",
"matchCriteriaId": "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E468FE-73BE-4B20-B774-58EC7CD20CDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF6B19B-7D45-44B3-8524-407253B93EEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*",
"matchCriteriaId": "2B803FAD-E54D-49FE-A078-029B8FFBBB98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*",
"matchCriteriaId": "CC511505-ED67-45B4-B76C-56AB750C4408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*",
"matchCriteriaId": "A430C232-79EB-4264-AE24-41D4A2A5D990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*",
"matchCriteriaId": "3A9E3D4B-A3DF-4858-8C64-0316B6E57435",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*",
"matchCriteriaId": "19108672-E1AA-41CC-B86C-061D3721C8B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*",
"matchCriteriaId": "200D36CF-AEDE-4183-8C54-748E6E5A3218",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*",
"matchCriteriaId": "4CF13A44-5163-4282-8EE8-7DC05499B5E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*",
"matchCriteriaId": "827C12CE-D87D-489D-ABA7-BE0405EC33D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*",
"matchCriteriaId": "16AA78F7-520B-4FFC-838C-DC74FEE8E13F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*",
"matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*",
"matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*",
"matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*",
"matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*",
"matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*",
"matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*",
"matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*",
"matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*",
"matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*",
"matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*",
"matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*",
"matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*",
"matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*",
"matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*",
"matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*",
"matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*",
"matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*",
"matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*",
"matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*",
"matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:*",
"matchCriteriaId": "A51E86F5-8F94-4E7C-9A63-DAA3FCBE0438",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*",
"matchCriteriaId": "001AB619-157E-40B4-B86C-5DB18245D62F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:*",
"matchCriteriaId": "1221FB4F-488A-4A52-8788-82ECBF92113B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*",
"matchCriteriaId": "38D51E27-28A3-47A1-9C36-1A223858E352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*",
"matchCriteriaId": "365DF3EF-E7D1-41FC-8382-D3B095542D59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B2B122-34A9-4534-A996-8FEAACA71A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*",
"matchCriteriaId": "C850453B-CDB1-490D-B551-9AC0B27D8A67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*",
"matchCriteriaId": "588D4F37-0A56-47A4-B710-4D5F3D214FB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_firmware:2010:-:*:*:*:*:*:*",
"matchCriteriaId": "7151A19C-0AE5-4F66-9E3D-8BF675A8430C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_firmware:2010:sp1:*:*:*:*:*:*",
"matchCriteriaId": "BEEB72F4-AE57-49DD-8876-1BCA7B805692",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_firmware:2010:sp2:*:*:*:*:*:*",
"matchCriteriaId": "7929F123-AC76-4F49-940F-558CABC25E75",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_winac_rtx_\\(f\\)_2010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6034789-ABD1-4035-8378-F0BA7157B087",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A9317C01-22AA-452B-BBBF-5FAFFFB8BEA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C4534CF9-D9FD-4936-9D8C-077387028A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D60384BD-284C-4A68-9EEF-0FAFDF0C21F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA8DD5B-8A34-4CB3-B0FB-F82C73B25007",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C403C49F-3779-4A7A-8D12-B4A32BFD77CF",
"versionEndExcluding": "5.1.32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AEC1DE4-F01C-4D21-8FB6-A0D4460D6CD0",
"versionEndExcluding": "5.2.6",
"versionStartIncluding": "5.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis."
},
{
"lang": "es",
"value": "Los sistemas con microprocesadores con ejecuci\u00f3n especulativa y predicci\u00f3n indirecta de ramas podr\u00edan permitir la revelaci\u00f3n no autorizada de informaci\u00f3n al atacante con acceso de usuario local mediante un an\u00e1lisis de un canal lateral."
}
],
"id": "CVE-2017-5715",
"lastModified": "2025-05-06T15:15:51.640",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.1,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.1,
"impactScore": 4.0,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2018-01-04T13:29:00.227",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"
},
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"
},
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"
},
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"
},
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
},
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
},
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
},
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"
},
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"
},
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"
},
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
},
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
},
{
"source": "secure@intel.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/584653"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/102376"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040071"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "http://xenbits.xen.org/xsa/advisory-254.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"
},
{
"source": "secure@intel.com",
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"
},
{
"source": "secure@intel.com",
"tags": [
"Patch",
"Third Party Advisory",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"source": "secure@intel.com",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Jun/36"
},
{
"source": "secure@intel.com",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Nov/16"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201810-06"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.paloaltonetworks.com/CVE-2017-5715"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://spectreattack.com/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.citrix.com/article/CTX231399"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K91229003"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3531-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3531-3/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3540-2/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3541-2/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3542-2/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3549-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3560-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3561-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3580-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3581-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3581-2/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3582-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3582-2/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3594-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3597-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3597-2/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3620-2/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3690-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/usn/usn-3516-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4120"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4187"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4188"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4213"
},
{
"source": "secure@intel.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/43427/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_01"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/584653"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/102376"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040071"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://xenbits.xen.org/xsa/advisory-254.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Jun/36"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Nov/16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201810-06"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.paloaltonetworks.com/CVE-2017-5715"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://spectreattack.com/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.citrix.com/article/CTX231399"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K91229003"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3531-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3531-3/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3540-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3541-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3542-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3549-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3560-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3561-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3580-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3581-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3581-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3582-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3582-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3594-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3597-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3597-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3620-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3690-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/usn/usn-3516-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4120"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4188"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4213"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/43427/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-203"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-203"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
ICSA-23-257-04
Vulnerability from csaf_cisa - Published: 2023-09-12 00:00 - Updated: 2023-09-12 00:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Insyde has published information on vulnerabilities in Insyde BIOS up to \nAugust 2023. These vulnerabilities also affect the RUGGEDCOM APE1808 product family.\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-957369: Insyde BIOS Vulnerabilities in RUGGEDCOM APE1808 Product Family - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-957369.json"
},
{
"category": "self",
"summary": "SSA-957369: Insyde BIOS Vulnerabilities in RUGGEDCOM APE1808 Product Family - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-957369.html"
},
{
"category": "self",
"summary": "SSA-957369: Insyde BIOS Vulnerabilities in RUGGEDCOM APE1808 Product Family - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-957369.pdf"
},
{
"category": "self",
"summary": "SSA-957369: Insyde BIOS Vulnerabilities in RUGGEDCOM APE1808 Product Family - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-957369.txt"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-257-04 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-257-04.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-257-04 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-257-04"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens RUGGEDCOM APE1808 Products",
"tracking": {
"current_release_date": "2023-09-12T00:00:00Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1"
}
},
"id": "ICSA-23-257-04",
"initial_release_date": "2023-09-12T00:00:00Z",
"revision_history": [
{
"date": "2023-09-12T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 ADM (6GK6015-0AL20-0GL0)",
"product_id": "1",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GL0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 ADM (6GK6015-0AL20-0GL0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 ADM CC (6GK6015-0AL20-0GL1)",
"product_id": "2",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GL1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 ADM CC (6GK6015-0AL20-0GL1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 CKP (6GK6015-0AL20-0GK0)",
"product_id": "3",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GK0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 CKP (6GK6015-0AL20-0GK0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 CKP CC (6GK6015-0AL20-0GK1)",
"product_id": "4",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GK1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 CKP CC (6GK6015-0AL20-0GK1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 CLOUDCONNECT (6GK6015-0AL20-0GM0)",
"product_id": "5",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GM0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 CLOUDCONNECT (6GK6015-0AL20-0GM0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 CLOUDCONNECT CC (6GK6015-0AL20-0GM1)",
"product_id": "6",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GM1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 CLOUDCONNECT CC (6GK6015-0AL20-0GM1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 ELAN (6GK6015-0AL20-0GP0)",
"product_id": "7",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GP0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 ELAN (6GK6015-0AL20-0GP0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 ELAN CC (6GK6015-0AL20-0GP1)",
"product_id": "8",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GP1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 ELAN CC (6GK6015-0AL20-0GP1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 SAM-L (6GK6015-0AL20-0GN0)",
"product_id": "9",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GN0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 SAM-L (6GK6015-0AL20-0GN0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 SAM-L CC (6GK6015-0AL20-0GN1)",
"product_id": "10",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GN1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 SAM-L CC (6GK6015-0AL20-0GN1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-P (6GK6015-0AL20-1AA0)",
"product_id": "11",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AA0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-P (6GK6015-0AL20-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-P CC (6GK6015-0AL20-1AA1)",
"product_id": "12",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AA1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-P CC (6GK6015-0AL20-1AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-S1 (6GK6015-0AL20-1AB0)",
"product_id": "13",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AB0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-S1 (6GK6015-0AL20-1AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-S1 CC (6GK6015-0AL20-1AB1)",
"product_id": "14",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AB1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-S1 CC (6GK6015-0AL20-1AB1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-S3 (6GK6015-0AL20-1AD0)",
"product_id": "15",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AD0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-S3 (6GK6015-0AL20-1AD0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-S3 CC (6GK6015-0AL20-1AD1)",
"product_id": "16",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AD1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-S3 CC (6GK6015-0AL20-1AD1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-S5 (6GK6015-0AL20-1AF0)",
"product_id": "17",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AF0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-S5 (6GK6015-0AL20-1AF0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-S5 CC (6GK6015-0AL20-1AF1)",
"product_id": "18",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AF1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-S5 CC (6GK6015-0AL20-1AF1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808LNX (6GK6015-0AL20-0GH0)",
"product_id": "19",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GH0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808LNX (6GK6015-0AL20-0GH0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808LNX CC (6GK6015-0AL20-0GH1)",
"product_id": "20",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GH1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808LNX CC (6GK6015-0AL20-0GH1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808W10 (6GK6015-0AL20-0GJ0)",
"product_id": "21",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GJ0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808W10 (6GK6015-0AL20-0GJ0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808W10 CC (6GK6015-0AL20-0GJ1)",
"product_id": "22",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GJ1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808W10 CC (6GK6015-0AL20-0GJ1)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "An attacker with local access to the system could potentially disclose information\r\nfrom protected memory areas via a side-channel attack on the processor cache.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2021-38578",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2021-38578"
},
{
"cve": "CVE-2022-24350",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in IhisiSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. IHISI function 0x17 verifies that the output buffer lies within the command buffer but does not verify that output data does not go beyond the end of the command buffer. In particular, the GetFlashTable function is called directly on the Command Buffer before the DataSize is check, leading to possible circumstances where the data immediately following the command buffer could be destroyed before returning a buffer size error.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-24350"
},
{
"cve": "CVE-2022-24351",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "Using SPI injection, it is possible to modify the FDM contents after it has been measured. This TOCTOU attack could be used to alter data and code used by the remainder of the boot process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-24351"
},
{
"cve": "CVE-2022-27405",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Some versions of InsydeH2O use the FreeType tools to embed fonts into the BIOS. InsydeH2O does not use the FreeType API at runtime and usage during build time does not produce a vulnerability in the BIOS. The CVSS reflects this limited usage.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-27405"
},
{
"cve": "CVE-2022-29275",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In UsbCoreDxe, untrusted input may allow SMRAM or OS memory tampering Use of untrusted pointers could allow OS or SMRAM memory tampering leading to escalation of privileges. This issue was discovered by Insyde during security review. https://www.insyde.com/security-pledge/SA-2022058",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-29275"
},
{
"cve": "CVE-2022-30283",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "In UsbCoreDxe, tampering with the contents of the USB working buffer using DMA while certain USB transactions are in process leads to a TOCTOU problem that could be used by an attacker to cause SMRAM corruption and escalation of privileges The UsbCoreDxe module creates a working buffer for USB transactions outside of SMRAM. The code which uses can be inside of SMM, making the working buffer untrusted input. The buffer can be corrupted by DMA transfers. The SMM code code attempts to sanitize pointers to ensure all pointers refer to the working buffer, but when a pointer is not found in the list of pointers to sanitize, the current action is not aborted, leading to undefined behavior. This issue was discovered by Insyde engineering based on the general description provided by Intel\u0027s iSTARE group. Fixed in: Kernel 5.0: Version 05.09. 21 Kernel 5.1: Version 05.17.21 Kernel 5.2: Version 05.27.21 Kernel 5.3: Version 05.36.21 Kernel 5.4: Version 05.44.21 Kernel 5.5: Version 05.52.21 https://www.insyde.com/security-pledge/SA-2022063",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-30283"
},
{
"cve": "CVE-2022-30772",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Manipulation of the input address in PnpSmm function 0x52 could be used by malware to overwrite SMRAM or OS kernel memory. Function 0x52 of the PnpSmm driver is passed the address and size of data to write into the SMBIOS table, but manipulation of the address could be used by malware to overwrite SMRAM or OS kernel memory. This issue was discovered by Insyde engineering during a security review. This issue is fixed in: Kernel 5.0: 05.09.41 Kernel 5.1: 05.17.43 Kernel 5.2: 05.27.30 Kernel 5.3: 05.36.30 Kernel 5.4: 05.44.30 Kernel 5.5: 05.52.30 https://www.insyde.com/security-pledge/SA-2022065",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-30772"
},
{
"cve": "CVE-2022-32469",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "DMA attacks on the PnpSmm shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-32469"
},
{
"cve": "CVE-2022-32470",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "DMA attacks on the FwBlockServiceSmm shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-32470"
},
{
"cve": "CVE-2022-32471",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "DMA attacks on the IHISI command buffer could cause TOCTOU issues which could lead to corruption of SMRAM and escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-32471"
},
{
"cve": "CVE-2022-32475",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "DMA attacks on the VariableRuntimeDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-32475"
},
{
"cve": "CVE-2022-32477",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "DMA attacks on the FvbServicesRuntimeDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-32477"
},
{
"cve": "CVE-2022-32953",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "DMA attacks on the SdHostDriver buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-32953"
},
{
"cve": "CVE-2022-32954",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "DMA attacks on the SdMmcDevice buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-32954"
},
{
"cve": "CVE-2022-35893",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM memory corruption vulnerability in the FvbServicesRuntimeDxe driver allows an attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-35893"
},
{
"cve": "CVE-2022-35894",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. The SMI handler for the FwBlockServiceSmm driver uses an untrusted pointer as the location to copy data to an attacker-specified buffer, leading to information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-35894"
},
{
"cve": "CVE-2022-35895",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. The FwBlockSericceSmm driver does not properly validate input parameters for a software SMI routine, leading to memory corruption of arbitrary addresses including SMRAM, and possible arbitrary code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-35895"
},
{
"cve": "CVE-2022-35896",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue SMM memory leak vulnerability in SMM driver (SMRAM was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An attacker can dump SMRAM contents via the software SMI provided by the FvbServicesRuntimeDxe driver to read the contents of SMRAM, leading to information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-35896"
},
{
"cve": "CVE-2022-36338",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM callout vulnerability in the SMM driver FwBlockServiceSmm, creating SMM, leads to arbitrary code execution. An attacker can replace the pointer to the UEFI boot service GetVariable with a pointer to malware, and then generate a software SMI.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-36338"
},
{
"cve": "CVE-2023-24932",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"notes": [
{
"category": "summary",
"text": "An attacker who has physical access or Administrative rights to a target device could install an affected boot policy which could bypass Security Boot.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2023-24932"
},
{
"cve": "CVE-2023-27373",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. Due to insufficient input validation, an attacker can tamper with a runtime-accessible EFI variable to cause a dynamic BAR setting to overlap SMRAM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2023-27373"
},
{
"cve": "CVE-2023-31041",
"cwe": {
"id": "CWE-256",
"name": "Plaintext Storage of a Password"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in SysPasswordDxe in Insyde InsydeH2O with kernel 5.0 through 5.5. System password information could optionally be stored in cleartext, which might lead to possible information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2023-31041"
}
]
}
CERTFR-2018-ALE-001
Vulnerability from certfr_alerte - Published: - Updated:
[Mise à jour du 25/05/2018 : ajout de bulletins Microsoft (cf. section Documentation)]
[Mise à jour du 22/05/2018 : publications de nouvelles variantes]
[Mise à jour du 23/02/2018 : annonce d'Intel sur la sortie des mises à jour des micrologiciels (cf. section Solution)]
[Mise à jour du 12/02/2018 : ajout des bulletins de sécurité VMware, RedHat et SUSE (cf. section Solution)]
[Mise à jour du 23/01/2018 : modification des recommandations suite au communiqué d'Intel (cf. section Solution)]
Le 4 janvier 2018, deux vulnérabilités affectant plusieurs familles de processeurs et pouvant conduire à des fuites d'informations ont été rendues publiques [1][2]. Intitulées Spectre et Meltdown, ces deux vulnérabilités ont reçu les identifiants CVE-2017-5715, CVE-2017-5753 pour Spectre et CVE-2017-5754 pour Meltdown. Le 21 mai 2018, deux nouvelles vulnérabilités identifiées CVE-2018-3639 et CVE-2018-3640, reposant sur des principes similaires, ont également été publiées [42].
Vulnérabilité Meltdown
Les processeurs modernes intègrent plusieurs fonctionnalités visant à améliorer leurs performances. Parmi celles-ci, l'exécution dite out-of-order permet d'exécuter les instructions d'un programme en fonction de la disponibilité des ressources de calculs et plus nécessairement de façon séquentielle. Une faiblesse de ce mécanisme peut cependant conduire à l'exécution d'une instruction sans que le niveau de privilèges requis par celle-ci ne soit correctement vérifié. Bien que le résultat de l'exécution d'une telle instruction ne soit pas validé par la suite, il peut être possible de récupérer l'information en utilisant une attaque par canaux cachés.
La vulnérabilité CVE-2017-5754 exploite l’exécution out-of-order sur des instructions requérant un haut niveau de privilège pour permettre l'accès en lecture à des zones mémoires propres au système d’exploitation depuis du code s’exécutant de façon non-privilégiée. En particulier, l'exploitation de cette vulnérabilité permet d'accéder depuis un programme utilisateur à la mémoire du système d'exploitation. Cela peut conduire à des fuites de données sensibles présentes en mémoire et peut inclure des informations d'autres programmes ou encore des clés de chiffrement. Cette fuite d'informations peut aussi être mise en œuvre pour faciliter la compromission d'un système.
La vulnérabilité CVE-2018-3640 exploite l’exécution out-of-order sur des instructions requérant un haut niveau de privilège pour permettre l'accès en lecture à des registres propres au système d’exploitation depuis du code s’exécutant de façon non-privilégiée. En particulier, l'exploitation de cette vulnérabilité permet d'accéder depuis un programme utilisateur à des paramètres de configuration du processeur. Cette fuite d'informations peut aussi être mise en œuvre pour faciliter la compromission d'un système.
Vulnérabilité Spectre
L'exécution spéculative est une seconde technique d'optimisation utilisée par les processeurs modernes. Les dépendances entre les instructions limitent les possibilités d'exécution out-of-order. Pour remédier à cette limitation, le processeur émet des hypothèses concernant les résultats non encore disponibles. Ceci lui permet de poursuivre l’exécution out-of-order en utilisant ces hypothèses en remplacement des résultats attendus. On parle alors d'exécution spéculative. Ces hypothèses sont vérifiées par le processeur dès que les résultats auxquels elles se rapportent deviennent disponibles. Si elles se révèlent correctes, le processeur valide l'exécution spéculative. Mais inversement, si elles se révèlent erronées, les effets de l'exécution spéculative doivent être annulés et l'exécution doit reprendre au point on les hypothèses erronées avaient été émises, c'est à dire là où l'exécution spéculative avait débutée.
Cependant les effets d'une exécution spéculative erronée sur le cache perdurent. Or, en mesurant des temps d'accès à des zones mémoires, il est possible de connaître l'état du cache. Par conséquent, un attaquant sera capable de déterminer les résultats intermédiaires d'une exécution spéculative erronée si ceux-ci influent sur l'état du cache. Cette utilisation du cache pour mener à bien l'exploitation est commune aux trois variantes de Spectre.
Variante 1 (CVE-2017-5753)
Le prédicteur de branches est un composant du processeur utilisé pour émettre des hypothèses concernant l'adresse de la prochaine instruction à exécuter. En particulier, il est utilisé pour prédire l'issue des sauts conditionnels. D'autre part, ce composant est partagé entre des codes s'exécutant dans des cloisonnements de sécurité différents (processus, niveaux de privilège).
Dans la variante 1 de Spectre, un attaquant influe sur les heuristiques du prédicteur de branches pour fausser la prédiction d'un saut conditionnel s’exécutant dans un autre cloisonnement de sécurité, ce qui a pour effet de déclencher une exécution spéculative erronée. Un code est vulnérable si cette exécution spéculative erronée modifie le cache de façon qui dépende d'une valeur secrète (c'est à dire non directement accessible depuis le cloisonnement dans lequel se situe l'attaquant).
Exemple de code vulnérable fourni dans l'article:
[pastacode lang="c" manual="if%20(x%20%3C%20array1_size)%0Ay%20%3D%20array2%5Barray1%5Bx%5D%20*%20256%5D%3B" message="" highlight="" provider="manual"/]
Un attaquant maîtrisant la valeur de x peut obtenir une lecture arbitraire dans l'espace d'adressage du processus exécutant le code ci-dessus. Pour cela, l'attaquant commence par soumettre un grand nombre de x valides (c'est à dire vérifiant la condition de la ligne 1) pour faire croire au prédicteur de branches que la condition ligne 1 est toujours vraie. Puis il soumet un x pointant à une adresse arbitraire. Le prédicteur de branches estime néanmoins que la condition est vraie, ce qui déclenche l'exécution spéculative de la ligne 2. La valeur secrète pointée par x est récupérée puis utilisée pour former l'adresse d'une seconde lecture mémoire. Cette seconde lecture aura un effet sur le cache décelable par l'attaquant qui sera alors en mesure de retrouver la valeur secrète.
Variante 2 (CVE-2017-5715)
Le prédicteur de branches est également utilisé pour prédire l'issue des sauts indirects. Dans la variante 2 de Spectre, un attaquant influe sur les heuristiques du prédicteur de branches pour fausser la prédiction d'un saut indirect s’exécutant dans un autre cloisonnement de sécurité, ce qui a pour effet de déclencher une exécution spéculative erronée à une adresse arbitraire maîtrisée par l'attaquant. En choisissant correctement le code exécuté spéculativement, l'attaquant est alors capable d'obtenir une lecture arbitraire dans l'espace d'adressage du processus victime.
Variante 3 (CVE-2018-3639)
Les processeurs émettent également des hypothèses concernant l'adresse de certains accès mémoire. Pour bénéficier de plus de libertés dans l'ordre d'exécution d'opérations de lecture mémoire, le processeur va devoir prédire si celles-ci chevauchent des opérations d'écriture en attente d'exécution. Si une opération de lecture ne chevauche aucune opération d'écriture en attente d'exécution, rien ne s'oppose à qu'elle puisse être exécutée de façon anticipée.
Dans la variante 3 de Spectre, un attaquant influe sur les heuristiques du processeur utilisées pour la prédiction d'adresses, ce qui a pour effet de déclencher une exécution spéculative erronée d'une opération de lecture mémoire et des instructions qui en dépendent. Un code est vulnérable si cette exécution spéculative erronée manipule une valeur secrète et la laisse fuir à travers un état observable du cache
Microsoft (une des parties ayant découvert la vulnérabilité) [43] affirme ne pas avoir identifié de code vulnérable dans leurs produits, ce qui laisse penser que les codes vulnérables sont peu fréquents.
Impact
Les vulnérabilités décrites dans cette alerte peuvent impacter tous les systèmes utilisant un processeur vulnérable et donc de façon indépendante du système d'exploitation. Selon les chercheurs à l'origine de la découverte de ces failles, il est ainsi possible d'accéder à l'intégralité de la mémoire physique sur des systèmes Linux et OSX et à une part importante de la mémoire sur un système Windows.
On notera que l'impact peut être plus particulièrement important dans des systèmes de ressources partagés de type conteneur (Docker, LXC) où il serait possible depuis un environnement restreint d'accéder à toutes les données présentes sur la machine physique dans lequel s'exécute le conteneur ou encore dans des environnements virtualisés utilisant la para-virtualisation de type Xen.
Preuve de concept
Le CERT-FR constate que des preuves de concept fonctionnelles pour Meltdown sont désormais publiques. Les règles Yara suivantes servent à détecter les binaires liés à la bibliothèque publiée par l'Institute of Applied Information Processing and Communications (IAIK) :
[pastacode lang="c" manual="rule%20meltdown_iaik_libkdump_meltdown_nonull%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown_nonull%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%2F*%0A%0A.text%3A00000000000018A6%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20%20rax%2C%20rax%20%20%20.text%3A00000000000018A9%0A%0A.text%3A00000000000018A9%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20loc_18A9%3A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3B%20CODE%20XREF%3A%20libkdump_read_tsx%2B48j%0A%0A.text%3A00000000000018A9%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A00000000000018AB%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A00000000000018AF%2074%20F8%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jz%20%20%20%20%20%20%20%20short%20loc_18A9%0A%0A.text%3A00000000000018B1%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A*%2F%0A%0A%24asm%3D%7B%0A%0A48%2031%20C0%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A74%20F8%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%20%24asm%0A%0A%7D%0A%0A%0Arule%20meltdown_iaik_libkdump_meltdown_fast%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown_fast%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%20%20%20%20%2F*%0A%0A.text%3A000000000000184F%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20%20%20rax%2C%20rax%0A%0A.text%3A0000000000001852%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A0000000000001854%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A0000000000001858%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A*%2F%0A%0A%24asm%20%3D%20%7B%0A%0A48%2031%20C0%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%0A%0A%24asm%0A%0A%7D%0A%0A%0Arule%20meltdown_iaik_libkdump_meltdown%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%2F*%0A%0A.text%3A00000000000018A8%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20rax%2C%20rax%20%20%20.text%3A00000000000018AB%0A%0A.text%3A00000000000018AB%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20loc_18AB%3A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3B%20CODE%20XREF%3A%20libkdump_read_tsx%2B4Dj%0A%0A.text%3A00000000000018AB%2048%208B%2036%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20rsi%2C%20%5Brsi%5D%0A%0A.text%3A00000000000018AE%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A00000000000018B0%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A00000000000018B4%2074%20F5%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jz%20%20%20%20%20%20%20%20short%20loc_18AB%0A%0A.text%3A00000000000018B6%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A*%2F%0A%0A%24asm%3D%7B%0A%0A48%2031%20C0%0A%0A48%208B%2036%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A74%20F5%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%0A%0A%24asm%0A%0A%7D" message="" highlight="" provider="manual"/]
Campagne de pourriels
Le CERT-FR constate qu'une campagne de pourriels visant à distribuer des logiciels malveillants a été lancée afin de profiter de la situation autour des vulnérabilité Spectre et Meltdown [32]. Des attaquants se faisant passer pour la Bundesamt für Sicherheit in der Informationstechnik (BSI), l'équivalent allemand de l'ANSSI, ont envoyé des courriers électroniques invitant leurs destinataires à se rendre sur une copie du site de la BSI. La différence avec le site officiel était une modification de l'alerte concernant les vulnérabilités: l'utilisateur était invité à installer un correctif qui se trouvait être un logiciel malveillant.
Le CERT-FR rappelle de faire preuve de la plus grande vigilance quand à l'ouverture des courriers électroniques ainsi que d'installer les correctifs de sécurité dans les plus brefs délais, et ce uniquement depuis les sources officielles des éditeurs.
Solution
Correctifs disponibles
Plusieurs éditeurs ont publiés des correctifs partiels pour les vulnérabilités Meltdown et Spectre. Le CERT-FR recommande l'application des correctifs disponibles dès que possible.
Apple
Apple indique dans une communication du 4 janvier 2017 que les systèmes iOS 11.2, macOS 10.13.2 et tvOS 11.2 profitent de correctifs contre la vulnérabilité Meltdown [9].
Le 8 janvier 2018, Apple a publié des correctifs pour ses produits iOS, Safari et macOS High Sierra [26].
Mozilla
Mozilla a publié une communication annonçant que la version 57.0.4 de Firefox intègre deux correctifs de sécurité liés aux vulnérabilités décrites dans cette alerte [25].
Microsoft
Microsoft a annoncé dans un communiqué [10] que ses navigateurs Internet Explorer et Edge avaient bénéficié d'un correctif contre la vulnérabilité Spectre sur les systèmes Windows 10 et Windows Server 2016 [11][12]. Les correctifs de sécurité fournis par Microsoft sont néanmoins dépendants des logiciels anti-virus installés sur le système. Pour tous détails sur l'application de ces correctifs le CERT-FR recommande de se reporter au site de l'éditeur. Pour les systèmes 32 bits des versions antérieures à Windows 10 et Windows Server 2016, un correctif sera déployé à l'occasion de la mise à jour mensuelle, le 9 janvier 2018. Pour Windows Server, une simple mise à jour ne suffit par pour se prémunir du problème. Microsoft a publié une série de mesures à mettre en oeuvre pour se protéger [22]. Dans tous les cas, Microsoft conseille de mettre à jour le micrologiciel de son processeur lorsque des correctifs seront disponibles.
SUSE
Des correctifs pour les vulnérabilités Spectre et Meltdown ont été distribués par SUSE [13].
Le 11 janvier 2018, SUSE a publié des correctifs pour le noyau Linux ainsi que pour le microgiciel Intel utilisés par ses produits [29][30].
Red Hat
Des correctifs pour les vulnérabilités Spectre et Meltdown ont été distribués par Red Hat [23].
Ubuntu
Le mardi 9 janvier 2018, Ubuntu a publié plusieurs bulletins de sécurité concernant des correctifs pour la vulnérabilité Meltdown [27]. Le 11 janvier 2018, Ubuntu a publié un bulletin de sécurité annonçant la mise à disposition d'un correctif pour le microgiciel Intel [31].
VMware
Des correctifs contre la vulnérabilité Spectre ont été apportés par VMware pour leurs produits ESXi, Workstation et Fusion sous OS X. Il est à noter que les plateformes ESXi en version 5.5 reçoivent un correctif seulement pour la variante CVE-2017-5715 de Spectre [14].
Android
Dans leur bulletin de sécurité pour les correctifs du mois de janvier 2018 [16], Android annonce ne pas détenir d'informations sur une reproduction des vulnérabilités Spectre et Meltdown sur leurs appareils. Cependant, les correctifs disponibles pour ce mois de janvier 2018 intègrent des mesures permettant de limiter le risque de tels attaques [15].
Dans un communiqué sur l'état de ses produits face aux vulnérabilités Meltdown et Spectre, Google annonce que Chrome OS sous Intel profite de la fonctionnalité KPTI (correctif limitant les effets de la vulnérabilité Meltdown) pour les noyaux en versions 3.18 et 4.4 à partir de la version 63 du système d'exploitation [17].
Citrix
Dans un avis de sécurité daté du 4 janvier 2018 Citrix annonce apporter un correctif de sécurité pour les produits Citrix XenServer 7.1 LTSR CU1 [19].
Amazon AWS
Dans un communiqué du 4 janvier 2018 [20], Amazon indique que les instances disposant d'une configuration par défaut (Amazon Linux AMI) vont bénéficier d'une mise à jour du noyau Linux pour adresser les effets de la vulnérabilité CVE-2017-5754 (Meltdown) [21].
Debian
Le 10 janvier 2018, un bulletin de sécurité publié par Debian propose un correctif pour la vulnérabilité Meltdown [28].
Pour la semaine du 15 au 21 janvier 2018, les éditeurs suivants ont publiés des correctifs pour Meldown et Spectre:
- SUSE [33]
- Oracle [34] [35]
- Red Hat [36]
- Moxa [37] (l'éditeur annonce que d'autres correctifs sont à venir)
Le 22 janvier 2018, Intel a publié un communiqué [38] pour annoncer qu'ils avaient trouvé la cause des dysfonctionnements liés à leur correctif. Dans certains cas, le correctif apporté à leur microgiciel provoquait des redémarrages intempestifs. La situation n'est toutefois pas encore résolue. Intel conseille donc de retarder l'installation du correctif pour le microprocesseur.
Le CERT-FR rappelle qu'il est important d'installer les correctifs de sécurité dans les plus brefs délais. Concernant Spectre et Meldown, il est nécessaire de mettre à jour en priorité les navigateurs puis les systèmes d'exploitation. Toutefois, il est également important de tester ces correctifs dans des environnements contrôlés avant de les pousser en production. Concernant les microgiciels d'Intel, le CERT-FR recommande une prudence accrue dans leurs déploiements voir d'attendre la version finale de ces mises à jour. En matière de risques, l'exploitation de la vulnérabilité Spectre est particulièrement complexe et est la seule à être couverte par la mise à jour du micrologiciel.
Les 8 et 9 février 2018, plusieurs éditeurs ont publiés des correctifs supplémentaires:
- VMware [39]
- Red Hat [40]
- SUSE [41]
Le 20 février 2018, Intel a annoncé que les mises à jour de sécurité des micrologiciels pour certaines familles de processeurs étaient disponibles. Sont concernés les processeurs de type Kaby Lake, Coffee Lake ainsi que certains Skylake ( cf. https://newsroom.intel.com/news/latest-intel-security-news-updated-firmware-available/). Intel a également mis à jour son calendrier prévisionnel des sorties futures (cf. https://newsroom.intel.com/wp-content/uploads/sites/11/2018/02/microcode-update-guidance.pdf).
Les éditeurs suivants ont également publiés de nouveaux correctifs :
- Ubuntu (cf. )
- SUSE (cf. , et )
- Siemens (cf. )
Contournement provisoire
Dans leur article sur la vulnérabilité Meltdown, les auteurs de la publication indiquent que la fonctionnalité de sécurité KAISER [5] permet de limiter les implications dues à l'exploitation de Meltdown. Ce mécanisme a été intégré dans les dernières versions du noyau Linux sous le nom de Kernel page-table isolation (KPTI) [6] et est en cours d'intégration dans les versions précédentes du noyau.
Cette fonctionnalité renforce la séparation entre les zones mémoires accessibles en mode utilisateur et celles accessibles en mode noyau. De ce fait il n'est donc plus possible de d'accéder lors de l'utilisation de la vulnérabilité Meltdown aux informations noyau.
Systèmes de virtualisation
Les systèmes virtualisés de type Xen sont vulnérables aux failles présentés dans cette alerte. Concernant Meltdown un contournement pouvant être mis en œuvre est d'utiliser une virtualisation matérielle. En effet, d'après un avis de sécurité de l'éditeur [18], la CVE-2017-5754 n'affecte que les systèmes Xen en architecture Intel 64 bits utilisant la para-virtualisation.
D'une façon globale, l'ANSSI a émis un guide relatif à la virtualisation précisant que « les systèmes invités présents sur une même machine physique [doivent manipuler] des données qui ont une sensibilité similaire » [7].
Vérifications des correctifs disponibles
Windows
Microsoft a mis à disposition un script PowerShell qui permet de vérifier si un correctif pour les vulnérabilités a été appliqué sur un système Windows [4].
Linux
Afin de s'assurer de la présence du mécanisme de sécurité KPTI sur un système utilisant un noyau Linux il est possible d'exécuter la commande suivante :
[pastacode lang="bash" manual="dmesg%20%7C%20grep%20'Kernel%2FUser%20page%20tables%20isolation'" message="" highlight="" provider="manual"/]
Dans le cas où KPTI est activé un message sera affiché en sortie.
- Processeurs Intel
- La liste des processeurs vulnérables est fournie dans la section documentation.
- Processeurs AMD
- AMD est vulnérable à Spectre, mais pas à Meltdown.
- Processeurs ARM :
- ARM Cortex-R7
- ARM Cortex-R8
- ARM Cortex-A8
- ARM Cortex-A9
- ARM Cortex-A15
- ARM Cortex-A17
- ARM Cortex-A57
- ARM Cortex-A72
- ARM Cortex-A73
- ARM Cortex-A75
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eProcesseurs Intel \u003cul\u003e \u003cli\u003eLa liste des processeurs vuln\u00e9rables est fournie dans la section documentation.\u003c/li\u003e \u003c/ul\u003e \u003c/li\u003e \u003cli\u003eProcesseurs AMD \u003cul\u003e \u003cli\u003eAMD est vuln\u00e9rable \u00e0 Spectre, mais pas \u00e0 Meltdown.\u003c/li\u003e \u003c/ul\u003e \u003c/li\u003e \u003cli\u003eProcesseurs ARM : \u003cul\u003e \u003cli\u003eARM Cortex-R7\u003c/li\u003e \u003cli\u003eARM Cortex-R8\u003c/li\u003e \u003cli\u003eARM Cortex-A8\u003c/li\u003e \u003cli\u003eARM Cortex-A9\u003c/li\u003e \u003cli\u003eARM Cortex-A15\u003c/li\u003e \u003cli\u003eARM Cortex-A17\u003c/li\u003e \u003cli\u003eARM Cortex-A57\u003c/li\u003e \u003cli\u003eARM Cortex-A72\u003c/li\u003e \u003cli\u003eARM Cortex-A73\u003c/li\u003e \u003cli\u003eARM Cortex-A75\u003c/li\u003e \u003c/ul\u003e \u003c/li\u003e \u003c/ul\u003e \u003cp\u003e\u0026nbsp;\u003c/p\u003e ",
"closed_at": "2018-10-10",
"content": "## Solution\n\n### Correctifs disponibles\n\nPlusieurs \u00e9diteurs ont publi\u00e9s des correctifs partiels pour les\nvuln\u00e9rabilit\u00e9s Meltdown et Spectre. Le CERT-FR recommande l\u0027application\ndes correctifs disponibles d\u00e8s que possible.\n\n#### Apple\n\nApple indique dans une communication du 4 janvier 2017 que les syst\u00e8mes\niOS 11.2, macOS 10.13.2 et tvOS 11.2 profitent de correctifs contre la\nvuln\u00e9rabilit\u00e9 Meltdown \\[9\\].\n\nLe 8 janvier 2018, Apple a publi\u00e9 des correctifs pour ses produits iOS,\nSafari et macOS High Sierra \\[26\\].\n\n#### Mozilla\n\nMozilla a publi\u00e9 une communication annon\u00e7ant que la version 57.0.4 de\nFirefox int\u00e8gre deux correctifs de s\u00e9curit\u00e9 li\u00e9s aux vuln\u00e9rabilit\u00e9s\nd\u00e9crites dans cette alerte \\[25\\].\n\n#### Microsoft\n\nMicrosoft a annonc\u00e9 dans un communiqu\u00e9 \\[10\\] que ses navigateurs\nInternet Explorer et Edge avaient b\u00e9n\u00e9fici\u00e9 d\u0027un correctif contre la\nvuln\u00e9rabilit\u00e9 Spectre sur les syst\u00e8mes Windows 10 et Windows Server 2016\n\\[11\\]\\[12\\]. Les correctifs de s\u00e9curit\u00e9 fournis par Microsoft sont\nn\u00e9anmoins d\u00e9pendants des logiciels anti-virus install\u00e9s sur le syst\u00e8me.\nPour tous d\u00e9tails sur l\u0027application de ces correctifs le CERT-FR\nrecommande de se reporter au site de l\u0027\u00e9diteur. Pour les syst\u00e8mes 32\nbits des versions ant\u00e9rieures \u00e0 Windows 10 et Windows Server 2016, un\ncorrectif sera d\u00e9ploy\u00e9 \u00e0 l\u0027occasion de la mise \u00e0 jour mensuelle, le 9\njanvier 2018. Pour Windows Server, une simple mise \u00e0 jour ne suffit par\npour se pr\u00e9munir du probl\u00e8me. Microsoft a publi\u00e9 une s\u00e9rie de mesures \u00e0\nmettre en oeuvre pour se prot\u00e9ger \\[22\\]. Dans tous les cas, Microsoft\nconseille de mettre \u00e0 jour le micrologiciel de son processeur lorsque\ndes correctifs seront disponibles.\n\n#### SUSE\n\nDes correctifs pour les vuln\u00e9rabilit\u00e9s Spectre et Meltdown ont \u00e9t\u00e9\ndistribu\u00e9s par SUSE \\[13\\].\n\nLe 11 janvier 2018, SUSE a publi\u00e9 des correctifs pour le noyau Linux\nainsi que pour le microgiciel Intel utilis\u00e9s par ses produits\n\\[29\\]\\[30\\].\n\n#### Red Hat\n\nDes correctifs\u00a0pour les vuln\u00e9rabilit\u00e9s Spectre et Meltdown ont \u00e9t\u00e9\ndistribu\u00e9s par Red Hat \\[23\\].\n\n#### Ubuntu\n\nLe mardi 9 janvier 2018, Ubuntu a publi\u00e9 plusieurs bulletins de s\u00e9curit\u00e9\nconcernant des correctifs pour la vuln\u00e9rabilit\u00e9 Meltdown \\[27\\]. Le 11\njanvier 2018, Ubuntu a publi\u00e9 un bulletin de s\u00e9curit\u00e9 annon\u00e7ant la mise\n\u00e0 disposition d\u0027un correctif pour le microgiciel Intel \\[31\\].\n\n#### VMware\n\nDes correctifs contre la vuln\u00e9rabilit\u00e9 Spectre ont \u00e9t\u00e9 apport\u00e9s par\nVMware pour leurs produits ESXi, Workstation et Fusion sous OS X. Il est\n\u00e0 noter que les plateformes ESXi en version 5.5 re\u00e7oivent un correctif\nseulement pour la variante CVE-2017-5715 de Spectre \\[14\\].\n\n#### Android\n\nDans leur bulletin de s\u00e9curit\u00e9 pour les correctifs du mois de janvier\n2018 \\[16\\], Android annonce ne pas d\u00e9tenir d\u0027informations sur une\nreproduction des vuln\u00e9rabilit\u00e9s Spectre et Meltdown sur leurs appareils.\nCependant, les correctifs disponibles pour ce mois de janvier 2018\nint\u00e8grent des mesures permettant de limiter le risque de tels attaques\n\\[15\\].\n\n#### Google\n\nDans un communiqu\u00e9 sur l\u0027\u00e9tat de ses produits face aux vuln\u00e9rabilit\u00e9s\nMeltdown et Spectre, Google annonce que Chrome OS sous Intel profite de\nla fonctionnalit\u00e9 KPTI (correctif limitant les effets de la\nvuln\u00e9rabilit\u00e9 Meltdown) pour les noyaux en versions 3.18 et 4.4 \u00e0 partir\nde la version 63 du syst\u00e8me d\u0027exploitation \\[17\\].\n\n#### Citrix\n\nDans un avis de s\u00e9curit\u00e9 dat\u00e9 du 4 janvier 2018 Citrix annonce apporter\nun correctif de s\u00e9curit\u00e9 pour les produits Citrix XenServer 7.1 LTSR CU1\n\\[19\\].\n\n#### Amazon AWS\n\nDans un communiqu\u00e9 du 4 janvier 2018 \\[20\\], Amazon indique que les\ninstances disposant d\u0027une configuration par d\u00e9faut (Amazon Linux AMI)\u00a0\nvont b\u00e9n\u00e9ficier d\u0027une mise \u00e0 jour du noyau Linux pour adresser les\neffets de la vuln\u00e9rabilit\u00e9 CVE-2017-5754 (Meltdown) \\[21\\].\n\n#### Debian\n\nLe 10 janvier 2018, un bulletin de s\u00e9curit\u00e9 publi\u00e9 par Debian propose un\ncorrectif pour la vuln\u00e9rabilit\u00e9 Meltdown \\[28\\].\n\n\u00a0\n\nPour la semaine du 15 au 21 janvier 2018, les \u00e9diteurs suivants ont\npubli\u00e9s des correctifs pour Meldown et Spectre:\n\n- SUSE \\[33\\]\n- Oracle \\[34\\] \\[35\\]\n- Red Hat \\[36\\]\n- Moxa \\[37\\] (l\u0027\u00e9diteur annonce que d\u0027autres correctifs sont \u00e0 venir)\n\n**Le 22 janvier 2018, Intel a publi\u00e9 un communiqu\u00e9 \\[38\\] pour annoncer\nqu\u0027ils avaient trouv\u00e9 la cause des dysfonctionnements li\u00e9s \u00e0 leur\ncorrectif. Dans certains cas, le correctif apport\u00e9 \u00e0 leur microgiciel\nprovoquait des red\u00e9marrages intempestifs. La situation n\u0027est toutefois\npas encore r\u00e9solue. Intel conseille donc de retarder l\u0027installation du\ncorrectif pour le microprocesseur.**\n\n**Le CERT-FR rappelle qu\u0027il est important d\u0027installer les correctifs de\ns\u00e9curit\u00e9 dans les plus brefs d\u00e9lais. Concernant Spectre et Meldown, il\nest n\u00e9cessaire de mettre \u00e0 jour en priorit\u00e9 les navigateurs puis les\nsyst\u00e8mes d\u0027exploitation.\u00a0Toutefois, il est \u00e9galement important de tester\nces correctifs dans des environnements contr\u00f4l\u00e9s avant de les pousser en\nproduction. Concernant les microgiciels d\u0027Intel, le CERT-FR\u00a0recommande\nune prudence accrue dans leurs d\u00e9ploiements voir d\u0027attendre la version\nfinale de ces mises \u00e0 jour. En mati\u00e8re de risques, l\u0027exploitation de la\nvuln\u00e9rabilit\u00e9 Spectre est particuli\u00e8rement\u00a0complexe et est la seule \u00e0\n\u00eatre couverte par la mise \u00e0 jour du micrologiciel.**\n\nLes 8 et 9 f\u00e9vrier 2018, plusieurs \u00e9diteurs ont publi\u00e9s des correctifs\nsuppl\u00e9mentaires:\n\n- VMware \\[39\\]\n- Red Hat \\[40\\]\n- SUSE \\[41\\]\n\nLe 20 f\u00e9vrier 2018, Intel a annonc\u00e9 que les mises \u00e0 jour de s\u00e9curit\u00e9 des\nmicrologiciels pour certaines familles de processeurs \u00e9taient\ndisponibles. Sont concern\u00e9s les processeurs de type Kaby Lake, Coffee\nLake ainsi que certains Skylake (\ncf.\u00a0\u003chttps://newsroom.intel.com/news/latest-intel-security-news-updated-firmware-available/\u003e).\nIntel a \u00e9galement mis \u00e0 jour son calendrier pr\u00e9visionnel des sorties\nfutures (cf.\n\u003chttps://newsroom.intel.com/wp-content/uploads/sites/11/2018/02/microcode-update-guidance.pdf\u003e).\n\nLes \u00e9diteurs suivants ont \u00e9galement publi\u00e9s de nouveaux correctifs :\n\n- Ubuntu\n (cf.\u00a0\u003c/avis/CERTFR-2018-AVI-094/\u003e)\n- SUSE (cf. \u003c/avis/CERTFR-2018-AVI-080/\u003e,\n \u003c/avis/CERTFR-2018-AVI-083/\u003e\u00a0et\n \u003c/avis/CERTFR-2018-AVI-091/\u003e)\n- Siemens (cf.\n \u003c/avis/CERTFR-2018-AVI-095/\u003e)\n\n\u00a0\n\n## Contournement provisoire\n\nDans leur article sur la vuln\u00e9rabilit\u00e9 Meltdown, les auteurs de la\npublication indiquent que la fonctionnalit\u00e9 de s\u00e9curit\u00e9 KAISER \\[5\\]\npermet de limiter les implications dues \u00e0 l\u0027exploitation de Meltdown.\u00a0Ce\nm\u00e9canisme a \u00e9t\u00e9 int\u00e9gr\u00e9 dans les derni\u00e8res versions du noyau Linux sous\nle nom de Kernel page-table isolation (KPTI) \\[6\\] et est en cours\nd\u0027int\u00e9gration dans les versions pr\u00e9c\u00e9dentes du noyau.\n\nCette fonctionnalit\u00e9 renforce la s\u00e9paration entre les zones m\u00e9moires\naccessibles en mode utilisateur et celles accessibles en mode noyau. De\nce fait il n\u0027est donc plus possible de d\u0027acc\u00e9der lors de l\u0027utilisation\nde la vuln\u00e9rabilit\u00e9 Meltdown aux informations noyau.\n\n### Syst\u00e8mes de virtualisation\n\nLes syst\u00e8mes virtualis\u00e9s de type Xen sont vuln\u00e9rables aux failles\npr\u00e9sent\u00e9s dans cette alerte. Concernant Meltdown un contournement\npouvant \u00eatre mis en \u0153uvre est d\u0027utiliser une virtualisation mat\u00e9rielle.\nEn effet, d\u0027apr\u00e8s un avis de s\u00e9curit\u00e9 de l\u0027\u00e9diteur \\[18\\], la\nCVE-2017-5754 n\u0027affecte que les syst\u00e8mes Xen en architecture Intel 64\nbits utilisant la para-virtualisation.\n\nD\u0027une fa\u00e7on globale, l\u0027ANSSI a \u00e9mis un guide relatif \u00e0 la virtualisation\npr\u00e9cisant que \u003cspan class=\"citation\"\u003e\u00ab\u003c/span\u003e les syst\u00e8mes invit\u00e9s\npr\u00e9sents sur une m\u00eame machine physique \\[doivent manipuler\\] des donn\u00e9es\nqui ont une \u003cspan class=\"highlight selected\"\u003esensibilit\u00e9\u003c/span\u003e\nsimilaire \u003cspan class=\"citation\"\u003e\u00bb\u003c/span\u003e \\[7\\].\n\n### V\u00e9rifications des correctifs disponibles\n\n#### Windows\n\nMicrosoft a mis \u00e0 disposition un script PowerShell qui permet de\nv\u00e9rifier si un correctif pour les vuln\u00e9rabilit\u00e9s a \u00e9t\u00e9 appliqu\u00e9 sur un\nsyst\u00e8me Windows \\[4\\].\n\n#### Linux\n\nAfin de s\u0027assurer de la pr\u00e9sence du m\u00e9canisme de s\u00e9curit\u00e9 KPTI sur un\nsyst\u00e8me utilisant un noyau Linux il est possible d\u0027ex\u00e9cuter la commande\nsuivante :\n\n\\[pastacode lang=\"bash\"\nmanual=\"dmesg%20%7C%20grep%20\u0027Kernel%2FUser%20page%20tables%20isolation\u0027\"\nmessage=\"\" highlight=\"\" provider=\"manual\"/\\]\n\nDans le cas o\u00f9 KPTI est activ\u00e9 un message sera affich\u00e9 en sortie.\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2018-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3640"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
}
],
"links": [
{
"title": "Avis CERT-FR CERTFR-2018-AVI-005 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-005"
},
{
"title": "Billet de blogue de Microsoft du 3 janvier 2018 sur un correctif pour Internet Explorer et Edge",
"url": "https://blogs.windows.com/msedgedev/2018/01/03/speculative-execution-mitigations-microsoft-edge-internet-explorer/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de Microsoft KB4056890 du 3 janvier 2018",
"url": "https://support.microsoft.com/en-us/help/4056890/windows-10-update-kb4056890"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-032 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-032/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208394 du 4 janvier 2018",
"url": "https://support.apple.com/en-us/HT208394"
},
{
"title": "Communiqu\u00e9 Ubuntu",
"url": "https://insights.ubuntu.com/2018/01/04/ubuntu-updates-for-the-meltdown-spectre-vulnerabilities/"
},
{
"title": "CERT KB",
"url": "https://www.kb.cert.org/vuls/id/584653"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de Microsoft KB4056892 du 3 janvier 2018",
"url": "https://support.microsoft.com/en-us/help/4056892/windows-10-update-kb4056892"
},
{
"title": "Avis de s\u00e9curit\u00e9 Amazon ALAS-2018-939 du 4 janvier 2018",
"url": "https://alas.aws.amazon.com/ALAS-2018-939.html"
},
{
"title": "Article ARM d\u00e9taillant les vuln\u00e9rabilit\u00e9s ainsi que les contre-mesures envisag\u00e9es",
"url": "https://developer.arm.com/support/security-update"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric",
"url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Id=8786151194\u0026p_File_Name=SEVD-2018-005-01+-Spectre+and+Meltdown.pdf\u0026p_Reference=SEVD-2018-005-01"
},
{
"title": "Avis de s\u00e9curit\u00e9 ARM du 3 janvier 2017",
"url": "https://developer.arm.com/support/security-update"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-006 Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-006"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft ADV180002",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"title": "Avis de vuln\u00e9rabilit\u00e9 d\u0027Intel et liste des processeurs vuln\u00e9rables",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr"
},
{
"title": "Security Advisory 115 Intel",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft concernant les vuln\u00e9rabilit\u00e9s d\u0027attaques par canaux auxiliaires d\u0027ex\u00e9cution sp\u00e9culative",
"url": "https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution-s"
},
{
"title": "Billet de blogue Mozilla",
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft ADV180013 du 21 mai 2018",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180013"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft ADV180012 du 21 mai 2018",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180012"
},
{
"title": "Site d\u00e9taillant le principe de la vuln\u00e9rabilit\u00e9",
"url": "https://spectreattack.com/"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-028 Vuln\u00e9rabilit\u00e9 dans le microgiciel Intel pour SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-028"
},
{
"title": "Commentaires d\u0027AMD sur une \u00e9ventuelle vuln\u00e9rabilit\u00e9 de leurs processeurs",
"url": "https://www.amd.com/en/corporate/speculative-execution"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Juniper",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10842\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-254 du 3 janvier 2018",
"url": "https://xenbits.xen.org/xsa/advisory-254.html"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-017 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-017"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Android du 2 janvier 2018",
"url": "https://source.android.com/security/bulletin/2018-01-01"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-008 Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-008"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-013 Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-013"
},
{
"title": "Site d\u00e9taillant le principe de la vuln\u00e9rabilit\u00e9",
"url": "https://meltdownattack.com/"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-030 Vuln\u00e9rabilit\u00e9 dans le microgiciel Intel pour Ubuntu",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-029"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-030 Vuln\u00e9rabilit\u00e9 dans le microgiciel Intel pour Ubuntu",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-030"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-079 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-079"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-039 Multiples vuln\u00e9rabilit\u00e9s dans Oracle Virtualization",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-039/"
},
{
"title": "Communiqu\u00e9 Intel",
"url": "https://newsroom.intel.com/news/root-cause-of-reboot-issue-identified-updated-guidance-for-customers-and-partners/"
},
{
"title": "Billet de blogue Google Project Zero",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-077 Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-077"
},
{
"title": "Communiqu\u00e9 de la BSI",
"url": "https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/Gefaelschte_BSI-Mails_12012018.html"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-038 Multiples vuln\u00e9rabilit\u00e9s dans Oracle Sun Systems Products Suite",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-038/"
},
{
"title": "Article du 15 novembre 2017 sur le m\u00e9canisme de s\u00e9curit\u00e9 KAISER",
"url": "https://lwn.net/Articles/738975/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX231390 du 4 janvier 2018",
"url": "https://support.citrix.com/article/CTX231390"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-080 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-080"
},
{
"title": "Guide relatif \u00e0 la s\u00e9curit\u00e9 des syst\u00e8mes de virtualisation",
"url": "https://www.ssi.gouv.fr/guide/problematiques-de-securite-associees-a-la-virtualisation-des-systemes-dinformation"
},
{
"title": "Article de blog publi\u00e9 par Microsoft au sujet de CVE-2018-3639",
"url": "https://blogs.technet.microsoft.com/srd/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-18-002",
"url": "https://fortiguard.com/psirt/FG-IR-18-002"
},
{
"title": "Mise \u00e0 jour du microgiciel Intel pour Linux relatif \u00e0 la CVE-2017-5715",
"url": "https://downloadcenter.intel.com/download/27337/Linux-Processor-Microcode-Data-File"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-018 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-018"
},
{
"title": "Communication de Microsoft sur les d\u00e9pendances entre la mise \u00e0 jour et les logiciels anti-virus",
"url": "https://support.microsoft.com/en-us/help/4072699/important-information-regarding-the-windows-security-updates-released"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-029 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-029"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Xen",
"url": "https://xenbits.xen.org/xsa/advisory-254.html"
},
{
"title": "Article Intel d\u00e9taillant les vuln\u00e9rabilit\u00e9s ainsi que les contre-mesures envisag\u00e9es",
"url": "https://newsroom.intel.com/wp-content/uploads/sites/11/2018/01/Intel-Analysis-of-Speculative-Execution-Side-Channels.pdf"
},
{
"title": "Article du 30 d\u00e9cembre 2017 sur l\u0027int\u00e9gration du correctif KPTI dans le noyau Linux",
"url": "https://lwn.net/Articles/742404/"
},
{
"title": "Mesures \u00e0 mettre en oeuvre pour prot\u00e9ger son Windows Server",
"url": "https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-004 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-004"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-002 Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-002"
},
{
"title": "Communiqu\u00e9 de Google sur les attaques utilisant une m\u00e9thode d\u0027ex\u00e9cution sp\u00e9culative",
"url": "https://support.google.com/faqs/answer/7622138"
},
{
"title": "Communiqu\u00e9 d\u0027Amazon\u00a0AWS-2018-013 en lien avec les vuln\u00e9rabilit\u00e9s d\u0027ex\u00e9cution sp\u00e9culative",
"url": "https://aws.amazon.com/fr/security/security-bulletins/AWS-2018-013/"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-040 Vuln\u00e9rabilit\u00e9 dans le micrologiciel processeur pour Red Hat",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-040/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft pour les professionnels concernant les vuln\u00e9rabilit\u00e9s d\u0027attaques par canaux auxiliaires d\u0027ex\u00e9cution sp\u00e9culative",
"url": "https://support.microsoft.com/en-us/help/4073119/windows-client-guidance-for-it-pros-to-protect-against-speculative-exe"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-044 Multiples vuln\u00e9rabilit\u00e9s dans les produits Moxa",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-044"
}
],
"reference": "CERTFR-2018-ALE-001",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-04T00:00:00.000000"
},
{
"description": "Ajout et correction de liens",
"revision_date": "2018-01-04T00:00:00.000000"
},
{
"description": "Ajout de liens",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de d\u00e9tails sur les correctifs disponibles",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de d\u00e9tails sur les correctifs disponibles",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de d\u00e9tails sur les correctifs disponibles et sur les contournements possibles",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de liens et de recommandations pour Windows Server",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de d\u00e9tails sur les correctifs disponibles",
"revision_date": "2018-01-09T00:00:00.000000"
},
{
"description": "Ajout de liens et ajout de la section Preuve de concept",
"revision_date": "2018-01-09T00:00:00.000000"
},
{
"description": "Ajout de r\u00e8gles Yara",
"revision_date": "2018-01-09T00:00:00.000000"
},
{
"description": "Mise \u00e0 jour des correctifs disponibles",
"revision_date": "2018-01-10T00:00:00.000000"
},
{
"description": "Mise \u00e0 jour des correctifs disponibles",
"revision_date": "2018-01-12T00:00:00.000000"
},
{
"description": "Ajout de la section Campagne de pourriel",
"revision_date": "2018-01-12T00:00:00.000000"
},
{
"description": "Ajout de correctifs disponibles en semaine 03",
"revision_date": "2018-01-19T00:00:00.000000"
},
{
"description": "modification des recommandations suite au communiqu\u00e9 d\u0027Intel",
"revision_date": "2018-01-23T00:00:00.000000"
},
{
"description": "ajout des bulletins de s\u00e9curit\u00e9 VMware, RedHat et SUSE",
"revision_date": "2018-02-12T00:00:00.000000"
},
{
"description": "Ajout de l\u0027annonce d\u0027Intel sur la sortie des derniers correctifs de s\u00e9curit\u00e9.",
"revision_date": "2018-02-23T00:00:00.000000"
},
{
"description": "Ajout des vuln\u00e9rabilit\u00e9s 3a et 4",
"revision_date": "2018-05-23T00:00:00.000000"
},
{
"description": "Correction mise en page et ajout de liens",
"revision_date": "2018-05-23T00:00:00.000000"
},
{
"description": "Ajout de bulletins Microsoft",
"revision_date": "2018-05-25T00:00:00.000000"
},
{
"description": "Cl\u00f4ture de l\u0027alerte.",
"revision_date": "2018-10-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "\u003cstrong\u003e\\[Mise \u00e0 jour du 25/05/2018 : ajout de bulletins Microsoft (cf.\nsection Documentation)\\]\u003c/strong\u003e\n\n\u003cstrong\u003e\\[Mise \u00e0 jour du 22/05/2018 : publications de nouvelles variantes\\] \n\u003c/strong\u003e\n\n\u003cstrong\u003e\\[Mise \u00e0 jour du 23/02/2018 : annonce d\u0027Intel sur la sortie des mises\n\u00e0 jour des micrologiciels (cf. section Solution)\\]\u003c/strong\u003e\n\n\u003cstrong\u003e\\[Mise \u00e0 jour du 12/02/2018 : ajout des bulletins de s\u00e9curit\u00e9 VMware,\nRedHat et SUSE (cf. section Solution)\\]\u003c/strong\u003e\n\n\u003cstrong\u003e\\[Mise \u00e0 jour du 23/01/2018 : modification des recommandations suite\nau communiqu\u00e9 d\u0027Intel (cf. section Solution)\\]\u003c/strong\u003e\n\nLe 4 janvier 2018, deux vuln\u00e9rabilit\u00e9s affectant plusieurs familles de\nprocesseurs et pouvant conduire \u00e0 des fuites d\u0027informations ont \u00e9t\u00e9\nrendues publiques \\[1\\]\\[2\\]. Intitul\u00e9es Spectre et Meltdown, ces deux\nvuln\u00e9rabilit\u00e9s ont re\u00e7u les identifiants CVE-2017-5715, CVE-2017-5753\npour Spectre et CVE-2017-5754 pour Meltdown. Le 21 mai 2018, deux\nnouvelles vuln\u00e9rabilit\u00e9s identifi\u00e9es CVE-2018-3639 et CVE-2018-3640,\nreposant sur des principes similaires, ont \u00e9galement \u00e9t\u00e9 publi\u00e9es\n\\[42\\].\n\n### Vuln\u00e9rabilit\u00e9 Meltdown\n\nLes processeurs modernes int\u00e8grent plusieurs fonctionnalit\u00e9s visant \u00e0\nam\u00e9liorer leurs performances. Parmi celles-ci, l\u0027ex\u00e9cution dite\n*out-of-order* permet d\u0027ex\u00e9cuter les instructions d\u0027un programme en\nfonction de la disponibilit\u00e9 des ressources de calculs et plus\nn\u00e9cessairement de fa\u00e7on s\u00e9quentielle. Une faiblesse de ce m\u00e9canisme peut\ncependant conduire \u00e0 l\u0027ex\u00e9cution d\u0027une instruction sans que le niveau de\nprivil\u00e8ges requis par celle-ci ne soit correctement v\u00e9rifi\u00e9. Bien que le\nr\u00e9sultat de l\u0027ex\u00e9cution d\u0027une telle instruction ne soit pas valid\u00e9 par\nla suite, il peut \u00eatre possible de r\u00e9cup\u00e9rer l\u0027information en utilisant\nune attaque par canaux cach\u00e9s.\n\nLa vuln\u00e9rabilit\u00e9 CVE-2017-5754 exploite l\u2019ex\u00e9cution *out-of-order* sur\ndes instructions requ\u00e9rant un haut niveau de privil\u00e8ge pour permettre\nl\u0027acc\u00e8s en lecture \u00e0 des zones m\u00e9moires propres au syst\u00e8me\nd\u2019exploitation depuis du code s\u2019ex\u00e9cutant de fa\u00e7on non-privil\u00e9gi\u00e9e. En\nparticulier, l\u0027exploitation de cette vuln\u00e9rabilit\u00e9 permet d\u0027acc\u00e9der\ndepuis un programme utilisateur \u00e0 la m\u00e9moire du syst\u00e8me d\u0027exploitation.\nCela peut conduire \u00e0 des fuites de donn\u00e9es sensibles pr\u00e9sentes en\nm\u00e9moire et peut inclure des informations d\u0027autres programmes ou encore\ndes cl\u00e9s de chiffrement. Cette fuite d\u0027informations peut aussi \u00eatre mise\nen \u0153uvre pour faciliter la compromission d\u0027un syst\u00e8me.\n\nLa vuln\u00e9rabilit\u00e9 CVE-2018-3640 exploite l\u2019ex\u00e9cution *out-of-order* sur\ndes instructions requ\u00e9rant un haut niveau de privil\u00e8ge pour permettre\nl\u0027acc\u00e8s en lecture \u00e0 des registres propres au syst\u00e8me d\u2019exploitation\ndepuis du code s\u2019ex\u00e9cutant de fa\u00e7on non-privil\u00e9gi\u00e9e. En particulier,\nl\u0027exploitation de cette vuln\u00e9rabilit\u00e9 permet d\u0027acc\u00e9der depuis un\nprogramme utilisateur \u00e0 des param\u00e8tres de configuration du processeur.\nCette fuite d\u0027informations peut aussi \u00eatre mise en \u0153uvre pour faciliter\nla compromission d\u0027un syst\u00e8me.\n\n### Vuln\u00e9rabilit\u00e9 Spectre\n\nL\u0027ex\u00e9cution sp\u00e9culative est une seconde technique d\u0027optimisation\nutilis\u00e9e par les processeurs modernes. Les d\u00e9pendances entre les\ninstructions limitent les possibilit\u00e9s d\u0027ex\u00e9cution *out-of-order*. Pour\nrem\u00e9dier \u00e0 cette limitation, le processeur \u00e9met des hypoth\u00e8ses\nconcernant les r\u00e9sultats non encore disponibles. Ceci lui permet de\npoursuivre l\u2019ex\u00e9cution *out-of-order* en utilisant ces hypoth\u00e8ses en\nremplacement des r\u00e9sultats attendus. On parle alors d\u0027ex\u00e9cution\nsp\u00e9culative. Ces hypoth\u00e8ses sont v\u00e9rifi\u00e9es par le processeur d\u00e8s que les\nr\u00e9sultats auxquels elles se rapportent deviennent disponibles. Si elles\nse r\u00e9v\u00e8lent correctes, le processeur valide l\u0027ex\u00e9cution sp\u00e9culative.\nMais inversement, si elles se r\u00e9v\u00e8lent erron\u00e9es, les effets de\nl\u0027ex\u00e9cution sp\u00e9culative doivent \u00eatre annul\u00e9s et l\u0027ex\u00e9cution doit\nreprendre au point on les hypoth\u00e8ses erron\u00e9es avaient \u00e9t\u00e9 \u00e9mises, c\u0027est\n\u00e0 dire l\u00e0 o\u00f9 l\u0027ex\u00e9cution sp\u00e9culative avait d\u00e9but\u00e9e.\n\nCependant les effets d\u0027une ex\u00e9cution sp\u00e9culative erron\u00e9e sur le cache\nperdurent. Or, en mesurant des temps d\u0027acc\u00e8s \u00e0 des zones m\u00e9moires, il\nest possible de conna\u00eetre l\u0027\u00e9tat du cache. Par cons\u00e9quent, un attaquant\nsera capable de d\u00e9terminer les r\u00e9sultats interm\u00e9diaires d\u0027une ex\u00e9cution\nsp\u00e9culative erron\u00e9e si ceux-ci influent sur l\u0027\u00e9tat du cache. Cette\nutilisation du cache pour mener \u00e0 bien l\u0027exploitation est commune aux\ntrois variantes de Spectre.\n\n#### Variante 1 (CVE-2017-5753)\n\nLe pr\u00e9dicteur de branches est un composant du processeur utilis\u00e9 pour\n\u00e9mettre des hypoth\u00e8ses concernant l\u0027adresse de la prochaine instruction\n\u00e0 ex\u00e9cuter. En particulier, il est utilis\u00e9 pour pr\u00e9dire l\u0027issue des\nsauts conditionnels. D\u0027autre part, ce composant est partag\u00e9 entre des\ncodes s\u0027ex\u00e9cutant dans des cloisonnements de s\u00e9curit\u00e9 diff\u00e9rents\n(processus, niveaux de privil\u00e8ge).\n\nDans la variante 1 de Spectre, un attaquant influe sur les heuristiques\ndu pr\u00e9dicteur de branches pour fausser la pr\u00e9diction d\u0027un saut\nconditionnel s\u2019ex\u00e9cutant dans un autre cloisonnement de s\u00e9curit\u00e9, ce qui\na pour effet de d\u00e9clencher une ex\u00e9cution sp\u00e9culative erron\u00e9e. Un code\nest vuln\u00e9rable si cette ex\u00e9cution sp\u00e9culative erron\u00e9e modifie le cache\nde fa\u00e7on qui d\u00e9pende d\u0027une valeur secr\u00e8te (c\u0027est \u00e0 dire non directement\naccessible depuis le cloisonnement dans lequel se situe l\u0027attaquant).\n\nExemple de code vuln\u00e9rable fourni dans l\u0027article:\n\n\\[pastacode lang=\"c\"\nmanual=\"if%20(x%20%3C%20array1_size)%0Ay%20%3D%20array2%5Barray1%5Bx%5D%20\\*%20256%5D%3B\"\nmessage=\"\" highlight=\"\" provider=\"manual\"/\\]\n\nUn attaquant ma\u00eetrisant la valeur de x peut obtenir une lecture\narbitraire dans l\u0027espace d\u0027adressage du processus ex\u00e9cutant le code\nci-dessus. Pour cela, l\u0027attaquant commence par soumettre un grand nombre\nde x valides (c\u0027est \u00e0 dire v\u00e9rifiant la condition de la ligne 1) pour\nfaire croire au pr\u00e9dicteur de branches que la condition ligne 1 est\ntoujours vraie. Puis il soumet un x pointant \u00e0 une adresse arbitraire.\nLe pr\u00e9dicteur de branches estime n\u00e9anmoins que la condition est vraie,\nce qui d\u00e9clenche l\u0027ex\u00e9cution sp\u00e9culative de la ligne 2. La valeur\nsecr\u00e8te point\u00e9e par x est r\u00e9cup\u00e9r\u00e9e puis utilis\u00e9e pour former l\u0027adresse\nd\u0027une seconde lecture m\u00e9moire. Cette seconde lecture aura un effet sur\nle cache d\u00e9celable par l\u0027attaquant qui sera alors en mesure de retrouver\nla valeur secr\u00e8te.\n\n#### Variante 2 (CVE-2017-5715)\n\nLe pr\u00e9dicteur de branches est \u00e9galement utilis\u00e9 pour pr\u00e9dire l\u0027issue des\nsauts indirects. Dans la variante 2 de Spectre, un attaquant influe sur\nles heuristiques du pr\u00e9dicteur de branches pour fausser la pr\u00e9diction\nd\u0027un saut indirect s\u2019ex\u00e9cutant dans un autre cloisonnement de s\u00e9curit\u00e9,\nce qui a pour effet de d\u00e9clencher une ex\u00e9cution sp\u00e9culative erron\u00e9e \u00e0\nune adresse arbitraire ma\u00eetris\u00e9e par l\u0027attaquant. En choisissant\ncorrectement le code ex\u00e9cut\u00e9 sp\u00e9culativement, l\u0027attaquant est alors\ncapable d\u0027obtenir une lecture arbitraire dans l\u0027espace d\u0027adressage du\nprocessus victime.\n\n#### Variante 3 (CVE-2018-3639)\n\nLes processeurs \u00e9mettent \u00e9galement des hypoth\u00e8ses concernant l\u0027adresse\nde certains acc\u00e8s m\u00e9moire. Pour b\u00e9n\u00e9ficier de plus de libert\u00e9s dans\nl\u0027ordre d\u0027ex\u00e9cution d\u0027op\u00e9rations de lecture m\u00e9moire, le processeur va\ndevoir pr\u00e9dire si celles-ci chevauchent des op\u00e9rations d\u0027\u00e9criture en\nattente d\u0027ex\u00e9cution. Si une op\u00e9ration de lecture ne chevauche aucune\nop\u00e9ration d\u0027\u00e9criture en attente d\u0027ex\u00e9cution, rien ne s\u0027oppose \u00e0 qu\u0027elle\npuisse \u00eatre ex\u00e9cut\u00e9e de fa\u00e7on anticip\u00e9e.\n\nDans la variante 3 de Spectre, un attaquant influe sur les heuristiques\ndu processeur utilis\u00e9es pour la pr\u00e9diction d\u0027adresses, ce qui a pour\neffet de d\u00e9clencher une ex\u00e9cution sp\u00e9culative erron\u00e9e d\u0027une op\u00e9ration de\nlecture m\u00e9moire et des instructions qui en d\u00e9pendent. Un code est\nvuln\u00e9rable si cette ex\u00e9cution sp\u00e9culative erron\u00e9e manipule une valeur\nsecr\u00e8te et la laisse fuir \u00e0 travers un \u00e9tat observable du cache\n\nMicrosoft (une des parties ayant d\u00e9couvert la vuln\u00e9rabilit\u00e9) \\[43\\]\naffirme ne pas avoir identifi\u00e9 de code vuln\u00e9rable dans leurs produits,\nce qui laisse penser que les codes vuln\u00e9rables sont peu fr\u00e9quents.\n\n### Impact\n\nLes vuln\u00e9rabilit\u00e9s d\u00e9crites dans cette alerte peuvent impacter tous les\nsyst\u00e8mes utilisant un processeur vuln\u00e9rable et donc de fa\u00e7on\nind\u00e9pendante du syst\u00e8me d\u0027exploitation. Selon les chercheurs \u00e0 l\u0027origine\nde la d\u00e9couverte de ces failles, il est ainsi possible d\u0027acc\u00e9der \u00e0\nl\u0027int\u00e9gralit\u00e9 de la m\u00e9moire physique sur des syst\u00e8mes Linux et OSX et \u00e0\nune part importante de la m\u00e9moire sur un syst\u00e8me Windows.\n\nOn notera que l\u0027impact peut \u00eatre plus particuli\u00e8rement important dans\ndes syst\u00e8mes de ressources partag\u00e9s de type conteneur (Docker, LXC) o\u00f9\nil serait possible depuis un environnement restreint d\u0027acc\u00e9der \u00e0 toutes\nles donn\u00e9es pr\u00e9sentes sur la machine physique dans lequel s\u0027ex\u00e9cute le\nconteneur ou encore dans des environnements virtualis\u00e9s utilisant la\npara-virtualisation de type Xen.\n\n### Preuve de concept\n\nLe CERT-FR constate que des preuves de concept fonctionnelles pour\nMeltdown sont d\u00e9sormais publiques. Les r\u00e8gles Yara suivantes servent \u00e0\nd\u00e9tecter les binaires li\u00e9s \u00e0 la biblioth\u00e8que publi\u00e9e par l\u0027Institute of\nApplied Information Processing and Communications (IAIK) :\n\n\\[pastacode lang=\"c\"\nmanual=\"rule%20meltdown_iaik_libkdump_meltdown_nonull%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown_nonull%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%2F\\*%0A%0A.text%3A00000000000018A6%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20%20rax%2C%20rax%20%20%20.text%3A00000000000018A9%0A%0A.text%3A00000000000018A9%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20loc_18A9%3A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3B%20CODE%20XREF%3A%20libkdump_read_tsx%2B48j%0A%0A.text%3A00000000000018A9%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A00000000000018AB%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A00000000000018AF%2074%20F8%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jz%20%20%20%20%20%20%20%20short%20loc_18A9%0A%0A.text%3A00000000000018B1%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A\\*%2F%0A%0A%24asm%3D%7B%0A%0A48%2031%20C0%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A74%20F8%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%20%24asm%0A%0A%7D%0A%0A%0Arule%20meltdown_iaik_libkdump_meltdown_fast%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown_fast%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%20%20%20%20%2F\\*%0A%0A.text%3A000000000000184F%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20%20%20rax%2C%20rax%0A%0A.text%3A0000000000001852%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A0000000000001854%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A0000000000001858%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A\\*%2F%0A%0A%24asm%20%3D%20%7B%0A%0A48%2031%20C0%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%0A%0A%24asm%0A%0A%7D%0A%0A%0Arule%20meltdown_iaik_libkdump_meltdown%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%2F\\*%0A%0A.text%3A00000000000018A8%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20rax%2C%20rax%20%20%20.text%3A00000000000018AB%0A%0A.text%3A00000000000018AB%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20loc_18AB%3A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3B%20CODE%20XREF%3A%20libkdump_read_tsx%2B4Dj%0A%0A.text%3A00000000000018AB%2048%208B%2036%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20rsi%2C%20%5Brsi%5D%0A%0A.text%3A00000000000018AE%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A00000000000018B0%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A00000000000018B4%2074%20F5%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jz%20%20%20%20%20%20%20%20short%20loc_18AB%0A%0A.text%3A00000000000018B6%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A\\*%2F%0A%0A%24asm%3D%7B%0A%0A48%2031%20C0%0A%0A48%208B%2036%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A74%20F5%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%0A%0A%24asm%0A%0A%7D\"\nmessage=\"\" highlight=\"\" provider=\"manual\"/\\]\n\n### Campagne de pourriels\n\nLe CERT-FR constate qu\u0027une campagne de pourriels visant \u00e0 distribuer des\nlogiciels malveillants a \u00e9t\u00e9 lanc\u00e9e afin de profiter de la situation\nautour des vuln\u00e9rabilit\u00e9 Spectre et Meltdown \\[32\\]. Des attaquants se\nfaisant passer pour la *\u003cspan lang=\"de\"\u003eBundesamt f\u00fcr Sicherheit in der\nInformationstechnik \u003c/span\u003e*\u003cspan lang=\"de\"\u003e(BSI), l\u0027\u00e9quivalent allemand\nde l\u0027ANSSI, ont envoy\u00e9 des courriers \u00e9lectroniques invitant leurs\ndestinataires \u00e0 se rendre sur une copie du site de la BSI. La diff\u00e9rence\navec le site officiel \u00e9tait une modification de l\u0027alerte concernant les\nvuln\u00e9rabilit\u00e9s: l\u0027utilisateur \u00e9tait invit\u00e9 \u00e0 installer un correctif qui\nse trouvait \u00eatre un logiciel malveillant.\u003c/span\u003e\n\nLe CERT-FR rappelle de faire preuve de la plus grande vigilance quand \u00e0\nl\u0027ouverture des courriers \u00e9lectroniques ainsi que d\u0027installer les\ncorrectifs de s\u00e9curit\u00e9 dans les plus brefs d\u00e9lais, et ce uniquement\ndepuis les sources officielles des \u00e9diteurs.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s de fuite d\u0027informations dans des processeurs",
"vendor_advisories": [
{
"published_at": null,
"title": "Sites d\u00e9taillant le principe de la vuln\u00e9rabilit\u00e9",
"url": null
}
]
}
CERTFR-2018-ALE-001
Vulnerability from certfr_alerte - Published: - Updated:
[Mise à jour du 25/05/2018 : ajout de bulletins Microsoft (cf. section Documentation)]
[Mise à jour du 22/05/2018 : publications de nouvelles variantes]
[Mise à jour du 23/02/2018 : annonce d'Intel sur la sortie des mises à jour des micrologiciels (cf. section Solution)]
[Mise à jour du 12/02/2018 : ajout des bulletins de sécurité VMware, RedHat et SUSE (cf. section Solution)]
[Mise à jour du 23/01/2018 : modification des recommandations suite au communiqué d'Intel (cf. section Solution)]
Le 4 janvier 2018, deux vulnérabilités affectant plusieurs familles de processeurs et pouvant conduire à des fuites d'informations ont été rendues publiques [1][2]. Intitulées Spectre et Meltdown, ces deux vulnérabilités ont reçu les identifiants CVE-2017-5715, CVE-2017-5753 pour Spectre et CVE-2017-5754 pour Meltdown. Le 21 mai 2018, deux nouvelles vulnérabilités identifiées CVE-2018-3639 et CVE-2018-3640, reposant sur des principes similaires, ont également été publiées [42].
Vulnérabilité Meltdown
Les processeurs modernes intègrent plusieurs fonctionnalités visant à améliorer leurs performances. Parmi celles-ci, l'exécution dite out-of-order permet d'exécuter les instructions d'un programme en fonction de la disponibilité des ressources de calculs et plus nécessairement de façon séquentielle. Une faiblesse de ce mécanisme peut cependant conduire à l'exécution d'une instruction sans que le niveau de privilèges requis par celle-ci ne soit correctement vérifié. Bien que le résultat de l'exécution d'une telle instruction ne soit pas validé par la suite, il peut être possible de récupérer l'information en utilisant une attaque par canaux cachés.
La vulnérabilité CVE-2017-5754 exploite l’exécution out-of-order sur des instructions requérant un haut niveau de privilège pour permettre l'accès en lecture à des zones mémoires propres au système d’exploitation depuis du code s’exécutant de façon non-privilégiée. En particulier, l'exploitation de cette vulnérabilité permet d'accéder depuis un programme utilisateur à la mémoire du système d'exploitation. Cela peut conduire à des fuites de données sensibles présentes en mémoire et peut inclure des informations d'autres programmes ou encore des clés de chiffrement. Cette fuite d'informations peut aussi être mise en œuvre pour faciliter la compromission d'un système.
La vulnérabilité CVE-2018-3640 exploite l’exécution out-of-order sur des instructions requérant un haut niveau de privilège pour permettre l'accès en lecture à des registres propres au système d’exploitation depuis du code s’exécutant de façon non-privilégiée. En particulier, l'exploitation de cette vulnérabilité permet d'accéder depuis un programme utilisateur à des paramètres de configuration du processeur. Cette fuite d'informations peut aussi être mise en œuvre pour faciliter la compromission d'un système.
Vulnérabilité Spectre
L'exécution spéculative est une seconde technique d'optimisation utilisée par les processeurs modernes. Les dépendances entre les instructions limitent les possibilités d'exécution out-of-order. Pour remédier à cette limitation, le processeur émet des hypothèses concernant les résultats non encore disponibles. Ceci lui permet de poursuivre l’exécution out-of-order en utilisant ces hypothèses en remplacement des résultats attendus. On parle alors d'exécution spéculative. Ces hypothèses sont vérifiées par le processeur dès que les résultats auxquels elles se rapportent deviennent disponibles. Si elles se révèlent correctes, le processeur valide l'exécution spéculative. Mais inversement, si elles se révèlent erronées, les effets de l'exécution spéculative doivent être annulés et l'exécution doit reprendre au point on les hypothèses erronées avaient été émises, c'est à dire là où l'exécution spéculative avait débutée.
Cependant les effets d'une exécution spéculative erronée sur le cache perdurent. Or, en mesurant des temps d'accès à des zones mémoires, il est possible de connaître l'état du cache. Par conséquent, un attaquant sera capable de déterminer les résultats intermédiaires d'une exécution spéculative erronée si ceux-ci influent sur l'état du cache. Cette utilisation du cache pour mener à bien l'exploitation est commune aux trois variantes de Spectre.
Variante 1 (CVE-2017-5753)
Le prédicteur de branches est un composant du processeur utilisé pour émettre des hypothèses concernant l'adresse de la prochaine instruction à exécuter. En particulier, il est utilisé pour prédire l'issue des sauts conditionnels. D'autre part, ce composant est partagé entre des codes s'exécutant dans des cloisonnements de sécurité différents (processus, niveaux de privilège).
Dans la variante 1 de Spectre, un attaquant influe sur les heuristiques du prédicteur de branches pour fausser la prédiction d'un saut conditionnel s’exécutant dans un autre cloisonnement de sécurité, ce qui a pour effet de déclencher une exécution spéculative erronée. Un code est vulnérable si cette exécution spéculative erronée modifie le cache de façon qui dépende d'une valeur secrète (c'est à dire non directement accessible depuis le cloisonnement dans lequel se situe l'attaquant).
Exemple de code vulnérable fourni dans l'article:
[pastacode lang="c" manual="if%20(x%20%3C%20array1_size)%0Ay%20%3D%20array2%5Barray1%5Bx%5D%20*%20256%5D%3B" message="" highlight="" provider="manual"/]
Un attaquant maîtrisant la valeur de x peut obtenir une lecture arbitraire dans l'espace d'adressage du processus exécutant le code ci-dessus. Pour cela, l'attaquant commence par soumettre un grand nombre de x valides (c'est à dire vérifiant la condition de la ligne 1) pour faire croire au prédicteur de branches que la condition ligne 1 est toujours vraie. Puis il soumet un x pointant à une adresse arbitraire. Le prédicteur de branches estime néanmoins que la condition est vraie, ce qui déclenche l'exécution spéculative de la ligne 2. La valeur secrète pointée par x est récupérée puis utilisée pour former l'adresse d'une seconde lecture mémoire. Cette seconde lecture aura un effet sur le cache décelable par l'attaquant qui sera alors en mesure de retrouver la valeur secrète.
Variante 2 (CVE-2017-5715)
Le prédicteur de branches est également utilisé pour prédire l'issue des sauts indirects. Dans la variante 2 de Spectre, un attaquant influe sur les heuristiques du prédicteur de branches pour fausser la prédiction d'un saut indirect s’exécutant dans un autre cloisonnement de sécurité, ce qui a pour effet de déclencher une exécution spéculative erronée à une adresse arbitraire maîtrisée par l'attaquant. En choisissant correctement le code exécuté spéculativement, l'attaquant est alors capable d'obtenir une lecture arbitraire dans l'espace d'adressage du processus victime.
Variante 3 (CVE-2018-3639)
Les processeurs émettent également des hypothèses concernant l'adresse de certains accès mémoire. Pour bénéficier de plus de libertés dans l'ordre d'exécution d'opérations de lecture mémoire, le processeur va devoir prédire si celles-ci chevauchent des opérations d'écriture en attente d'exécution. Si une opération de lecture ne chevauche aucune opération d'écriture en attente d'exécution, rien ne s'oppose à qu'elle puisse être exécutée de façon anticipée.
Dans la variante 3 de Spectre, un attaquant influe sur les heuristiques du processeur utilisées pour la prédiction d'adresses, ce qui a pour effet de déclencher une exécution spéculative erronée d'une opération de lecture mémoire et des instructions qui en dépendent. Un code est vulnérable si cette exécution spéculative erronée manipule une valeur secrète et la laisse fuir à travers un état observable du cache
Microsoft (une des parties ayant découvert la vulnérabilité) [43] affirme ne pas avoir identifié de code vulnérable dans leurs produits, ce qui laisse penser que les codes vulnérables sont peu fréquents.
Impact
Les vulnérabilités décrites dans cette alerte peuvent impacter tous les systèmes utilisant un processeur vulnérable et donc de façon indépendante du système d'exploitation. Selon les chercheurs à l'origine de la découverte de ces failles, il est ainsi possible d'accéder à l'intégralité de la mémoire physique sur des systèmes Linux et OSX et à une part importante de la mémoire sur un système Windows.
On notera que l'impact peut être plus particulièrement important dans des systèmes de ressources partagés de type conteneur (Docker, LXC) où il serait possible depuis un environnement restreint d'accéder à toutes les données présentes sur la machine physique dans lequel s'exécute le conteneur ou encore dans des environnements virtualisés utilisant la para-virtualisation de type Xen.
Preuve de concept
Le CERT-FR constate que des preuves de concept fonctionnelles pour Meltdown sont désormais publiques. Les règles Yara suivantes servent à détecter les binaires liés à la bibliothèque publiée par l'Institute of Applied Information Processing and Communications (IAIK) :
[pastacode lang="c" manual="rule%20meltdown_iaik_libkdump_meltdown_nonull%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown_nonull%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%2F*%0A%0A.text%3A00000000000018A6%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20%20rax%2C%20rax%20%20%20.text%3A00000000000018A9%0A%0A.text%3A00000000000018A9%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20loc_18A9%3A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3B%20CODE%20XREF%3A%20libkdump_read_tsx%2B48j%0A%0A.text%3A00000000000018A9%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A00000000000018AB%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A00000000000018AF%2074%20F8%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jz%20%20%20%20%20%20%20%20short%20loc_18A9%0A%0A.text%3A00000000000018B1%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A*%2F%0A%0A%24asm%3D%7B%0A%0A48%2031%20C0%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A74%20F8%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%20%24asm%0A%0A%7D%0A%0A%0Arule%20meltdown_iaik_libkdump_meltdown_fast%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown_fast%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%20%20%20%20%2F*%0A%0A.text%3A000000000000184F%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20%20%20rax%2C%20rax%0A%0A.text%3A0000000000001852%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A0000000000001854%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A0000000000001858%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A*%2F%0A%0A%24asm%20%3D%20%7B%0A%0A48%2031%20C0%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%0A%0A%24asm%0A%0A%7D%0A%0A%0Arule%20meltdown_iaik_libkdump_meltdown%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%2F*%0A%0A.text%3A00000000000018A8%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20rax%2C%20rax%20%20%20.text%3A00000000000018AB%0A%0A.text%3A00000000000018AB%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20loc_18AB%3A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3B%20CODE%20XREF%3A%20libkdump_read_tsx%2B4Dj%0A%0A.text%3A00000000000018AB%2048%208B%2036%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20rsi%2C%20%5Brsi%5D%0A%0A.text%3A00000000000018AE%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A00000000000018B0%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A00000000000018B4%2074%20F5%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jz%20%20%20%20%20%20%20%20short%20loc_18AB%0A%0A.text%3A00000000000018B6%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A*%2F%0A%0A%24asm%3D%7B%0A%0A48%2031%20C0%0A%0A48%208B%2036%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A74%20F5%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%0A%0A%24asm%0A%0A%7D" message="" highlight="" provider="manual"/]
Campagne de pourriels
Le CERT-FR constate qu'une campagne de pourriels visant à distribuer des logiciels malveillants a été lancée afin de profiter de la situation autour des vulnérabilité Spectre et Meltdown [32]. Des attaquants se faisant passer pour la Bundesamt für Sicherheit in der Informationstechnik (BSI), l'équivalent allemand de l'ANSSI, ont envoyé des courriers électroniques invitant leurs destinataires à se rendre sur une copie du site de la BSI. La différence avec le site officiel était une modification de l'alerte concernant les vulnérabilités: l'utilisateur était invité à installer un correctif qui se trouvait être un logiciel malveillant.
Le CERT-FR rappelle de faire preuve de la plus grande vigilance quand à l'ouverture des courriers électroniques ainsi que d'installer les correctifs de sécurité dans les plus brefs délais, et ce uniquement depuis les sources officielles des éditeurs.
Solution
Correctifs disponibles
Plusieurs éditeurs ont publiés des correctifs partiels pour les vulnérabilités Meltdown et Spectre. Le CERT-FR recommande l'application des correctifs disponibles dès que possible.
Apple
Apple indique dans une communication du 4 janvier 2017 que les systèmes iOS 11.2, macOS 10.13.2 et tvOS 11.2 profitent de correctifs contre la vulnérabilité Meltdown [9].
Le 8 janvier 2018, Apple a publié des correctifs pour ses produits iOS, Safari et macOS High Sierra [26].
Mozilla
Mozilla a publié une communication annonçant que la version 57.0.4 de Firefox intègre deux correctifs de sécurité liés aux vulnérabilités décrites dans cette alerte [25].
Microsoft
Microsoft a annoncé dans un communiqué [10] que ses navigateurs Internet Explorer et Edge avaient bénéficié d'un correctif contre la vulnérabilité Spectre sur les systèmes Windows 10 et Windows Server 2016 [11][12]. Les correctifs de sécurité fournis par Microsoft sont néanmoins dépendants des logiciels anti-virus installés sur le système. Pour tous détails sur l'application de ces correctifs le CERT-FR recommande de se reporter au site de l'éditeur. Pour les systèmes 32 bits des versions antérieures à Windows 10 et Windows Server 2016, un correctif sera déployé à l'occasion de la mise à jour mensuelle, le 9 janvier 2018. Pour Windows Server, une simple mise à jour ne suffit par pour se prémunir du problème. Microsoft a publié une série de mesures à mettre en oeuvre pour se protéger [22]. Dans tous les cas, Microsoft conseille de mettre à jour le micrologiciel de son processeur lorsque des correctifs seront disponibles.
SUSE
Des correctifs pour les vulnérabilités Spectre et Meltdown ont été distribués par SUSE [13].
Le 11 janvier 2018, SUSE a publié des correctifs pour le noyau Linux ainsi que pour le microgiciel Intel utilisés par ses produits [29][30].
Red Hat
Des correctifs pour les vulnérabilités Spectre et Meltdown ont été distribués par Red Hat [23].
Ubuntu
Le mardi 9 janvier 2018, Ubuntu a publié plusieurs bulletins de sécurité concernant des correctifs pour la vulnérabilité Meltdown [27]. Le 11 janvier 2018, Ubuntu a publié un bulletin de sécurité annonçant la mise à disposition d'un correctif pour le microgiciel Intel [31].
VMware
Des correctifs contre la vulnérabilité Spectre ont été apportés par VMware pour leurs produits ESXi, Workstation et Fusion sous OS X. Il est à noter que les plateformes ESXi en version 5.5 reçoivent un correctif seulement pour la variante CVE-2017-5715 de Spectre [14].
Android
Dans leur bulletin de sécurité pour les correctifs du mois de janvier 2018 [16], Android annonce ne pas détenir d'informations sur une reproduction des vulnérabilités Spectre et Meltdown sur leurs appareils. Cependant, les correctifs disponibles pour ce mois de janvier 2018 intègrent des mesures permettant de limiter le risque de tels attaques [15].
Dans un communiqué sur l'état de ses produits face aux vulnérabilités Meltdown et Spectre, Google annonce que Chrome OS sous Intel profite de la fonctionnalité KPTI (correctif limitant les effets de la vulnérabilité Meltdown) pour les noyaux en versions 3.18 et 4.4 à partir de la version 63 du système d'exploitation [17].
Citrix
Dans un avis de sécurité daté du 4 janvier 2018 Citrix annonce apporter un correctif de sécurité pour les produits Citrix XenServer 7.1 LTSR CU1 [19].
Amazon AWS
Dans un communiqué du 4 janvier 2018 [20], Amazon indique que les instances disposant d'une configuration par défaut (Amazon Linux AMI) vont bénéficier d'une mise à jour du noyau Linux pour adresser les effets de la vulnérabilité CVE-2017-5754 (Meltdown) [21].
Debian
Le 10 janvier 2018, un bulletin de sécurité publié par Debian propose un correctif pour la vulnérabilité Meltdown [28].
Pour la semaine du 15 au 21 janvier 2018, les éditeurs suivants ont publiés des correctifs pour Meldown et Spectre:
- SUSE [33]
- Oracle [34] [35]
- Red Hat [36]
- Moxa [37] (l'éditeur annonce que d'autres correctifs sont à venir)
Le 22 janvier 2018, Intel a publié un communiqué [38] pour annoncer qu'ils avaient trouvé la cause des dysfonctionnements liés à leur correctif. Dans certains cas, le correctif apporté à leur microgiciel provoquait des redémarrages intempestifs. La situation n'est toutefois pas encore résolue. Intel conseille donc de retarder l'installation du correctif pour le microprocesseur.
Le CERT-FR rappelle qu'il est important d'installer les correctifs de sécurité dans les plus brefs délais. Concernant Spectre et Meldown, il est nécessaire de mettre à jour en priorité les navigateurs puis les systèmes d'exploitation. Toutefois, il est également important de tester ces correctifs dans des environnements contrôlés avant de les pousser en production. Concernant les microgiciels d'Intel, le CERT-FR recommande une prudence accrue dans leurs déploiements voir d'attendre la version finale de ces mises à jour. En matière de risques, l'exploitation de la vulnérabilité Spectre est particulièrement complexe et est la seule à être couverte par la mise à jour du micrologiciel.
Les 8 et 9 février 2018, plusieurs éditeurs ont publiés des correctifs supplémentaires:
- VMware [39]
- Red Hat [40]
- SUSE [41]
Le 20 février 2018, Intel a annoncé que les mises à jour de sécurité des micrologiciels pour certaines familles de processeurs étaient disponibles. Sont concernés les processeurs de type Kaby Lake, Coffee Lake ainsi que certains Skylake ( cf. https://newsroom.intel.com/news/latest-intel-security-news-updated-firmware-available/). Intel a également mis à jour son calendrier prévisionnel des sorties futures (cf. https://newsroom.intel.com/wp-content/uploads/sites/11/2018/02/microcode-update-guidance.pdf).
Les éditeurs suivants ont également publiés de nouveaux correctifs :
- Ubuntu (cf. )
- SUSE (cf. , et )
- Siemens (cf. )
Contournement provisoire
Dans leur article sur la vulnérabilité Meltdown, les auteurs de la publication indiquent que la fonctionnalité de sécurité KAISER [5] permet de limiter les implications dues à l'exploitation de Meltdown. Ce mécanisme a été intégré dans les dernières versions du noyau Linux sous le nom de Kernel page-table isolation (KPTI) [6] et est en cours d'intégration dans les versions précédentes du noyau.
Cette fonctionnalité renforce la séparation entre les zones mémoires accessibles en mode utilisateur et celles accessibles en mode noyau. De ce fait il n'est donc plus possible de d'accéder lors de l'utilisation de la vulnérabilité Meltdown aux informations noyau.
Systèmes de virtualisation
Les systèmes virtualisés de type Xen sont vulnérables aux failles présentés dans cette alerte. Concernant Meltdown un contournement pouvant être mis en œuvre est d'utiliser une virtualisation matérielle. En effet, d'après un avis de sécurité de l'éditeur [18], la CVE-2017-5754 n'affecte que les systèmes Xen en architecture Intel 64 bits utilisant la para-virtualisation.
D'une façon globale, l'ANSSI a émis un guide relatif à la virtualisation précisant que « les systèmes invités présents sur une même machine physique [doivent manipuler] des données qui ont une sensibilité similaire » [7].
Vérifications des correctifs disponibles
Windows
Microsoft a mis à disposition un script PowerShell qui permet de vérifier si un correctif pour les vulnérabilités a été appliqué sur un système Windows [4].
Linux
Afin de s'assurer de la présence du mécanisme de sécurité KPTI sur un système utilisant un noyau Linux il est possible d'exécuter la commande suivante :
[pastacode lang="bash" manual="dmesg%20%7C%20grep%20'Kernel%2FUser%20page%20tables%20isolation'" message="" highlight="" provider="manual"/]
Dans le cas où KPTI est activé un message sera affiché en sortie.
- Processeurs Intel
- La liste des processeurs vulnérables est fournie dans la section documentation.
- Processeurs AMD
- AMD est vulnérable à Spectre, mais pas à Meltdown.
- Processeurs ARM :
- ARM Cortex-R7
- ARM Cortex-R8
- ARM Cortex-A8
- ARM Cortex-A9
- ARM Cortex-A15
- ARM Cortex-A17
- ARM Cortex-A57
- ARM Cortex-A72
- ARM Cortex-A73
- ARM Cortex-A75
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eProcesseurs Intel \u003cul\u003e \u003cli\u003eLa liste des processeurs vuln\u00e9rables est fournie dans la section documentation.\u003c/li\u003e \u003c/ul\u003e \u003c/li\u003e \u003cli\u003eProcesseurs AMD \u003cul\u003e \u003cli\u003eAMD est vuln\u00e9rable \u00e0 Spectre, mais pas \u00e0 Meltdown.\u003c/li\u003e \u003c/ul\u003e \u003c/li\u003e \u003cli\u003eProcesseurs ARM : \u003cul\u003e \u003cli\u003eARM Cortex-R7\u003c/li\u003e \u003cli\u003eARM Cortex-R8\u003c/li\u003e \u003cli\u003eARM Cortex-A8\u003c/li\u003e \u003cli\u003eARM Cortex-A9\u003c/li\u003e \u003cli\u003eARM Cortex-A15\u003c/li\u003e \u003cli\u003eARM Cortex-A17\u003c/li\u003e \u003cli\u003eARM Cortex-A57\u003c/li\u003e \u003cli\u003eARM Cortex-A72\u003c/li\u003e \u003cli\u003eARM Cortex-A73\u003c/li\u003e \u003cli\u003eARM Cortex-A75\u003c/li\u003e \u003c/ul\u003e \u003c/li\u003e \u003c/ul\u003e \u003cp\u003e\u0026nbsp;\u003c/p\u003e ",
"closed_at": "2018-10-10",
"content": "## Solution\n\n### Correctifs disponibles\n\nPlusieurs \u00e9diteurs ont publi\u00e9s des correctifs partiels pour les\nvuln\u00e9rabilit\u00e9s Meltdown et Spectre. Le CERT-FR recommande l\u0027application\ndes correctifs disponibles d\u00e8s que possible.\n\n#### Apple\n\nApple indique dans une communication du 4 janvier 2017 que les syst\u00e8mes\niOS 11.2, macOS 10.13.2 et tvOS 11.2 profitent de correctifs contre la\nvuln\u00e9rabilit\u00e9 Meltdown \\[9\\].\n\nLe 8 janvier 2018, Apple a publi\u00e9 des correctifs pour ses produits iOS,\nSafari et macOS High Sierra \\[26\\].\n\n#### Mozilla\n\nMozilla a publi\u00e9 une communication annon\u00e7ant que la version 57.0.4 de\nFirefox int\u00e8gre deux correctifs de s\u00e9curit\u00e9 li\u00e9s aux vuln\u00e9rabilit\u00e9s\nd\u00e9crites dans cette alerte \\[25\\].\n\n#### Microsoft\n\nMicrosoft a annonc\u00e9 dans un communiqu\u00e9 \\[10\\] que ses navigateurs\nInternet Explorer et Edge avaient b\u00e9n\u00e9fici\u00e9 d\u0027un correctif contre la\nvuln\u00e9rabilit\u00e9 Spectre sur les syst\u00e8mes Windows 10 et Windows Server 2016\n\\[11\\]\\[12\\]. Les correctifs de s\u00e9curit\u00e9 fournis par Microsoft sont\nn\u00e9anmoins d\u00e9pendants des logiciels anti-virus install\u00e9s sur le syst\u00e8me.\nPour tous d\u00e9tails sur l\u0027application de ces correctifs le CERT-FR\nrecommande de se reporter au site de l\u0027\u00e9diteur. Pour les syst\u00e8mes 32\nbits des versions ant\u00e9rieures \u00e0 Windows 10 et Windows Server 2016, un\ncorrectif sera d\u00e9ploy\u00e9 \u00e0 l\u0027occasion de la mise \u00e0 jour mensuelle, le 9\njanvier 2018. Pour Windows Server, une simple mise \u00e0 jour ne suffit par\npour se pr\u00e9munir du probl\u00e8me. Microsoft a publi\u00e9 une s\u00e9rie de mesures \u00e0\nmettre en oeuvre pour se prot\u00e9ger \\[22\\]. Dans tous les cas, Microsoft\nconseille de mettre \u00e0 jour le micrologiciel de son processeur lorsque\ndes correctifs seront disponibles.\n\n#### SUSE\n\nDes correctifs pour les vuln\u00e9rabilit\u00e9s Spectre et Meltdown ont \u00e9t\u00e9\ndistribu\u00e9s par SUSE \\[13\\].\n\nLe 11 janvier 2018, SUSE a publi\u00e9 des correctifs pour le noyau Linux\nainsi que pour le microgiciel Intel utilis\u00e9s par ses produits\n\\[29\\]\\[30\\].\n\n#### Red Hat\n\nDes correctifs\u00a0pour les vuln\u00e9rabilit\u00e9s Spectre et Meltdown ont \u00e9t\u00e9\ndistribu\u00e9s par Red Hat \\[23\\].\n\n#### Ubuntu\n\nLe mardi 9 janvier 2018, Ubuntu a publi\u00e9 plusieurs bulletins de s\u00e9curit\u00e9\nconcernant des correctifs pour la vuln\u00e9rabilit\u00e9 Meltdown \\[27\\]. Le 11\njanvier 2018, Ubuntu a publi\u00e9 un bulletin de s\u00e9curit\u00e9 annon\u00e7ant la mise\n\u00e0 disposition d\u0027un correctif pour le microgiciel Intel \\[31\\].\n\n#### VMware\n\nDes correctifs contre la vuln\u00e9rabilit\u00e9 Spectre ont \u00e9t\u00e9 apport\u00e9s par\nVMware pour leurs produits ESXi, Workstation et Fusion sous OS X. Il est\n\u00e0 noter que les plateformes ESXi en version 5.5 re\u00e7oivent un correctif\nseulement pour la variante CVE-2017-5715 de Spectre \\[14\\].\n\n#### Android\n\nDans leur bulletin de s\u00e9curit\u00e9 pour les correctifs du mois de janvier\n2018 \\[16\\], Android annonce ne pas d\u00e9tenir d\u0027informations sur une\nreproduction des vuln\u00e9rabilit\u00e9s Spectre et Meltdown sur leurs appareils.\nCependant, les correctifs disponibles pour ce mois de janvier 2018\nint\u00e8grent des mesures permettant de limiter le risque de tels attaques\n\\[15\\].\n\n#### Google\n\nDans un communiqu\u00e9 sur l\u0027\u00e9tat de ses produits face aux vuln\u00e9rabilit\u00e9s\nMeltdown et Spectre, Google annonce que Chrome OS sous Intel profite de\nla fonctionnalit\u00e9 KPTI (correctif limitant les effets de la\nvuln\u00e9rabilit\u00e9 Meltdown) pour les noyaux en versions 3.18 et 4.4 \u00e0 partir\nde la version 63 du syst\u00e8me d\u0027exploitation \\[17\\].\n\n#### Citrix\n\nDans un avis de s\u00e9curit\u00e9 dat\u00e9 du 4 janvier 2018 Citrix annonce apporter\nun correctif de s\u00e9curit\u00e9 pour les produits Citrix XenServer 7.1 LTSR CU1\n\\[19\\].\n\n#### Amazon AWS\n\nDans un communiqu\u00e9 du 4 janvier 2018 \\[20\\], Amazon indique que les\ninstances disposant d\u0027une configuration par d\u00e9faut (Amazon Linux AMI)\u00a0\nvont b\u00e9n\u00e9ficier d\u0027une mise \u00e0 jour du noyau Linux pour adresser les\neffets de la vuln\u00e9rabilit\u00e9 CVE-2017-5754 (Meltdown) \\[21\\].\n\n#### Debian\n\nLe 10 janvier 2018, un bulletin de s\u00e9curit\u00e9 publi\u00e9 par Debian propose un\ncorrectif pour la vuln\u00e9rabilit\u00e9 Meltdown \\[28\\].\n\n\u00a0\n\nPour la semaine du 15 au 21 janvier 2018, les \u00e9diteurs suivants ont\npubli\u00e9s des correctifs pour Meldown et Spectre:\n\n- SUSE \\[33\\]\n- Oracle \\[34\\] \\[35\\]\n- Red Hat \\[36\\]\n- Moxa \\[37\\] (l\u0027\u00e9diteur annonce que d\u0027autres correctifs sont \u00e0 venir)\n\n**Le 22 janvier 2018, Intel a publi\u00e9 un communiqu\u00e9 \\[38\\] pour annoncer\nqu\u0027ils avaient trouv\u00e9 la cause des dysfonctionnements li\u00e9s \u00e0 leur\ncorrectif. Dans certains cas, le correctif apport\u00e9 \u00e0 leur microgiciel\nprovoquait des red\u00e9marrages intempestifs. La situation n\u0027est toutefois\npas encore r\u00e9solue. Intel conseille donc de retarder l\u0027installation du\ncorrectif pour le microprocesseur.**\n\n**Le CERT-FR rappelle qu\u0027il est important d\u0027installer les correctifs de\ns\u00e9curit\u00e9 dans les plus brefs d\u00e9lais. Concernant Spectre et Meldown, il\nest n\u00e9cessaire de mettre \u00e0 jour en priorit\u00e9 les navigateurs puis les\nsyst\u00e8mes d\u0027exploitation.\u00a0Toutefois, il est \u00e9galement important de tester\nces correctifs dans des environnements contr\u00f4l\u00e9s avant de les pousser en\nproduction. Concernant les microgiciels d\u0027Intel, le CERT-FR\u00a0recommande\nune prudence accrue dans leurs d\u00e9ploiements voir d\u0027attendre la version\nfinale de ces mises \u00e0 jour. En mati\u00e8re de risques, l\u0027exploitation de la\nvuln\u00e9rabilit\u00e9 Spectre est particuli\u00e8rement\u00a0complexe et est la seule \u00e0\n\u00eatre couverte par la mise \u00e0 jour du micrologiciel.**\n\nLes 8 et 9 f\u00e9vrier 2018, plusieurs \u00e9diteurs ont publi\u00e9s des correctifs\nsuppl\u00e9mentaires:\n\n- VMware \\[39\\]\n- Red Hat \\[40\\]\n- SUSE \\[41\\]\n\nLe 20 f\u00e9vrier 2018, Intel a annonc\u00e9 que les mises \u00e0 jour de s\u00e9curit\u00e9 des\nmicrologiciels pour certaines familles de processeurs \u00e9taient\ndisponibles. Sont concern\u00e9s les processeurs de type Kaby Lake, Coffee\nLake ainsi que certains Skylake (\ncf.\u00a0\u003chttps://newsroom.intel.com/news/latest-intel-security-news-updated-firmware-available/\u003e).\nIntel a \u00e9galement mis \u00e0 jour son calendrier pr\u00e9visionnel des sorties\nfutures (cf.\n\u003chttps://newsroom.intel.com/wp-content/uploads/sites/11/2018/02/microcode-update-guidance.pdf\u003e).\n\nLes \u00e9diteurs suivants ont \u00e9galement publi\u00e9s de nouveaux correctifs :\n\n- Ubuntu\n (cf.\u00a0\u003c/avis/CERTFR-2018-AVI-094/\u003e)\n- SUSE (cf. \u003c/avis/CERTFR-2018-AVI-080/\u003e,\n \u003c/avis/CERTFR-2018-AVI-083/\u003e\u00a0et\n \u003c/avis/CERTFR-2018-AVI-091/\u003e)\n- Siemens (cf.\n \u003c/avis/CERTFR-2018-AVI-095/\u003e)\n\n\u00a0\n\n## Contournement provisoire\n\nDans leur article sur la vuln\u00e9rabilit\u00e9 Meltdown, les auteurs de la\npublication indiquent que la fonctionnalit\u00e9 de s\u00e9curit\u00e9 KAISER \\[5\\]\npermet de limiter les implications dues \u00e0 l\u0027exploitation de Meltdown.\u00a0Ce\nm\u00e9canisme a \u00e9t\u00e9 int\u00e9gr\u00e9 dans les derni\u00e8res versions du noyau Linux sous\nle nom de Kernel page-table isolation (KPTI) \\[6\\] et est en cours\nd\u0027int\u00e9gration dans les versions pr\u00e9c\u00e9dentes du noyau.\n\nCette fonctionnalit\u00e9 renforce la s\u00e9paration entre les zones m\u00e9moires\naccessibles en mode utilisateur et celles accessibles en mode noyau. De\nce fait il n\u0027est donc plus possible de d\u0027acc\u00e9der lors de l\u0027utilisation\nde la vuln\u00e9rabilit\u00e9 Meltdown aux informations noyau.\n\n### Syst\u00e8mes de virtualisation\n\nLes syst\u00e8mes virtualis\u00e9s de type Xen sont vuln\u00e9rables aux failles\npr\u00e9sent\u00e9s dans cette alerte. Concernant Meltdown un contournement\npouvant \u00eatre mis en \u0153uvre est d\u0027utiliser une virtualisation mat\u00e9rielle.\nEn effet, d\u0027apr\u00e8s un avis de s\u00e9curit\u00e9 de l\u0027\u00e9diteur \\[18\\], la\nCVE-2017-5754 n\u0027affecte que les syst\u00e8mes Xen en architecture Intel 64\nbits utilisant la para-virtualisation.\n\nD\u0027une fa\u00e7on globale, l\u0027ANSSI a \u00e9mis un guide relatif \u00e0 la virtualisation\npr\u00e9cisant que \u003cspan class=\"citation\"\u003e\u00ab\u003c/span\u003e les syst\u00e8mes invit\u00e9s\npr\u00e9sents sur une m\u00eame machine physique \\[doivent manipuler\\] des donn\u00e9es\nqui ont une \u003cspan class=\"highlight selected\"\u003esensibilit\u00e9\u003c/span\u003e\nsimilaire \u003cspan class=\"citation\"\u003e\u00bb\u003c/span\u003e \\[7\\].\n\n### V\u00e9rifications des correctifs disponibles\n\n#### Windows\n\nMicrosoft a mis \u00e0 disposition un script PowerShell qui permet de\nv\u00e9rifier si un correctif pour les vuln\u00e9rabilit\u00e9s a \u00e9t\u00e9 appliqu\u00e9 sur un\nsyst\u00e8me Windows \\[4\\].\n\n#### Linux\n\nAfin de s\u0027assurer de la pr\u00e9sence du m\u00e9canisme de s\u00e9curit\u00e9 KPTI sur un\nsyst\u00e8me utilisant un noyau Linux il est possible d\u0027ex\u00e9cuter la commande\nsuivante :\n\n\\[pastacode lang=\"bash\"\nmanual=\"dmesg%20%7C%20grep%20\u0027Kernel%2FUser%20page%20tables%20isolation\u0027\"\nmessage=\"\" highlight=\"\" provider=\"manual\"/\\]\n\nDans le cas o\u00f9 KPTI est activ\u00e9 un message sera affich\u00e9 en sortie.\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2018-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3640"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
}
],
"links": [
{
"title": "Avis CERT-FR CERTFR-2018-AVI-005 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-005"
},
{
"title": "Billet de blogue de Microsoft du 3 janvier 2018 sur un correctif pour Internet Explorer et Edge",
"url": "https://blogs.windows.com/msedgedev/2018/01/03/speculative-execution-mitigations-microsoft-edge-internet-explorer/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de Microsoft KB4056890 du 3 janvier 2018",
"url": "https://support.microsoft.com/en-us/help/4056890/windows-10-update-kb4056890"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-032 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-032/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208394 du 4 janvier 2018",
"url": "https://support.apple.com/en-us/HT208394"
},
{
"title": "Communiqu\u00e9 Ubuntu",
"url": "https://insights.ubuntu.com/2018/01/04/ubuntu-updates-for-the-meltdown-spectre-vulnerabilities/"
},
{
"title": "CERT KB",
"url": "https://www.kb.cert.org/vuls/id/584653"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de Microsoft KB4056892 du 3 janvier 2018",
"url": "https://support.microsoft.com/en-us/help/4056892/windows-10-update-kb4056892"
},
{
"title": "Avis de s\u00e9curit\u00e9 Amazon ALAS-2018-939 du 4 janvier 2018",
"url": "https://alas.aws.amazon.com/ALAS-2018-939.html"
},
{
"title": "Article ARM d\u00e9taillant les vuln\u00e9rabilit\u00e9s ainsi que les contre-mesures envisag\u00e9es",
"url": "https://developer.arm.com/support/security-update"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric",
"url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Id=8786151194\u0026p_File_Name=SEVD-2018-005-01+-Spectre+and+Meltdown.pdf\u0026p_Reference=SEVD-2018-005-01"
},
{
"title": "Avis de s\u00e9curit\u00e9 ARM du 3 janvier 2017",
"url": "https://developer.arm.com/support/security-update"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-006 Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-006"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft ADV180002",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"title": "Avis de vuln\u00e9rabilit\u00e9 d\u0027Intel et liste des processeurs vuln\u00e9rables",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr"
},
{
"title": "Security Advisory 115 Intel",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft concernant les vuln\u00e9rabilit\u00e9s d\u0027attaques par canaux auxiliaires d\u0027ex\u00e9cution sp\u00e9culative",
"url": "https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution-s"
},
{
"title": "Billet de blogue Mozilla",
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft ADV180013 du 21 mai 2018",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180013"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft ADV180012 du 21 mai 2018",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180012"
},
{
"title": "Site d\u00e9taillant le principe de la vuln\u00e9rabilit\u00e9",
"url": "https://spectreattack.com/"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-028 Vuln\u00e9rabilit\u00e9 dans le microgiciel Intel pour SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-028"
},
{
"title": "Commentaires d\u0027AMD sur une \u00e9ventuelle vuln\u00e9rabilit\u00e9 de leurs processeurs",
"url": "https://www.amd.com/en/corporate/speculative-execution"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Juniper",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10842\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-254 du 3 janvier 2018",
"url": "https://xenbits.xen.org/xsa/advisory-254.html"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-017 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-017"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Android du 2 janvier 2018",
"url": "https://source.android.com/security/bulletin/2018-01-01"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-008 Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-008"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-013 Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-013"
},
{
"title": "Site d\u00e9taillant le principe de la vuln\u00e9rabilit\u00e9",
"url": "https://meltdownattack.com/"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-030 Vuln\u00e9rabilit\u00e9 dans le microgiciel Intel pour Ubuntu",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-029"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-030 Vuln\u00e9rabilit\u00e9 dans le microgiciel Intel pour Ubuntu",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-030"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-079 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-079"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-039 Multiples vuln\u00e9rabilit\u00e9s dans Oracle Virtualization",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-039/"
},
{
"title": "Communiqu\u00e9 Intel",
"url": "https://newsroom.intel.com/news/root-cause-of-reboot-issue-identified-updated-guidance-for-customers-and-partners/"
},
{
"title": "Billet de blogue Google Project Zero",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-077 Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-077"
},
{
"title": "Communiqu\u00e9 de la BSI",
"url": "https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/Gefaelschte_BSI-Mails_12012018.html"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-038 Multiples vuln\u00e9rabilit\u00e9s dans Oracle Sun Systems Products Suite",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-038/"
},
{
"title": "Article du 15 novembre 2017 sur le m\u00e9canisme de s\u00e9curit\u00e9 KAISER",
"url": "https://lwn.net/Articles/738975/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX231390 du 4 janvier 2018",
"url": "https://support.citrix.com/article/CTX231390"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-080 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-080"
},
{
"title": "Guide relatif \u00e0 la s\u00e9curit\u00e9 des syst\u00e8mes de virtualisation",
"url": "https://www.ssi.gouv.fr/guide/problematiques-de-securite-associees-a-la-virtualisation-des-systemes-dinformation"
},
{
"title": "Article de blog publi\u00e9 par Microsoft au sujet de CVE-2018-3639",
"url": "https://blogs.technet.microsoft.com/srd/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-18-002",
"url": "https://fortiguard.com/psirt/FG-IR-18-002"
},
{
"title": "Mise \u00e0 jour du microgiciel Intel pour Linux relatif \u00e0 la CVE-2017-5715",
"url": "https://downloadcenter.intel.com/download/27337/Linux-Processor-Microcode-Data-File"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-018 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-018"
},
{
"title": "Communication de Microsoft sur les d\u00e9pendances entre la mise \u00e0 jour et les logiciels anti-virus",
"url": "https://support.microsoft.com/en-us/help/4072699/important-information-regarding-the-windows-security-updates-released"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-029 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-029"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Xen",
"url": "https://xenbits.xen.org/xsa/advisory-254.html"
},
{
"title": "Article Intel d\u00e9taillant les vuln\u00e9rabilit\u00e9s ainsi que les contre-mesures envisag\u00e9es",
"url": "https://newsroom.intel.com/wp-content/uploads/sites/11/2018/01/Intel-Analysis-of-Speculative-Execution-Side-Channels.pdf"
},
{
"title": "Article du 30 d\u00e9cembre 2017 sur l\u0027int\u00e9gration du correctif KPTI dans le noyau Linux",
"url": "https://lwn.net/Articles/742404/"
},
{
"title": "Mesures \u00e0 mettre en oeuvre pour prot\u00e9ger son Windows Server",
"url": "https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-004 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-004"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-002 Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-002"
},
{
"title": "Communiqu\u00e9 de Google sur les attaques utilisant une m\u00e9thode d\u0027ex\u00e9cution sp\u00e9culative",
"url": "https://support.google.com/faqs/answer/7622138"
},
{
"title": "Communiqu\u00e9 d\u0027Amazon\u00a0AWS-2018-013 en lien avec les vuln\u00e9rabilit\u00e9s d\u0027ex\u00e9cution sp\u00e9culative",
"url": "https://aws.amazon.com/fr/security/security-bulletins/AWS-2018-013/"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-040 Vuln\u00e9rabilit\u00e9 dans le micrologiciel processeur pour Red Hat",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-040/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft pour les professionnels concernant les vuln\u00e9rabilit\u00e9s d\u0027attaques par canaux auxiliaires d\u0027ex\u00e9cution sp\u00e9culative",
"url": "https://support.microsoft.com/en-us/help/4073119/windows-client-guidance-for-it-pros-to-protect-against-speculative-exe"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-044 Multiples vuln\u00e9rabilit\u00e9s dans les produits Moxa",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-044"
}
],
"reference": "CERTFR-2018-ALE-001",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-04T00:00:00.000000"
},
{
"description": "Ajout et correction de liens",
"revision_date": "2018-01-04T00:00:00.000000"
},
{
"description": "Ajout de liens",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de d\u00e9tails sur les correctifs disponibles",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de d\u00e9tails sur les correctifs disponibles",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de d\u00e9tails sur les correctifs disponibles et sur les contournements possibles",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de liens et de recommandations pour Windows Server",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de d\u00e9tails sur les correctifs disponibles",
"revision_date": "2018-01-09T00:00:00.000000"
},
{
"description": "Ajout de liens et ajout de la section Preuve de concept",
"revision_date": "2018-01-09T00:00:00.000000"
},
{
"description": "Ajout de r\u00e8gles Yara",
"revision_date": "2018-01-09T00:00:00.000000"
},
{
"description": "Mise \u00e0 jour des correctifs disponibles",
"revision_date": "2018-01-10T00:00:00.000000"
},
{
"description": "Mise \u00e0 jour des correctifs disponibles",
"revision_date": "2018-01-12T00:00:00.000000"
},
{
"description": "Ajout de la section Campagne de pourriel",
"revision_date": "2018-01-12T00:00:00.000000"
},
{
"description": "Ajout de correctifs disponibles en semaine 03",
"revision_date": "2018-01-19T00:00:00.000000"
},
{
"description": "modification des recommandations suite au communiqu\u00e9 d\u0027Intel",
"revision_date": "2018-01-23T00:00:00.000000"
},
{
"description": "ajout des bulletins de s\u00e9curit\u00e9 VMware, RedHat et SUSE",
"revision_date": "2018-02-12T00:00:00.000000"
},
{
"description": "Ajout de l\u0027annonce d\u0027Intel sur la sortie des derniers correctifs de s\u00e9curit\u00e9.",
"revision_date": "2018-02-23T00:00:00.000000"
},
{
"description": "Ajout des vuln\u00e9rabilit\u00e9s 3a et 4",
"revision_date": "2018-05-23T00:00:00.000000"
},
{
"description": "Correction mise en page et ajout de liens",
"revision_date": "2018-05-23T00:00:00.000000"
},
{
"description": "Ajout de bulletins Microsoft",
"revision_date": "2018-05-25T00:00:00.000000"
},
{
"description": "Cl\u00f4ture de l\u0027alerte.",
"revision_date": "2018-10-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "\u003cstrong\u003e\\[Mise \u00e0 jour du 25/05/2018 : ajout de bulletins Microsoft (cf.\nsection Documentation)\\]\u003c/strong\u003e\n\n\u003cstrong\u003e\\[Mise \u00e0 jour du 22/05/2018 : publications de nouvelles variantes\\] \n\u003c/strong\u003e\n\n\u003cstrong\u003e\\[Mise \u00e0 jour du 23/02/2018 : annonce d\u0027Intel sur la sortie des mises\n\u00e0 jour des micrologiciels (cf. section Solution)\\]\u003c/strong\u003e\n\n\u003cstrong\u003e\\[Mise \u00e0 jour du 12/02/2018 : ajout des bulletins de s\u00e9curit\u00e9 VMware,\nRedHat et SUSE (cf. section Solution)\\]\u003c/strong\u003e\n\n\u003cstrong\u003e\\[Mise \u00e0 jour du 23/01/2018 : modification des recommandations suite\nau communiqu\u00e9 d\u0027Intel (cf. section Solution)\\]\u003c/strong\u003e\n\nLe 4 janvier 2018, deux vuln\u00e9rabilit\u00e9s affectant plusieurs familles de\nprocesseurs et pouvant conduire \u00e0 des fuites d\u0027informations ont \u00e9t\u00e9\nrendues publiques \\[1\\]\\[2\\]. Intitul\u00e9es Spectre et Meltdown, ces deux\nvuln\u00e9rabilit\u00e9s ont re\u00e7u les identifiants CVE-2017-5715, CVE-2017-5753\npour Spectre et CVE-2017-5754 pour Meltdown. Le 21 mai 2018, deux\nnouvelles vuln\u00e9rabilit\u00e9s identifi\u00e9es CVE-2018-3639 et CVE-2018-3640,\nreposant sur des principes similaires, ont \u00e9galement \u00e9t\u00e9 publi\u00e9es\n\\[42\\].\n\n### Vuln\u00e9rabilit\u00e9 Meltdown\n\nLes processeurs modernes int\u00e8grent plusieurs fonctionnalit\u00e9s visant \u00e0\nam\u00e9liorer leurs performances. Parmi celles-ci, l\u0027ex\u00e9cution dite\n*out-of-order* permet d\u0027ex\u00e9cuter les instructions d\u0027un programme en\nfonction de la disponibilit\u00e9 des ressources de calculs et plus\nn\u00e9cessairement de fa\u00e7on s\u00e9quentielle. Une faiblesse de ce m\u00e9canisme peut\ncependant conduire \u00e0 l\u0027ex\u00e9cution d\u0027une instruction sans que le niveau de\nprivil\u00e8ges requis par celle-ci ne soit correctement v\u00e9rifi\u00e9. Bien que le\nr\u00e9sultat de l\u0027ex\u00e9cution d\u0027une telle instruction ne soit pas valid\u00e9 par\nla suite, il peut \u00eatre possible de r\u00e9cup\u00e9rer l\u0027information en utilisant\nune attaque par canaux cach\u00e9s.\n\nLa vuln\u00e9rabilit\u00e9 CVE-2017-5754 exploite l\u2019ex\u00e9cution *out-of-order* sur\ndes instructions requ\u00e9rant un haut niveau de privil\u00e8ge pour permettre\nl\u0027acc\u00e8s en lecture \u00e0 des zones m\u00e9moires propres au syst\u00e8me\nd\u2019exploitation depuis du code s\u2019ex\u00e9cutant de fa\u00e7on non-privil\u00e9gi\u00e9e. En\nparticulier, l\u0027exploitation de cette vuln\u00e9rabilit\u00e9 permet d\u0027acc\u00e9der\ndepuis un programme utilisateur \u00e0 la m\u00e9moire du syst\u00e8me d\u0027exploitation.\nCela peut conduire \u00e0 des fuites de donn\u00e9es sensibles pr\u00e9sentes en\nm\u00e9moire et peut inclure des informations d\u0027autres programmes ou encore\ndes cl\u00e9s de chiffrement. Cette fuite d\u0027informations peut aussi \u00eatre mise\nen \u0153uvre pour faciliter la compromission d\u0027un syst\u00e8me.\n\nLa vuln\u00e9rabilit\u00e9 CVE-2018-3640 exploite l\u2019ex\u00e9cution *out-of-order* sur\ndes instructions requ\u00e9rant un haut niveau de privil\u00e8ge pour permettre\nl\u0027acc\u00e8s en lecture \u00e0 des registres propres au syst\u00e8me d\u2019exploitation\ndepuis du code s\u2019ex\u00e9cutant de fa\u00e7on non-privil\u00e9gi\u00e9e. En particulier,\nl\u0027exploitation de cette vuln\u00e9rabilit\u00e9 permet d\u0027acc\u00e9der depuis un\nprogramme utilisateur \u00e0 des param\u00e8tres de configuration du processeur.\nCette fuite d\u0027informations peut aussi \u00eatre mise en \u0153uvre pour faciliter\nla compromission d\u0027un syst\u00e8me.\n\n### Vuln\u00e9rabilit\u00e9 Spectre\n\nL\u0027ex\u00e9cution sp\u00e9culative est une seconde technique d\u0027optimisation\nutilis\u00e9e par les processeurs modernes. Les d\u00e9pendances entre les\ninstructions limitent les possibilit\u00e9s d\u0027ex\u00e9cution *out-of-order*. Pour\nrem\u00e9dier \u00e0 cette limitation, le processeur \u00e9met des hypoth\u00e8ses\nconcernant les r\u00e9sultats non encore disponibles. Ceci lui permet de\npoursuivre l\u2019ex\u00e9cution *out-of-order* en utilisant ces hypoth\u00e8ses en\nremplacement des r\u00e9sultats attendus. On parle alors d\u0027ex\u00e9cution\nsp\u00e9culative. Ces hypoth\u00e8ses sont v\u00e9rifi\u00e9es par le processeur d\u00e8s que les\nr\u00e9sultats auxquels elles se rapportent deviennent disponibles. Si elles\nse r\u00e9v\u00e8lent correctes, le processeur valide l\u0027ex\u00e9cution sp\u00e9culative.\nMais inversement, si elles se r\u00e9v\u00e8lent erron\u00e9es, les effets de\nl\u0027ex\u00e9cution sp\u00e9culative doivent \u00eatre annul\u00e9s et l\u0027ex\u00e9cution doit\nreprendre au point on les hypoth\u00e8ses erron\u00e9es avaient \u00e9t\u00e9 \u00e9mises, c\u0027est\n\u00e0 dire l\u00e0 o\u00f9 l\u0027ex\u00e9cution sp\u00e9culative avait d\u00e9but\u00e9e.\n\nCependant les effets d\u0027une ex\u00e9cution sp\u00e9culative erron\u00e9e sur le cache\nperdurent. Or, en mesurant des temps d\u0027acc\u00e8s \u00e0 des zones m\u00e9moires, il\nest possible de conna\u00eetre l\u0027\u00e9tat du cache. Par cons\u00e9quent, un attaquant\nsera capable de d\u00e9terminer les r\u00e9sultats interm\u00e9diaires d\u0027une ex\u00e9cution\nsp\u00e9culative erron\u00e9e si ceux-ci influent sur l\u0027\u00e9tat du cache. Cette\nutilisation du cache pour mener \u00e0 bien l\u0027exploitation est commune aux\ntrois variantes de Spectre.\n\n#### Variante 1 (CVE-2017-5753)\n\nLe pr\u00e9dicteur de branches est un composant du processeur utilis\u00e9 pour\n\u00e9mettre des hypoth\u00e8ses concernant l\u0027adresse de la prochaine instruction\n\u00e0 ex\u00e9cuter. En particulier, il est utilis\u00e9 pour pr\u00e9dire l\u0027issue des\nsauts conditionnels. D\u0027autre part, ce composant est partag\u00e9 entre des\ncodes s\u0027ex\u00e9cutant dans des cloisonnements de s\u00e9curit\u00e9 diff\u00e9rents\n(processus, niveaux de privil\u00e8ge).\n\nDans la variante 1 de Spectre, un attaquant influe sur les heuristiques\ndu pr\u00e9dicteur de branches pour fausser la pr\u00e9diction d\u0027un saut\nconditionnel s\u2019ex\u00e9cutant dans un autre cloisonnement de s\u00e9curit\u00e9, ce qui\na pour effet de d\u00e9clencher une ex\u00e9cution sp\u00e9culative erron\u00e9e. Un code\nest vuln\u00e9rable si cette ex\u00e9cution sp\u00e9culative erron\u00e9e modifie le cache\nde fa\u00e7on qui d\u00e9pende d\u0027une valeur secr\u00e8te (c\u0027est \u00e0 dire non directement\naccessible depuis le cloisonnement dans lequel se situe l\u0027attaquant).\n\nExemple de code vuln\u00e9rable fourni dans l\u0027article:\n\n\\[pastacode lang=\"c\"\nmanual=\"if%20(x%20%3C%20array1_size)%0Ay%20%3D%20array2%5Barray1%5Bx%5D%20\\*%20256%5D%3B\"\nmessage=\"\" highlight=\"\" provider=\"manual\"/\\]\n\nUn attaquant ma\u00eetrisant la valeur de x peut obtenir une lecture\narbitraire dans l\u0027espace d\u0027adressage du processus ex\u00e9cutant le code\nci-dessus. Pour cela, l\u0027attaquant commence par soumettre un grand nombre\nde x valides (c\u0027est \u00e0 dire v\u00e9rifiant la condition de la ligne 1) pour\nfaire croire au pr\u00e9dicteur de branches que la condition ligne 1 est\ntoujours vraie. Puis il soumet un x pointant \u00e0 une adresse arbitraire.\nLe pr\u00e9dicteur de branches estime n\u00e9anmoins que la condition est vraie,\nce qui d\u00e9clenche l\u0027ex\u00e9cution sp\u00e9culative de la ligne 2. La valeur\nsecr\u00e8te point\u00e9e par x est r\u00e9cup\u00e9r\u00e9e puis utilis\u00e9e pour former l\u0027adresse\nd\u0027une seconde lecture m\u00e9moire. Cette seconde lecture aura un effet sur\nle cache d\u00e9celable par l\u0027attaquant qui sera alors en mesure de retrouver\nla valeur secr\u00e8te.\n\n#### Variante 2 (CVE-2017-5715)\n\nLe pr\u00e9dicteur de branches est \u00e9galement utilis\u00e9 pour pr\u00e9dire l\u0027issue des\nsauts indirects. Dans la variante 2 de Spectre, un attaquant influe sur\nles heuristiques du pr\u00e9dicteur de branches pour fausser la pr\u00e9diction\nd\u0027un saut indirect s\u2019ex\u00e9cutant dans un autre cloisonnement de s\u00e9curit\u00e9,\nce qui a pour effet de d\u00e9clencher une ex\u00e9cution sp\u00e9culative erron\u00e9e \u00e0\nune adresse arbitraire ma\u00eetris\u00e9e par l\u0027attaquant. En choisissant\ncorrectement le code ex\u00e9cut\u00e9 sp\u00e9culativement, l\u0027attaquant est alors\ncapable d\u0027obtenir une lecture arbitraire dans l\u0027espace d\u0027adressage du\nprocessus victime.\n\n#### Variante 3 (CVE-2018-3639)\n\nLes processeurs \u00e9mettent \u00e9galement des hypoth\u00e8ses concernant l\u0027adresse\nde certains acc\u00e8s m\u00e9moire. Pour b\u00e9n\u00e9ficier de plus de libert\u00e9s dans\nl\u0027ordre d\u0027ex\u00e9cution d\u0027op\u00e9rations de lecture m\u00e9moire, le processeur va\ndevoir pr\u00e9dire si celles-ci chevauchent des op\u00e9rations d\u0027\u00e9criture en\nattente d\u0027ex\u00e9cution. Si une op\u00e9ration de lecture ne chevauche aucune\nop\u00e9ration d\u0027\u00e9criture en attente d\u0027ex\u00e9cution, rien ne s\u0027oppose \u00e0 qu\u0027elle\npuisse \u00eatre ex\u00e9cut\u00e9e de fa\u00e7on anticip\u00e9e.\n\nDans la variante 3 de Spectre, un attaquant influe sur les heuristiques\ndu processeur utilis\u00e9es pour la pr\u00e9diction d\u0027adresses, ce qui a pour\neffet de d\u00e9clencher une ex\u00e9cution sp\u00e9culative erron\u00e9e d\u0027une op\u00e9ration de\nlecture m\u00e9moire et des instructions qui en d\u00e9pendent. Un code est\nvuln\u00e9rable si cette ex\u00e9cution sp\u00e9culative erron\u00e9e manipule une valeur\nsecr\u00e8te et la laisse fuir \u00e0 travers un \u00e9tat observable du cache\n\nMicrosoft (une des parties ayant d\u00e9couvert la vuln\u00e9rabilit\u00e9) \\[43\\]\naffirme ne pas avoir identifi\u00e9 de code vuln\u00e9rable dans leurs produits,\nce qui laisse penser que les codes vuln\u00e9rables sont peu fr\u00e9quents.\n\n### Impact\n\nLes vuln\u00e9rabilit\u00e9s d\u00e9crites dans cette alerte peuvent impacter tous les\nsyst\u00e8mes utilisant un processeur vuln\u00e9rable et donc de fa\u00e7on\nind\u00e9pendante du syst\u00e8me d\u0027exploitation. Selon les chercheurs \u00e0 l\u0027origine\nde la d\u00e9couverte de ces failles, il est ainsi possible d\u0027acc\u00e9der \u00e0\nl\u0027int\u00e9gralit\u00e9 de la m\u00e9moire physique sur des syst\u00e8mes Linux et OSX et \u00e0\nune part importante de la m\u00e9moire sur un syst\u00e8me Windows.\n\nOn notera que l\u0027impact peut \u00eatre plus particuli\u00e8rement important dans\ndes syst\u00e8mes de ressources partag\u00e9s de type conteneur (Docker, LXC) o\u00f9\nil serait possible depuis un environnement restreint d\u0027acc\u00e9der \u00e0 toutes\nles donn\u00e9es pr\u00e9sentes sur la machine physique dans lequel s\u0027ex\u00e9cute le\nconteneur ou encore dans des environnements virtualis\u00e9s utilisant la\npara-virtualisation de type Xen.\n\n### Preuve de concept\n\nLe CERT-FR constate que des preuves de concept fonctionnelles pour\nMeltdown sont d\u00e9sormais publiques. Les r\u00e8gles Yara suivantes servent \u00e0\nd\u00e9tecter les binaires li\u00e9s \u00e0 la biblioth\u00e8que publi\u00e9e par l\u0027Institute of\nApplied Information Processing and Communications (IAIK) :\n\n\\[pastacode lang=\"c\"\nmanual=\"rule%20meltdown_iaik_libkdump_meltdown_nonull%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown_nonull%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%2F\\*%0A%0A.text%3A00000000000018A6%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20%20rax%2C%20rax%20%20%20.text%3A00000000000018A9%0A%0A.text%3A00000000000018A9%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20loc_18A9%3A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3B%20CODE%20XREF%3A%20libkdump_read_tsx%2B48j%0A%0A.text%3A00000000000018A9%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A00000000000018AB%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A00000000000018AF%2074%20F8%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jz%20%20%20%20%20%20%20%20short%20loc_18A9%0A%0A.text%3A00000000000018B1%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A\\*%2F%0A%0A%24asm%3D%7B%0A%0A48%2031%20C0%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A74%20F8%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%20%24asm%0A%0A%7D%0A%0A%0Arule%20meltdown_iaik_libkdump_meltdown_fast%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown_fast%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%20%20%20%20%2F\\*%0A%0A.text%3A000000000000184F%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20%20%20rax%2C%20rax%0A%0A.text%3A0000000000001852%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A0000000000001854%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A0000000000001858%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A\\*%2F%0A%0A%24asm%20%3D%20%7B%0A%0A48%2031%20C0%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%0A%0A%24asm%0A%0A%7D%0A%0A%0Arule%20meltdown_iaik_libkdump_meltdown%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%2F\\*%0A%0A.text%3A00000000000018A8%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20rax%2C%20rax%20%20%20.text%3A00000000000018AB%0A%0A.text%3A00000000000018AB%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20loc_18AB%3A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3B%20CODE%20XREF%3A%20libkdump_read_tsx%2B4Dj%0A%0A.text%3A00000000000018AB%2048%208B%2036%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20rsi%2C%20%5Brsi%5D%0A%0A.text%3A00000000000018AE%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A00000000000018B0%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A00000000000018B4%2074%20F5%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jz%20%20%20%20%20%20%20%20short%20loc_18AB%0A%0A.text%3A00000000000018B6%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A\\*%2F%0A%0A%24asm%3D%7B%0A%0A48%2031%20C0%0A%0A48%208B%2036%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A74%20F5%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%0A%0A%24asm%0A%0A%7D\"\nmessage=\"\" highlight=\"\" provider=\"manual\"/\\]\n\n### Campagne de pourriels\n\nLe CERT-FR constate qu\u0027une campagne de pourriels visant \u00e0 distribuer des\nlogiciels malveillants a \u00e9t\u00e9 lanc\u00e9e afin de profiter de la situation\nautour des vuln\u00e9rabilit\u00e9 Spectre et Meltdown \\[32\\]. Des attaquants se\nfaisant passer pour la *\u003cspan lang=\"de\"\u003eBundesamt f\u00fcr Sicherheit in der\nInformationstechnik \u003c/span\u003e*\u003cspan lang=\"de\"\u003e(BSI), l\u0027\u00e9quivalent allemand\nde l\u0027ANSSI, ont envoy\u00e9 des courriers \u00e9lectroniques invitant leurs\ndestinataires \u00e0 se rendre sur une copie du site de la BSI. La diff\u00e9rence\navec le site officiel \u00e9tait une modification de l\u0027alerte concernant les\nvuln\u00e9rabilit\u00e9s: l\u0027utilisateur \u00e9tait invit\u00e9 \u00e0 installer un correctif qui\nse trouvait \u00eatre un logiciel malveillant.\u003c/span\u003e\n\nLe CERT-FR rappelle de faire preuve de la plus grande vigilance quand \u00e0\nl\u0027ouverture des courriers \u00e9lectroniques ainsi que d\u0027installer les\ncorrectifs de s\u00e9curit\u00e9 dans les plus brefs d\u00e9lais, et ce uniquement\ndepuis les sources officielles des \u00e9diteurs.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s de fuite d\u0027informations dans des processeurs",
"vendor_advisories": [
{
"published_at": null,
"title": "Sites d\u00e9taillant le principe de la vuln\u00e9rabilit\u00e9",
"url": null
}
]
}
CISCO-SA-20180104-CPUSIDECHANNEL
Vulnerability from csaf_cisco - Published: 2018-01-04 22:20 - Updated: 2018-07-06 21:11Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "On January 3, 2018, researchers disclosed three vulnerabilities that take advantage of the implementation of speculative execution of instructions on many modern microprocessor architectures to perform side-channel information disclosure attacks. These vulnerabilities could allow an unprivileged local attacker, in specific circumstances, to read privileged memory belonging to other processes or memory allocated to the operating system kernel.\r\n\r\nThe first two vulnerabilities, CVE-2017-5753 and CVE-2017-5715, are collectively known as Spectre. The third vulnerability, CVE-2017-5754, is known as Meltdown. The vulnerabilities are all variants of the same attack and differ in the way that speculative execution is exploited.\r\n\r\nTo exploit any of these vulnerabilities, an attacker must be able to run crafted code on an affected device. Although the underlying CPU and operating system combination in a product or service may be affected by these vulnerabilities, the majority of Cisco products are closed systems that do not allow customers to run custom code and are, therefore, not vulnerable. There is no vector to exploit them. Cisco products are considered potentially vulnerable only if they allow customers to execute custom code side-by-side with Cisco code on the same microprocessor.\r\n\r\nA Cisco product that may be deployed as a virtual machine or a container, even while not directly affected by any of these vulnerabilities, could be targeted by such attacks if the hosting environment is vulnerable. Cisco recommends that customers harden their virtual environments, tightly control user access, and ensure that all security updates are installed. Customers who are deploying products as a virtual device in multi-tenant hosting environments should ensure that the underlying hardware, as well as operating system or hypervisor, is patched against the vulnerabilities in question.\r\n\r\nAlthough Cisco cloud services are not directly affected by these vulnerabilities, the infrastructure on which they run may be impacted. Refer to the \u201cAffected Products\u201d section of this advisory for information about the impact of these vulnerabilities on Cisco cloud services.\r\n\r\nCisco will release software updates that address these vulnerabilities.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel\"]",
"title": "Summary"
},
{
"category": "general",
"text": "Cisco is investigating its product line to determine which products and cloud services may be affected by these vulnerabilities. As the investigation progresses, Cisco will update this advisory with information about affected products and services, including the Cisco bug ID for each affected product or service.\r\n\r\nAny product or service not listed in the \u201cProducts Under Investigation\u201d or \u201cVulnerable Products\u201d section of this advisory is to be considered not vulnerable. The criteria for considering whether a product is vulnerable is explained in the \u201cSummary\u201d section of this advisory. Because this is an ongoing investigation, please be aware that products and services currently considered not vulnerable may subsequently be considered vulnerable as additional information becomes available.\r\n\r\nProducts Under Investigation\r\nNo products are currently under active investigation to determine whether they are affected by the vulnerability that is described in this advisory.",
"title": "Affected Products"
},
{
"category": "general",
"text": "The following table lists Cisco products and cloud services that are affected by the vulnerabilities described in this advisory:\r\n Product Cisco Bug ID Fixed Release Availability Network Application, Service, and Acceleration Cisco Cloud Services Platform 2100 CSCvh32644 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32644\"] Consult the Cisco bug ID for details Cisco Network Functions Virtualization Infrastructure Software CSCvh49919 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh49919\"] Consult the Cisco bug ID for details Cisco Nexus 3000 Series Switches CSCvh32392 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32392\"] Consult the Cisco bug ID for details Cisco Nexus 9000 Series Switches - Standalone, NX-OS mode CSCvh32392 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32392\"] Consult the Cisco bug ID for details Cisco Wide Area Application Services (WAAS) CSCvh49646 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh49646\"] Update to v6.x (Available) Cisco vBond Orchestrator \u2014 18.2 (Available) Cisco vEdge 5000 \u2014 18.2 (Available) Cisco vEdge Cloud \u2014 18.2 (Available) Cisco vManage NMS \u2014 Cisco vSmart Controller \u2014 18.2 (Available) Network Management and Provisioning Cisco Application Policy Infrastructure Controller (APIC) CSCvh58549 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58549\"] 3.2(1l) (Available) Cisco Evolved Programmable Network Manager CSCvh64005 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh64005\"] Consult the Cisco bug ID for details Cisco Virtual Application Policy Infrastructure Controller (APIC) CSCvh58549 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58549\"] 3.2(1l) (Available) Routing and Switching - Enterprise and Service Provider Cisco 4000 Series Integrated Services Routers (IOS XE Open Service Containers) - Meltdown CSCvh32416 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416\"] 16.3.7 (June-2018) Cisco 4000 Series Integrated Services Routers (IOS XE Open Service Containers) - Spectre v1, v2, v3 CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] A fix is pending on upstream vendors Cisco 800 Industrial Integrated Services Routers (IOx feature) CSCvh31418 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31418\"] Consult the Cisco bug ID for details Cisco ASR 1000 Series Aggregation Services Router with RP2 or RP3 (IOS XE Open Service Containers) - Meltdown CSCvh32416 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416\"] 16.3.7 (June-2018) Cisco ASR 1000 Series Aggregation Services Router with RP2 or RP3 (IOS XE Open Service Containers) - Spectre v1, v2, v3 CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] A fix is pending on upstream vendors Cisco ASR 1001-HX Series Aggregation Services Routers (IOS XE Open Service Containers) - Meltdown CSCvh32416 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416\"] 16.3.7 (June-2018) Cisco ASR 1001-HX Series Aggregation Services Routers (IOS XE Open Service Containers) - Spectre v1, v2, v3 CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] A fix is pending on upstream vendors Cisco ASR 1001-X Series Aggregation Services Routers (IOS XE Open Service Containers) - Meltdown CSCvh32416 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416\"] 16.3.7 (June-2018) Cisco ASR 1001-X Series Aggregation Services Routers (IOS XE Open Service Containers) - Spectre v1, v2, v3 CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] A fix is pending on upstream vendors Cisco ASR 1002-HX Series Aggregation Services Routers (IOS XE Open Service Containers) - Meltdown CSCvh32416 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416\"] 16.3.7 (June-2018) Cisco ASR 1002-HX Series Aggregation Services Routers (IOS XE Open Service Containers) - Spectre v1, v2, v3 CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] A fix is pending on upstream vendors Cisco ASR 1002-X Series Aggregation Services Routers (IOS XE Open Service Containers) - Meltdown CSCvh32416 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416\"] 16.3.7 (June-2018) Cisco ASR 1002-X Series Aggregation Services Routers (IOS XE Open Service Containers) - Spectre v1, v2, v3 CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] A fix is pending on upstream vendors Cisco ASR 9000 XR 64-bit Series Routers CSCvh32429 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429\"] Consult the Cisco bug ID for details Cisco CGR 1000 Compute Module (IOx feature) CSCvh32516 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32516\"] Consult the Cisco bug ID for details Cisco Catalyst 9300 Series Switches (Open Service Container or IOx feature) CSCvh44164 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh44164\"] 16.6.3\r\n16.7.2\r\n16.8.1\r\n16.9.1\r\n(June - 2018)\r\n Cisco Catalyst 9400 Series Switches (Open Service Container or IOx feature) CSCvh44165 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh44165\"] 16.6.3\r\n16.7.2\r\n16.8.1\r\n16.9.1\r\n(June - 2018) Cisco Catalyst 9500 Series Switches (Open Service Container or IOx feature) CSCvh44166 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh44166\"] 16.6.3\r\n16.7.2\r\n16.8.1\r\n16.9.1\r\n(June -2018) Cisco Cloud Services Router 1000V Series (IOS XE Open Service Containers) - Meltdown CSCvh32416 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416\"] 16.3.7 (June-2018) Cisco Cloud Services Router 1000V Series (IOS XE Open Service Containers) - Spectre v1, v2, v3 CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] A fix is pending on upstream vendors Cisco NCS 1000 Series Routers CSCvh32429 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429\"] Consult the Cisco bug ID for details Cisco NCS 5000 Series Routers CSCvh32429 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429\"] Consult the Cisco bug ID for details Cisco NCS 5500 Series Routers CSCvh32429 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429\"] Consult the Cisco bug ID for details Cisco Nexus 3500 Series Switches CSCvh32393 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32393\"] No fix expected Cisco Nexus 5000 Series Switches (OAC feature) CSCvh32394 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32394\"] Consult the Cisco bug ID for details Cisco Nexus 6000 Series Switches (OAC feature) CSCvh32390 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32390\"] Consult the Cisco bug ID for details Cisco Nexus 7000 Series Switches (OAC feature, Feature Bash) CSCvh32390 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32390\"] Consult the Cisco bug ID for details Cisco XRv 9000 Series Routers CSCvh32429 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429\"] Consult the Cisco bug ID for details Cisco c800 Series Integrated Services Routers (IOx feature) CSCvh51582 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh51582\"] Consult the Cisco bug ID for details Unified Computing Cisco C880 M4 Server CSCvh66783 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh66783\"] Consult the Cisco bug ID for details Cisco C880 M5 Server CSCvh66783 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh66783\"] Consult the Cisco bug ID for details Cisco Enterprise Network Compute System 5100 Series Servers CSCvh48274 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274\"] UCS E-Series M2 Servers - Single-wide: v1.5.0.7\r\nUCS E-Series M2 Servers - Double-wide: v2.5.0.5\r\nUCS E-Series M3 Servers - Consult the Cisco Bug ID for details Cisco Enterprise Network Compute System 5400 Series Servers CSCvh48274 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274\"] UCS E-Series M2 Servers - Single-wide: v1.5.0.7\r\nUCS E-Series M2 Servers - Double-wide: v2.5.0.5\r\nUCS E-Series M3 Servers - Consult the Cisco Bug ID for details Cisco HyperFlex with VMWare Hypervisor CSCvh68612 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh68612\"] HX 2.5.1d\r\nHX 2.6.1d\r\nHX 3.0.1a\r\n(Available) Cisco UCS B-Series M2 Blade Servers CSCvh31576 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31576\"] UCS B-Series M2 Blade Servers - UCS Manager 2.2(8j) (Apr-2018)\r\nUCS Manager 3.1(3h) (May-2018)\r\nUCS Manager 3.2(3b) (May-2018)\r\nUCS C-Series M2 Rack Servers -UCS Manager 2.2(8j) (Apr-2018)\r\nIMC 1.4(3z08) (Apr-2018) / 1.5(9e) (Apr-2018)\r\n Cisco UCS B-Series M3 Blade Servers CSCvg97965 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97965\"] UCS B-Series M3 Blade Servers\r\n3.2(3a)(Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C-Series M3 Rack Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\nUCS Manager 2.2(8j) (Apr-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\nIMC 2.0(9n) (Apr-2018)\r\n Cisco UCS B-Series M4 Blade Servers (except B260, B460) CSCvg97979 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97979\"] UCS B-Series M4 Blade Servers (except B260\r\nB460)\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C-Series M4 Rack Servers (except C460)\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\nIMC 2.0(10i) (Apr-2018)\r\nUCS S3260 M4 Storage Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\n Cisco UCS B-Series M5 Blade Servers CSCvh31577 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31577\"] UCS B-Series M5 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\nUCS C-Series M5 Rack Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\nIMC 3.1(3a) (Mar-2018)\r\n Cisco UCS B260 M4 Blade Server CSCvg98015 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg98015\"] UCS B260 M4 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS B460 M4 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C460 M4 Rack Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\n Cisco UCS B460 M4 Blade Server CSCvg98015 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg98015\"] UCS B260 M4 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS B460 M4 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C460 M4 Rack Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\n Cisco UCS C-Series M2 Rack Servers CSCvh31576 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31576\"] UCS B-Series M2 Blade Servers - UCS Manager 2.2(8j) (Apr-2018)\r\nUCS Manager 3.1(3h) (May-2018)\r\nUCS Manager 3.2(3b) (May-2018)\r\nUCS C-Series M2 Rack Servers -UCS Manager 2.2(8j) (Apr-2018)\r\nIMC 1.4(3z08) (Apr-2018) / 1.5(9e) (Apr-2018)\r\n Cisco UCS C-Series M3 Rack Servers CSCvg97965 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97965\"] UCS B-Series M3 Blade Servers\r\n3.2(3a)(Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C-Series M3 Rack Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\nUCS Manager 2.2(8j) (Apr-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\nIMC 2.0(9n) (Apr-2018)\r\n Cisco UCS C-Series M4 Rack Servers (except C460) 1 CSCvg97979 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97979\"] UCS B-Series M4 Blade Servers (except B260\r\nB460)\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C-Series M4 Rack Servers (except C460)\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\nIMC 2.0(10i) (Apr-2018)\r\nUCS S3260 M4 Storage Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\n Cisco UCS C-Series M5 Rack Servers 1 CSCvh31577 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31577\"] UCS B-Series M5 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\nUCS C-Series M5 Rack Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\nIMC 3.1(3a) (Mar-2018)\r\n Cisco UCS C460 M4 Rack Server CSCvg98015 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg98015\"] UCS B260 M4 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS B460 M4 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C460 M4 Rack Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\n Cisco UCS E-Series M2 Servers CSCvh48274 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274\"] UCS E-Series M2 Servers - Single-wide: v1.5.0.7\r\nUCS E-Series M2 Servers - Double-wide: v2.5.0.5\r\nUCS E-Series M3 Servers - Consult the Cisco Bug ID for details Cisco UCS E-Series M3 Servers CSCvh48274 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274\"] UCS E-Series M2 Servers - Single-wide: v1.5.0.7\r\nUCS E-Series M2 Servers - Double-wide: v2.5.0.5\r\nUCS E-Series M3 Servers - Consult the Cisco Bug ID for details Cisco UCS M-Series Modular Servers CSCvh55760 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh55760\"] No fix expected Cisco UCS S3260 M4 Storage Server CSCvg97979 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97979\"] UCS B-Series M4 Blade Servers (except B260\r\nB460)\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C-Series M4 Rack Servers (except C460)\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\nIMC 2.0(10i) (Apr-2018)\r\nUCS S3260 M4 Storage Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\n Voice and Unified Communications Devices Cisco Remote Expert Mobile CSCvh58132 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58132\"] 11.6(1)ES3 11.5(1)ES8 (Available) Wireless Cisco Wireless Gateway for LoRaWAN CSCvh58504 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58504\"] Consult the Cisco bug ID for details Cisco Cloud Hosted Services Cisco Metacloud CSCvh53992 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh53992\"] Meltdown and Spectre variant 1 (v4.7) (Feb-2018)\r\nSpectre variant 2 (Apr-2018)\r\n Cisco Threat Grid \u2014 v2.4.3 (Available)\r\n 1 Cisco UCS M4 and M5 Rack Servers are used as part of the Cisco HyperFlex Solution.",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "No other Cisco products or cloud services are currently known to be affected by these vulnerabilities.\r\n\r\nCisco has confirmed that these vulnerabilities do not affect the following products or cloud services:\r\n\r\nCollaboration and Social Media\r\n\r\nCisco Meeting Server\r\nNetwork Application, Service, and Acceleration\r\n\r\nCisco vEdge 1000\r\nCisco vEdge 100\r\nCisco vEdge 2000\r\nRouting and Switching - Enterprise and Service Provider\r\n\r\nCisco 1000 Series Connected Grid Routers\r\nCisco 500 Series WPAN Industrial Routers (IOx feature)\r\nCisco ASR 1001 Fixed Configuration Aggregation Services Router\r\nCisco ASR 1002 Fixed Configuration Aggregation Services Router\r\nCisco ASR 1002-F Fixed Configuration Aggregation Services Router\r\nCisco Catalyst 3650 Series Switches\r\nCisco Catalyst 3850 Series Switches\r\nCisco Industrial Ethernet 4000 Series Switches (IOx feature)\r\nCisco Nexus 4000 Series Blade Switches\r\nCisco Nexus 9000 Series Fabric Switches - ACI mode\r\nCisco Cloud Hosted Services\r\n\r\nCisco Cloudlock\r\nCisco Managed Services\r\nCisco Meraki\r\nCisco Spark\r\nCisco Umbrella\r\nCisco WebEx Centers - Meeting Center, Training Center, Event Center, Support Center",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "Details about the vulnerabilities are as follows.\r\n\r\nModern CPU Process Prediction Information Disclosure Vulnerability\r\n\r\nA vulnerability due to the design of most modern CPUs could allow a local attacker to access sensitive information on a targeted system.\r\n\r\nThe vulnerability is due to improper implementation of the speculative execution of instructions by the affected software. This vulnerability can by triggered by utilizing branch target injection. An attacker could exploit this vulnerability by executing arbitrary code and performing a side-channel attack on a targeted system. A successful exploit could allow the attacker to read sensitive memory information.\r\n\r\nThis vulnerability has been assigned the following CVE ID: CVE-2017-5715\r\n\r\nModern CPU Process Branch Prediction Information Disclosure Vulnerability\r\n\r\nA vulnerability due to the design of most modern CPUs could allow a local attacker to access sensitive information on a targeted system.\r\n\r\nThe vulnerability is due to improper implementation of the speculative execution of instructions by the affected software. This vulnerability can by triggered by performing a bounds check bypass. An attacker could exploit this vulnerability by executing arbitrary code and performing a side-channel attack on a targeted system. A successful exploit could allow the attacker to read sensitive memory information.\r\n\r\nThis vulnerability has been assigned the following CVE ID: CVE-2017-5753\r\n\r\nIntel CPU Indirect Branch Prediction Information Disclosure Vulnerability\r\n\r\nA vulnerability in Intel CPU hardware could allow a local attacker to gain access to sensitive information on a targeted system.\r\n\r\nThe vulnerability is due to side-channel attacks, which are also referred to as Meltdown attacks. A local attacker could exploit this vulnerability by executing arbitrary code on the affected system. A successful exploit could allow the attacker to gain access to sensitive information on the targeted system, including accessing memory from the CPU cache.\r\n\r\nThis vulnerability has been assigned the following CVE ID: CVE-2017-5754",
"title": "Details"
},
{
"category": "general",
"text": "Any workarounds will be documented in the product-specific Cisco bugs, which are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"].",
"title": "Workarounds"
},
{
"category": "general",
"text": "For information about fixed software releases, consult the Cisco bugs identified in the \u201cVulnerable Products\u201d section of this advisory.\r\n\r\nWhen considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The vulnerabilities described in this advisory were discussed in several articles and discussion forums as of January 3, 2018.\r\n\r\nThe Cisco Product Security Incident Response Team (PSIRT) is not aware of any malicious use of the vulnerabilities that are described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. CISCO EXPECTS TO UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.",
"issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "CPU Side-Channel Information Disclosure Vulnerabilities",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"category": "external",
"summary": "CPU Side-Channel Information Disclosure Vulnerabilities",
"url": "https://sec.cloudapps.cisco.com/security/center/viewAlert.x?alertId=56354"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"category": "external",
"summary": "CSCvh32644",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32644"
},
{
"category": "external",
"summary": "CSCvh49919",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh49919"
},
{
"category": "external",
"summary": "CSCvh32392",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32392"
},
{
"category": "external",
"summary": "CSCvh32392",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32392"
},
{
"category": "external",
"summary": "CSCvh49646",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh49646"
},
{
"category": "external",
"summary": "CSCvh58549",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58549"
},
{
"category": "external",
"summary": "CSCvh64005",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh64005"
},
{
"category": "external",
"summary": "CSCvh58549",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58549"
},
{
"category": "external",
"summary": "CSCvh32416",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416"
},
{
"category": "external",
"summary": "CSCvj59152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152"
},
{
"category": "external",
"summary": "CSCvh31418",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31418"
},
{
"category": "external",
"summary": "CSCvh32416",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416"
},
{
"category": "external",
"summary": "CSCvj59152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152"
},
{
"category": "external",
"summary": "CSCvh32416",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416"
},
{
"category": "external",
"summary": "CSCvj59152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152"
},
{
"category": "external",
"summary": "CSCvh32416",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416"
},
{
"category": "external",
"summary": "CSCvj59152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152"
},
{
"category": "external",
"summary": "CSCvh32416",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416"
},
{
"category": "external",
"summary": "CSCvj59152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152"
},
{
"category": "external",
"summary": "CSCvh32416",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416"
},
{
"category": "external",
"summary": "CSCvj59152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152"
},
{
"category": "external",
"summary": "CSCvh32429",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429"
},
{
"category": "external",
"summary": "CSCvh32516",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32516"
},
{
"category": "external",
"summary": "CSCvh44164",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh44164"
},
{
"category": "external",
"summary": "CSCvh44165",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh44165"
},
{
"category": "external",
"summary": "CSCvh44166",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh44166"
},
{
"category": "external",
"summary": "CSCvh32416",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416"
},
{
"category": "external",
"summary": "CSCvj59152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152"
},
{
"category": "external",
"summary": "CSCvh32429",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429"
},
{
"category": "external",
"summary": "CSCvh32429",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429"
},
{
"category": "external",
"summary": "CSCvh32429",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429"
},
{
"category": "external",
"summary": "CSCvh32393",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32393"
},
{
"category": "external",
"summary": "CSCvh32394",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32394"
},
{
"category": "external",
"summary": "CSCvh32390",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32390"
},
{
"category": "external",
"summary": "CSCvh32390",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32390"
},
{
"category": "external",
"summary": "CSCvh32429",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429"
},
{
"category": "external",
"summary": "CSCvh51582",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh51582"
},
{
"category": "external",
"summary": "CSCvh66783",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh66783"
},
{
"category": "external",
"summary": "CSCvh66783",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh66783"
},
{
"category": "external",
"summary": "CSCvh48274",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274"
},
{
"category": "external",
"summary": "CSCvh48274",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274"
},
{
"category": "external",
"summary": "CSCvh68612",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh68612"
},
{
"category": "external",
"summary": "CSCvh31576",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31576"
},
{
"category": "external",
"summary": "CSCvg97965",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97965"
},
{
"category": "external",
"summary": "CSCvg97979",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97979"
},
{
"category": "external",
"summary": "CSCvh31577",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31577"
},
{
"category": "external",
"summary": "CSCvg98015",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg98015"
},
{
"category": "external",
"summary": "CSCvg98015",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg98015"
},
{
"category": "external",
"summary": "CSCvh31576",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31576"
},
{
"category": "external",
"summary": "CSCvg97965",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97965"
},
{
"category": "external",
"summary": "CSCvg97979",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97979"
},
{
"category": "external",
"summary": "CSCvh31577",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31577"
},
{
"category": "external",
"summary": "CSCvg98015",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg98015"
},
{
"category": "external",
"summary": "CSCvh48274",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274"
},
{
"category": "external",
"summary": "CSCvh48274",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274"
},
{
"category": "external",
"summary": "CSCvh55760",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh55760"
},
{
"category": "external",
"summary": "CSCvg97979",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97979"
},
{
"category": "external",
"summary": "CSCvh58132",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58132"
},
{
"category": "external",
"summary": "CSCvh58504",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58504"
},
{
"category": "external",
"summary": "CSCvh53992",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh53992"
},
{
"category": "external",
"summary": "Cisco Bug Search Tool",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID"
},
{
"category": "external",
"summary": "Cisco Security Advisories and Alerts page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
}
],
"title": "CPU Side-Channel Information Disclosure Vulnerabilities",
"tracking": {
"current_release_date": "2018-07-06T21:11:00+00:00",
"generator": {
"date": "2022-09-03T03:07:27+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-20180104-cpusidechannel",
"initial_release_date": "2018-01-04T22:20:00+00:00",
"revision_history": [
{
"date": "2018-01-04T22:24:26+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2018-01-04T23:26:00+00:00",
"number": "1.1.0",
"summary": "Clarified the non-vulnerable product section."
},
{
"date": "2018-01-05T20:52:29+00:00",
"number": "1.2.0",
"summary": "Updated Summary and Products Under Investigation, added the Vulnerable Products table with information about fixes."
},
{
"date": "2018-01-08T22:28:29+00:00",
"number": "1.3.0",
"summary": "Updated vulnerability details and information about products under investigation and products confirmed not vulnerable. Added the Vulnerable Products table, including information about fixed release availability."
},
{
"date": "2018-01-09T20:20:13+00:00",
"number": "1.4.0",
"summary": "Updated information about products under investigation and vulnerable products."
},
{
"date": "2018-01-10T21:32:05+00:00",
"number": "1.5.0",
"summary": "Updated the summary to indicate the status of Cisco cloud services and remind administrators to control user access. Updated information about vulnerable products, products under investigation, and products confirmed not vulnerable."
},
{
"date": "2018-01-11T21:04:01+00:00",
"number": "1.6.0",
"summary": "Updated information about vulnerable products, products under investigation, and products confirmed not vulnerable."
},
{
"date": "2018-01-12T21:22:52+00:00",
"number": "1.7.0",
"summary": "Updated information about vulnerable products, products under investigation, and products confirmed not vulnerable."
},
{
"date": "2018-01-15T19:52:57+00:00",
"number": "1.8.0",
"summary": "Updated information about products under investigation and vulnerable products, including fixed release availability."
},
{
"date": "2018-01-16T22:37:34+00:00",
"number": "1.9.0",
"summary": "Updated information about products under investigation and vulnerable products, including fixed release availability."
},
{
"date": "2018-01-17T22:03:45+00:00",
"number": "1.10.0",
"summary": "Updated Vulnerable Products section with fixed release availability and estimates."
},
{
"date": "2018-01-18T22:34:03+00:00",
"number": "1.11.0",
"summary": "Updated Summary section to provide guidance on updating underlying operating systems and hypervisors within virtual environments. Updated Affected Products sections and fixed release table."
},
{
"date": "2018-01-19T21:04:12+00:00",
"number": "1.12.0",
"summary": "Updated Products Under Investigation and Vulnerable Products."
},
{
"date": "2018-01-22T20:45:55+00:00",
"number": "1.13.0",
"summary": "Updated Products Under Investigation and Vulnerable Products sections. Removed UCS M5 server firmware release date. The UCS M5 BIOS updates have been removed from cisco.com at this time. Customers are advised to wait for the next revision of these updates before updating their devices."
},
{
"date": "2018-01-24T21:06:03+00:00",
"number": "1.14.0",
"summary": "Updated Products Under Investigation and Vulnerable Products sections."
},
{
"date": "2018-01-26T17:23:15+00:00",
"number": "1.15.0",
"summary": "Updated Vulnerable Products section."
},
{
"date": "2018-01-30T20:21:50+00:00",
"number": "1.16.0",
"summary": "Updated Vulnerable and Confirmed Not Vulnerable sections. Cisco Industrial Ethernet 4000 devices moved to Confirmed Not Vulnerable section."
},
{
"date": "2018-02-05T20:55:19+00:00",
"number": "1.17.0",
"summary": "Updated Vulnerable Products table."
},
{
"date": "2018-02-07T19:48:53+00:00",
"number": "1.18.0",
"summary": "Updated Vulnerable Products Table with fiximelines on a number of products."
},
{
"date": "2018-02-07T22:16:45+00:00",
"number": "1.19.0",
"summary": "Updated Vulnerable Products Table Fix information for E-Series servers."
},
{
"date": "2018-03-01T21:13:58+00:00",
"number": "1.20.0",
"summary": "Updated Vulnerable Products table with estimated availability dates for the delivery of fixed software for multiple products."
},
{
"date": "2018-03-07T21:57:52+00:00",
"number": "1.21.0",
"summary": "Updated Vulnerable Products table with estimated availability dates for the delivery of fixed software for Cisco UCS Servers."
},
{
"date": "2018-03-20T22:32:23+00:00",
"number": "1.22.0",
"summary": "Updated Vulnerable Products table with version information and estimated availability dates for the delivery of fixed software for Cisco UCS Servers."
},
{
"date": "2018-04-09T19:33:18+00:00",
"number": "1.23.0",
"summary": "Updated Vulnerable Products table with fixed version information for UCS M2, M3, and additional M4 models."
},
{
"date": "2018-05-15T17:10:59+00:00",
"number": "1.24.0",
"summary": "Updated Vulnerable Products table with fixed version information for multiple products."
},
{
"date": "2018-05-22T18:30:08+00:00",
"number": "1.25.0",
"summary": "Updated Vulnerable Products table with fixed version information for multiple products."
},
{
"date": "2018-06-05T18:00:09+00:00",
"number": "1.26.0",
"summary": "Updated Vulnerable Products table with fixed version information for multiple products."
},
{
"date": "2018-06-08T18:55:52+00:00",
"number": "1.27.0",
"summary": "Updated Vulnerable Products table with fixed version information for multiple products."
},
{
"date": "2018-06-13T18:39:34+00:00",
"number": "1.28.0",
"summary": "Updated Vulnerable Products table with fixed version information for multiple products."
},
{
"date": "2018-06-22T18:11:46+00:00",
"number": "1.29.0",
"summary": "Updated Vulnerable Products table with fixed version information for multiple products. Added second defect for a selection of IOS XE-based products to cover independent fixes of Spectre and Meltdown issues."
},
{
"date": "2018-06-27T21:00:41+00:00",
"number": "1.30.0",
"summary": "Updated Vulnerable Products table with fixed version information for UCS E-Series M2 Servers."
},
{
"date": "2018-07-06T21:11:04+00:00",
"number": "1.31.0",
"summary": "Updated Vulnerable Products table with fixed version information for multiple products."
}
],
"status": "interim",
"version": "1.31.0"
}
},
"vulnerabilities": [
{
"cve": "CVE-2017-5754",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2018-01-04T16:54:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Intel CPU Indirect Branch Prediction Information Disclosure Vulnerability"
},
{
"cve": "CVE-2017-5753",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2018-01-04T16:50:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Modern CPU Process Branch Prediction Information Disclosure Vulnerability"
},
{
"cve": "CVE-2017-5715",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2018-01-04T16:43:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Modern CPU Process Prediction Information Disclosure Vulnerability"
}
]
}
VAR-201801-0826
Vulnerability from variot - Updated: 2024-07-23 19:20Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. CPU hardware utilizing speculative execution may be vulnerable to cache timing side-channel analysis. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Meltdown vulnerability exists in the CPU processor core, which \"melts\" the security boundary implemented by hardware, allowing low-privileged user-level applications to \"cross-border\" access to system-level memory, causing data leakage. The following products and versions are affected: ARM Cortex-R7; Cortex-R8; Cortex-A8; Cortex-A9; Cortex-A12; Intel Xeon CPU E5-1650 v3, v2, v4 versions; Xeon E3-1265l v2, v3, v4 Version; Xeon E3-1245 v2, v3, v5, v6 versions; Xeon X7542, etc. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-4188-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso May 01, 2018 https://www.debian.org/security/faq
Package : linux CVE ID : CVE-2017-5715 CVE-2017-5753 CVE-2017-17975 CVE-2017-18193 CVE-2017-18216 CVE-2017-18218 CVE-2017-18222 CVE-2017-18224 CVE-2017-18241 CVE-2017-18257 CVE-2018-1065 CVE-2018-1066 CVE-2018-1068 CVE-2018-1092 CVE-2018-1093 CVE-2018-1108 CVE-2018-5803 CVE-2018-7480 CVE-2018-7566 CVE-2018-7740 CVE-2018-7757 CVE-2018-7995 CVE-2018-8087 CVE-2018-8781 CVE-2018-8822 CVE-2018-10323 CVE-2018-1000199
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
CVE-2017-5715
Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes
running on the system.
This specific attack has been named Spectre variant 2 (branch
target injection) and is mitigated for the x86 architecture (amd64
and i386) by using the "retpoline" compiler feature which allows
indirect branches to be isolated from speculative execution.
CVE-2017-5753
Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes
running on the system.
This specific attack has been named Spectre variant 1
(bounds-check bypass) and is mitigated by identifying vulnerable
code sections (array bounds checking followed by array access) and
replacing the array access with the speculation-safe
array_index_nospec() function.
More use sites will be added over time.
CVE-2017-17975
Tuba Yavuz reported a use-after-free flaw in the USBTV007
audio-video grabber driver. A local user could use this for denial
of service by triggering failure of audio registration.
CVE-2017-18193
Yunlei He reported that the f2fs implementation does not properly
handle extent trees, allowing a local user to cause a denial of
service via an application with multiple threads.
CVE-2017-18216
Alex Chen reported that the OCFS2 filesystem failed to hold a
necessary lock during nodemanager sysfs file operations,
potentially leading to a null pointer dereference. A local user
could use this for denial of service.
CVE-2017-18218
Jun He reported a user-after-free flaw in the Hisilicon HNS ethernet
driver. A local user could use this for denial of service.
CVE-2017-18222
It was reported that the Hisilicon Network Subsystem (HNS) driver
implementation does not properly handle ethtool private flags. A
local user could use this for denial of service or possibly have
other impact.
CVE-2017-18224
Alex Chen reported that the OCFS2 filesystem omits the use of a
semaphore and consequently has a race condition for access to the
extent tree during read operations in DIRECT mode. A local user
could use this for denial of service.
CVE-2017-18241
Yunlei He reported that the f2fs implementation does not properly
initialise its state if the "noflush_merge" mount option is used.
A local user with access to a filesystem mounted with this option
could use this to cause a denial of service.
CVE-2017-18257
It was reported that the f2fs implementation is prone to an infinite
loop caused by an integer overflow in the __get_data_block()
function. A local user can use this for denial of service via
crafted use of the open and fallocate system calls with an
FS_IOC_FIEMAP ioctl.
CVE-2018-1065
The syzkaller tool found a NULL pointer dereference flaw in the
netfilter subsystem when handling certain malformed iptables
rulesets. A local user with the CAP_NET_RAW or CAP_NET_ADMIN
capability (in any user namespace) could use this to cause a denial
of service. Debian disables unprivileged user namespaces by default.
CVE-2018-1066
Dan Aloni reported to Red Hat that the CIFS client implementation
would dereference a null pointer if the server sent an invalid
response during NTLMSSP setup negotiation. This could be used
by a malicious server for denial of service.
CVE-2018-1068
The syzkaller tool found that the 32-bit compatibility layer of
ebtables did not sufficiently validate offset values. On a 64-bit
kernel, a local user with the CAP_NET_ADMIN capability (in any user
namespace) could use this to overwrite kernel memory, possibly
leading to privilege escalation. Debian disables unprivileged user
namespaces by default.
CVE-2018-1092
Wen Xu reported that a crafted ext4 filesystem image would
trigger a null dereference when mounted. A local user able
to mount arbitrary filesystems could use this for denial of
service.
CVE-2018-1093
Wen Xu reported that a crafted ext4 filesystem image could trigger
an out-of-bounds read in the ext4_valid_block_bitmap() function. A
local user able to mount arbitrary filesystems could use this for
denial of service.
CVE-2018-1108
Jann Horn reported that crng_ready() does not properly handle the
crng_init variable states and the RNG could be treated as
cryptographically safe too early after system boot.
CVE-2018-5803
Alexey Kodanev reported that the SCTP protocol did not range-check
the length of chunks to be created. A local or remote user could
use this to cause a denial of service.
CVE-2018-7480
Hou Tao discovered a double-free flaw in the blkcg_init_queue()
function in block/blk-cgroup.c. A local user could use this to cause
a denial of service or have other impact.
CVE-2018-7566
Fan LongFei reported a race condition in the ALSA (sound)
sequencer core, between write and ioctl operations. This could
lead to an out-of-bounds access or use-after-free. A local user
with access to a sequencer device could use this for denial of
service or possibly for privilege escalation.
CVE-2018-7740
Nic Losby reported that the hugetlbfs filesystem's mmap operation
did not properly range-check the file offset. A local user with
access to files on a hugetlbfs filesystem could use this to cause
a denial of service.
CVE-2018-7757
Jason Yan reported a memory leak in the SAS (Serial-Attached
SCSI) subsystem. A local user on a system with SAS devices
could use this to cause a denial of service.
CVE-2018-7995
Seunghun Han reported a race condition in the x86 MCE
(Machine Check Exception) driver. This is unlikely to have
any security impact.
CVE-2018-8087
A memory leak flaw was found in the hwsim_new_radio_nl() function in
the simulated radio testing tool driver for mac80211, allowing a
local user to cause a denial of service.
CVE-2018-8781
Eyal Itkin reported that the udl (DisplayLink) driver's mmap
operation did not properly range-check the file offset. A local
user with access to a udl framebuffer device could exploit this to
overwrite kernel memory, leading to privilege escalation.
CVE-2018-8822
Dr Silvio Cesare of InfoSect reported that the ncpfs client
implementation did not validate reply lengths from the server. An
ncpfs server could use this to cause a denial of service or
remote code execution in the client.
CVE-2018-10323
Wen Xu reported a NULL pointer dereference flaw in the
xfs_bmapi_write() function triggered when mounting and operating a
crafted xfs filesystem image. A local user able to mount arbitrary
filesystems could use this for denial of service.
CVE-2018-1000199
Andy Lutomirski discovered that the ptrace subsystem did not
sufficiently validate hardware breakpoint settings. Local users
can use this to cause a denial of service, or possibly for
privilege escalation, on x86 (amd64 and i386) and possibly other
architectures.
For the stable distribution (stretch), these problems have been fixed in version 4.9.88-1.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlron7dfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Se0xAAmR31jrqeEkJhgh7qvKplrko9N27l7FCCrrqsR0cBjKtIpwBkIdm6UxP2 8HBxqK5oy3sUP/ViHBtTUqFlRbLq4fC2DsuJGGqtBk46yML4QOEV2CXA1gyhfSzG ux5Z5nNkLDbzD7jPazbTwMusbQrDItojj6K5aoDVoRjjOpRHRViHv81kRU3KJytX 62f/vnEjxX0xkSOqLKXcUNDczLjcP2VxuKFb3si6w7YyCXq6XYhvoDch92QLJZfD qtDUCKs1sEgWLzhktcYyhck3NGujSfLZuSLGnZowqGqaAvx/lq0sTOliKuPpnG+I HztPR0iYQCuzsDgHbLlwGyuUnf446VRG+u/AP69qk0HqyWwCXqsTJ0rwMX04fXtR 7dR8Y1jbbXaH0+ai9V6c3zdz4UKH5rZOkpIIYSjCxVHUpE2cU4lFXYiWL/qJRBGV 150TtSgyAPBBBJa6cWgApXrHgriGEkZNscH2nmJfg2OBnDwnLJ4CvwNfij7daR8n RlGOlvgKYCI1Ob54kKqvvxQhDrhTiBhti8T64wd2MzsrKLIRdlyTpSrsqK8VIJyg ux1Y01sgA3JqS2XKL52ZTgCJhGkoX68+/se73P+jeRBP/tbNcXB2t2cE6gxIkiTX eZEUmnS5IeoEcr7cYKm3M9GZvBBrVeTaFra3vSgeGDUr0XL2Yu4= =uZGQ -----END PGP SIGNATURE----- . 7) - noarch
- Description:
The linux-firmware packages contain all of the firmware files that are required by various devices to operate. (CVE-2017-5715)
Note: This is the microcode counterpart of the CVE-2017-5715 kernel mitigation. Summary:
An update for rhev-hypervisor7 is now available for RHEV 3.X Hypervisor and Agents for Red Hat Enterprise Linux 6 and RHEV 3.X Hypervisor and Agents for Red Hat Enterprise Linux 7 ELS.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
RHEL 7-based RHEV-H ELS - noarch RHEV Hypervisor for RHEL-6 ELS - noarch
- Description:
The rhev-hypervisor7 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent.
Security Fix(es):
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.
Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.
Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)
Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)
Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.
Red Hat would like to thank Google Project Zero for reporting these issues.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1519778 - CVE-2017-5753 hw: cpu: speculative execution bounds-check bypass 1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection 1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling
- Package List:
RHEV Hypervisor for RHEL-6 ELS:
Source: rhev-hypervisor7-7.3-20180102.1.el6ev.src.rpm
noarch: rhev-hypervisor7-7.3-20180102.1.el6ev.noarch.rpm
RHEL 7-based RHEV-H ELS:
Source: rhev-hypervisor7-7.3-20180102.1.el7ev.src.rpm
noarch: rhev-hypervisor7-7.3-20180102.1.el7ev.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/speculativeexecution https://access.redhat.com/solutions/3307851 https://access.redhat.com/security/cve/CVE-2017-5753 https://access.redhat.com/security/cve/CVE-2017-5715 https://access.redhat.com/security/cve/CVE-2017-5754
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFaT54tXlSAg2UNWIIRAtmzAKCwalCzxETPR1hjx8qr6otIzzp23ACgnSyn faS+MjiDEGEcbe5k+tWw9I8= =V9iL -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . By now, we're sure most everyone have heard of the Meltdown and Spectre attacks. If not, head over to https://meltdownattack.com/ and get an overview. https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
The FreeBSD Security Team was notified of the issue in late December and received a briefing under NDA with the original embargo date of January 9th. Since we received relatively late notice of the issue, our ability to provide fixes is delayed.
Meltdown (CVE-2017-5754) ~~~~~~~~~~~~~~~~~~~~~~~~ In terms of priority, the first step is to mitigate against the Meltdown attack (CVE-2017-5754, cited as variant 3 by Project Zero). Work for this is ongoing, but due to the relatively large changes needed, this is going to take a little while. We are currently targeting patches for amd64 being dev complete this week with testing probably running into next week. From there, we hope to give it a short bake time before pushing it into the 11.1-RELEASE branch. Additional work will be required to bring the mitigation to 10.3-RELEASE and 10.4-RELEASE.
The code will be selectable via a tunable which will automatically turn on for modern Intel processors and off for AMD processors (since they are reportedly not vulnerable). Since the fix for Meltdown does incur a performance hit for any transition between user space and kernel space, this could be rather impactful depending on the workload. As such, the tunable can also be overridden by the end-user if they are willing to accept the risk.
Initial work can be tracked at https://reviews.freebsd.org/D13797. Please note this is a work in progress and some stuff is likely to be broken.
Spectre (CVE-2017-5753 and CVE-2017-5715) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ When it comes to the Spectre vulnerabilities, it is much harder to sort these out. Variant 1 (CVE-2017-5753) is going to require some static analysis to determine vulnerable use cases that will require barriers to stop speculation from disclosing information it shouldn't. While we haven't done the analysis to determine where we are vulnerable, the number of cases here are supposed to be pretty small. Apparently there have been some Coverity rules developed to help look for these, but we are still evaluating what can be done here.
The other half of Spectre, variant 2 (CVE-2017-5715) is a bit trickier as it affects both normal processes and bhyve. There is a proposed patch for LLVM (https://reviews.llvm.org/D41723) that introduces a concept called 'retpoline' which mitigates this issue. We are likely to pull this into HEAD and 11-STABLE once it hits the LLVM tree. Unfortunately, the currently supported FreeBSD releases are using older versions of LLVM for which we are not sure the LLVM project will produce patches. We will be looking at the feasibility to backport these patches to these earlier versions.
Best regards, Gordon Tetlow with security-officer hat on . ========================================================================== Ubuntu Security Notice USN-3540-2 January 23, 2018
linux-lts-xenial, linux-aws vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were addressed in the Linux kernel.
Software Description: - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty
Details:
USN-3540-1 addressed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. This update provides mitigations for the i386 (CVE-2017-5753 only), amd64, ppc64el, and s390x architectures. (CVE-2017-5715, CVE-2017-5753)
USN-3522-2 mitigated CVE-2017-5754 (Meltdown) for the amd64 architecture in the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. This update provides the corresponding mitigations for the ppc64el architecture. This flaw is known as Meltdown. (CVE-2017-5754)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: linux-image-4.4.0-1011-aws 4.4.0-1011.11 linux-image-4.4.0-111-generic 4.4.0-111.134~14.04.1 linux-image-4.4.0-111-lowlatency 4.4.0-111.134~14.04.1 linux-image-4.4.0-111-powerpc-e500mc 4.4.0-111.134~14.04.1 linux-image-4.4.0-111-powerpc-smp 4.4.0-111.134~14.04.1 linux-image-4.4.0-111-powerpc64-emb 4.4.0-111.134~14.04.1 linux-image-4.4.0-111-powerpc64-smp 4.4.0-111.134~14.04.1 linux-image-aws 4.4.0.1011.11 linux-image-generic-lts-xenial 4.4.0.111.95 linux-image-lowlatency-lts-xenial 4.4.0.111.95 linux-image-powerpc-e500mc-lts-xenial 4.4.0.111.95 linux-image-powerpc-smp-lts-xenial 4.4.0.111.95 linux-image-powerpc64-emb-lts-xenial 4.4.0.111.95 linux-image-powerpc64-smp-lts-xenial 4.4.0.111.95
Please note that fully mitigating CVE-2017-5715 (Spectre Variant 2) requires corresponding processor microcode/firmware updates or, in virtual environments, hypervisor updates. On i386 and amd64 architectures, the IBRS and IBPB features are required to enable the kernel mitigations. Ubuntu users with a processor from a different vendor should contact the vendor to identify necessary firmware updates. Ubuntu will provide corresponding QEMU updates in the future for users of self-hosted virtual environments in coordination with upstream QEMU. Ubuntu users in cloud environments should contact the cloud provider to confirm that the hypervisor has been updated to expose the new CPU features to virtual machines. 7) - x86_64
- The qemu-kvm package provides the user-space component for running virtual machines that use KVM. Once all virtual machines have shut down, start them again for this update to take effect.
Bug Fix(es):
-
Hot-unplugging Virtual Function I/O (VFIO) devices previously failed when performed after hot-unplugging a vhost network device. This update fixes the underlying code, and the VFIO device is unplugged correctly in the described circumstances. (BZ#1498146)
-
This specific attack has been named Meltdown and is addressed in the Linux kernel on the powerpc/ppc64el architectures by flushing the L1 data cache on exit from kernel mode to user mode (or from hypervisor to kernel).
This works on Power7, Power8 and Power9 processors. Memory protections ensuring user-provided buffers always point to userland memory were disabled, allowing .
CVE-2018-5750
An information leak has been found in the Linux kernel. The
acpi_smbus_hc_add() prints a kernel address in the kernel log at every
boot, which could be used by an attacker on the system to defeat kernel
ASLR.
Additionnaly to those vulnerability, some mitigations for CVE-2017-5753 are included in this release.
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2018-01-23 Last Updated: 2018-01-22
Potential Security Impact: Local: Disclosure of Information, Elevation of Privilege
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY On January 3 2018, side-channel security vulnerabilities involving speculative execution were publicly disclosed. These vulnerabilities may impact the listed HPE products, potentially leading to information disclosure and elevation of privilege. Mitigation and resolution of these vulnerabilities may call for both an operating system update, provided by the OS vendor, and a system ROM update from HPE.
Note:
- This issue takes advantage of techniques commonly used in many modern processor architectures.
-
For further information, microprocessor vendors have provided security advisories:
References:
- CVE-2017-5715 - aka Spectre, branch target injection
- CVE-2017-5753 - aka Spectre, bounds check bypass
- CVE-2017-5754 - aka Meltdown, rogue data cache load, memory access permission check performed after kernel memory read
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HPE ProLiant DL380 Gen10 Server - To be delivered
- HPE ProLiant DL180 Gen10 Server - To be delivered
- HPE ProLiant DL160 Gen10 Server - To be delivered
- HPE ProLiant DL360 Gen10 Server - To be delivered
- HPE ProLiant ML110 Gen10 Server - To be delivered
- HPE ProLiant DL580 Gen10 Server - To be delivered
- HPE ProLiant DL560 Gen10 Server - To be delivered
- HPE ProLiant DL120 Gen10 Server - To be delivered
- HPE ProLiant ML350 Gen10 Server - To be delivered
- HPE ProLiant XL450 Gen10 Server - To be delivered
- HPE Synergy 660 Gen10 Compute Module - To be delivered
- HPE ProLiant DL385 Gen10 Server - prior to v1.04
- HPE ProLiant XL170r Gen10 Server - To be delivered
- HPE ProLiant BL460c Gen10 Server Blade - To be delivered
- HPE ProLiant XL190r Gen10 Server - To be delivered
- HPE ProLiant XL230k Gen10 Server - To be delivered
- HPE Synergy 480 Gen10 Compute Module - To be delivered
- HPE ProLiant XL730f Gen9 Server - To be delivered
- HPE ProLiant XL230a Gen9 Server - To be delivered
- HPE ProLiant XL740f Gen9 Server - To be delivered
- HPE ProLiant XL750f Gen9 Server - To be delivered
- HPE ProLiant XL170r Gen9 Server - To be delivered
- HP ProLiant DL60 Gen9 Server - To be delivered
- HP ProLiant DL160 Gen9 Server - To be delivered
- HPE ProLiant DL360 Gen9 Server - To be delivered
- HP ProLiant DL380 Gen9 Server - To be delivered
- HPE ProLiant XL450 Gen9 Server - To be delivered
- HPE Apollo 4200 Gen9 Server - To be delivered
- HP ProLiant BL460c Gen9 Server Blade - To be delivered
- HP ProLiant ML110 Gen9 Server - To be delivered
- HP ProLiant ML150 Gen9 Server - To be delivered
- HPE ProLiant ML350 Gen9 Server - To be delivered
- HP ProLiant DL120 Gen9 Server - To be delivered
- HPE ProLiant DL560 Gen9 Server - To be delivered
- HP ProLiant BL660c Gen9 Server - To be delivered
- HPE ProLiant ML30 Gen9 Server - To be delivered
- HPE ProLiant XL170r Gen10 Server - To be delivered
- HPE ProLiant DL20 Gen9 Server - To be delivered
- HPE Synergy 660 Gen9 Compute Module - To be delivered
- HPE Synergy 480 Gen9 Compute Module - To be delivered
- HPE ProLiant XL250a Gen9 Server - To be delivered
- HPE ProLiant XL190r Gen9 Server - To be delivered
- HP ProLiant DL80 Gen9 Server - To be delivered
- HPE ProLiant DL180 Gen9 Server - To be delivered
- HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure-to-order Server - To be delivered
- HPE ProLiant WS460c Gen9 Workstation - To be delivered
- HPE ProLiant XL260a Gen9 Server - To be delivered
- HPE Synergy 620 Gen9 Compute Module - To be delivered
- HPE ProLiant DL580 Gen9 Server - To be delivered
- HP ProLiant XL220a Gen8 v2 Server - To be delivered
- HPE Synergy 680 Gen9 Compute Module - To be delivered
- HPE ProLiant m510 Server Cartridge - To be delivered
- HPE ProLiant m710p Server Cartridge - To be delivered
- HPE ProLiant m710x Server Cartridge - To be delivered
- HP ProLiant m710 Server Cartridge - To be delivered
- HP ProLiant DL980 G7 Server - To be delivered
- HPE Synergy Composer - To be delivered
- HPE ProLiant Thin Micro TM200 Server - To be delivered
- HPE ProLiant ML10 v2 Server - To be delivered
- HPE ProLiant m350 Server Cartridge - To be delivered
- HPE ProLiant m300 Server Cartridge - To be delivered
- HPE ProLiant MicroServer Gen8 - To be delivered
- HPE ProLiant ML310e Gen8 v2 Server - To be delivered
- HPE Superdome Flex Server - To be delivered
- HP 3PAR StoreServ File Controller - To be delivered - v3 impacted
- HPE StoreVirtual 3000 File Controller - To be delivered
- HPE StoreEasy 1450 Storage - To be delivered
- HPE StoreEasy 1550 Storage - To be delivered
- HPE StoreEasy 1650 Storage - To be delivered
- HPE StoreEasy 3850 Gateway Storage - To be delivered
- HPE StoreEasy 1850 Storage - To be delivered
- HP ConvergedSystem 700 - To be delivered
- HPE Converged Architecture 700 - To be delivered
- HP ProLiant DL580 Gen8 Server - To be delivered
- HPE Cloudline CL2100 Gen10 Server - To be delivered
- HPE Cloudline CL2200 Gen10 Server - To be delivered
- HPE Cloudline CL3150 G4 Server - To be delivered
- HPE Cloudline CL5200 G3 Server - To be delivered
- HPE Cloudline CL3100 G3 Server - To be delivered
- HPE Cloudline CL2100 G3 807S 8 SFF Configure-to-order Server - To be delivered
- HPE Cloudline CL2100 G3 407S 4 LFF Configure-to-order Server - To be delivered
- HPE Cloudline CL2100 G3 806R 8SFF Configure-to-order Server - To be delivered
- HPE Cloudline CL2200 G3 1211R 12 LFF Configure-to-order Server - To be delivered
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2017-5715
8.2 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
6.8 (AV:A/AC:L/Au:N/C:C/I:P/A:N)
CVE-2017-5753
5.0 CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L
5.4 (AV:A/AC:M/Au:N/C:P/I:P/A:P)
CVE-2017-5754
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
On January 11, Intel announced issues with an increased frequency of reboots when using the microcodes they released to address Variant 2 of the Spectre Vulnerability for numerous processors including Broadwell, Haswell, Skylake, Kaby Lake, Ivybridge, and Sandybridge processors. Intel has now identified the root cause of these issues and determined that these microcodes may introduce reboots and other unpredictable system behavior. Due to the severity of the potential issues that may occur when using these microcodes, Intel is now recommending that customers discontinue their use. Additional information is available from Intels Security Exploit Newsroom here: https://newsroom.intel.com/press-kits/security-exploits-intel-products/ . HPE is in alignment with Intel in our recommendation that customers discontinue use of System ROMs including impacted microcodes and revert to earlier System ROM versions.
All System ROMs including impacted microcodes have been removed from the HPE Support Site. This impacts HPE ProLiant and Synergy Gen10, Gen9, and Gen8 v2 servers as well as HPE Superdome servers for which updated System ROMs had previously been made available. Intel is working on updated microcodes to address these issues, and HPE will validate updated System ROMs including these microcodes and make them available to our customers in the coming weeks.
Mitigations for Variant 1 (Spectre) and Variant 3 (Meltdown) vulnerabilities require only OS updates and are not impacted.
-
HPE has provided a customer bulletin https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00039267en_us with specific instructions to obtain the udpated sytem ROM
-
Note:
- CVE-2017-5715 (Variant 2) requires that the System ROM be updated and a vendor supplied operating system update be applied as well.
- For CVE-2017-5753, CVE-2017-5754 (Variants 1 and 3) require only updates of a vendor supplied operating system.
- HPE will continue to add additional products to the list.
HISTORY
Version:1 (rev.1) - 4 January 2018 Initial release
Version:2 (rev.2) - 5 January 2018 Added additional impacted products
Version:3 (rev.3) - 10 January 2018 Added more impacted products
Version:4 (rev.4) - 9 January 2018 Fixed product ID
Version:5 (rev.5) - 18 January 2018 Added additional impacted products
Version:6 (rev.6) - 19 January 2018 updated impacted product list
Version:7 (rev.7) - 23 January 2018 Marked impacted products with TBD for System ROM updates per Intel's guidance on microcode issues
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Summary
VMware vSphere, Workstation and Fusion updates add Hypervisor- Assisted Guest remediation for speculative execution issue.
Notes:
Hypervisor remediation can be classified into the two following categories: - Hypervisor-Specific Remediation (documented in VMSA-2018-0002) - Hypervisor-Assisted Guest Remediation (documented in this advisory)
The ESXi patches and new versions of Workstation and Fusion of this advisory include the Hypervisor-Specific Remediation documented in VMware Security Advisory VMSA-2018-0002.
More information on the types of Hypervisor remediation may be found in VMware Knowledge Base article 52245. Relevant Products
VMware vCenter Server (VC) VMware ESXi (ESXi) VMware Workstation Pro / Player (Workstation) VMware Fusion Pro / Fusion (Fusion)
- Problem Description
New speculative-execution control mechanism for Virtual Machines
Updates of vCenter Server, ESXi, Workstation and Fusion virtualize the new speculative-execution control mechanism for Virtual Machines (VMs). As a result, a patched Guest Operating System (Guest OS) can remediate the Branch Target Injection issue (CVE-2017-5715). This issue may allow for information disclosure between processes within the VM.
To remediate CVE-2017-5715 in the Guest OS the following VMware and third party requirements must be met:
VMware Requirements
-
Deploy the updated version of vCenter Server listed in the table (if vCenter Server is used).
-
Deploy the ESXi patches and/or the new versions for Workstation or Fusion listed in the table.
-
Ensure that your VMs are using Hardware Version 9 or higher. For best performance, Hardware Version 11 or higher is recommended. VMware Knowledge Base article 1010675 discusses Hardware Versions.
Third party Requirements
-
Deploy the Guest OS patches for CVE-2017-5715. These patches are to be obtained from your OS vendor.
-
Update the CPU microcode. Additional microcode is needed for your CPU to be able to expose the new MSRs that are used by the patched Guest OS. This microcode should be available from your hardware platform vendor. VMware is providing several versions of the required microcode from INTEL and AMD through ESXi patches listed in the table. See VMware Knowledge Base 52085 for more details.
Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
VMware Product Running Replace with/ Mitigation Product Version on Severity Apply patch Workaround =========== ======= ======= ======== ============= ==========
VC 6.5 Any Important 6.5 U1e * None VC 6.0 Any Important 6.0 U3d * None VC 5.5 Any Important 5.5 U3g * None
ESXi 6.5 Any Important ESXi650-201801401-BG None ESXi650-201801402-BG ** ESXi 6.0 Any Important ESXi600-201801401-BG None ESXi600-201801402-BG ** ESXi 5.5 Any Important ESXi550-201801401-BG ** None
Workstation 14.x Any Important 14.1.1 None Workstation 12.x Any Important patch planned None
Fusion 10.x OS X Important 10.1.1 None Fusion 8.x OS X Important 8.5.10 None
- The new versions of vCenter Server set restrictions on ESXi hosts joining an Enhanced vMotion Cluster, see VMware Knowledge Base article 52085 for details.
** These ESXi patches install the microcodes if present for your CPU, see VMware Knowledge Base article 52085. Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
vCenter Server 6.5 U1e Downloads and Documentation:
https://my.vmware.com/web/vmware/details?productId=614&rPId=20950&downloadG roup=VC65U1E
vCenter Server 6.0 U3d Downloads and Documentation:
https://my.vmware.com/web/vmware/details?downloadGroup=VC60U3D&productId=49 1&rPId=20946
vCenter Server 5.5 U3g Downloads and Documentation:
https://my.vmware.com/web/vmware/details?downloadGroup=VC55U3G&productId=35 3&rPId=20876
VMware ESXi 6.5 Downloads: https://my.vmware.com/group/vmware/patch Documentation: http://kb.vmware.com/kb/52198 http://kb.vmware.com/kb/52199
VMware ESXi 6.0 Downloads: https://my.vmware.com/group/vmware/patch Documentation: http://kb.vmware.com/kb/52205 http://kb.vmware.com/kb/52206
VMware ESXi 5.5 Downloads: https://my.vmware.com/group/vmware/patch Documentation: http://kb.vmware.com/kb/52127
VMware Workstation Pro, Player 14.1.1 Downloads and Documentation: https://www.vmware.com/go/downloadworkstation https://www.vmware.com/go/downloadplayer https://www.vmware.com/support/pubs/ws_pubs.html
VMware Fusion Pro / Fusion 8.5.10, 10.1.1 Downloads and Documentation: https://www.vmware.com/go/downloadfusion https://www.vmware.com/support/pubs/fusion_pubs.html
- References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
VMware Knowledge Base Article 52085 https://kb.vmware.com/s/article/52085
VMware Knowledge Base Article 1010675 https://kb.vmware.com/s/article/1010675
VMware Knowledge Base article 52245 https://kb.vmware.com/s/article/52245
- Change log
2018-01-09 VMSA-2018-0004 Initial security advisory in conjunction with the release of VMware vCenter Server 5.5 U3g, 6.0 U3d and 6.5 U1e, ESXi 5.5, 6.0, and 6.5 patches, Workstation 14.1.1, and Fusion 10.1.1 and 8.5.10 on 2018-01-09. Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org
E-mail: security@vmware.com PGP key at: https://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog https://blogs.vmware.com/security
Twitter https://twitter.com/VMwareSRC
Copyright 2018 VMware Inc. All rights reserved. 7.3) - ppc64, ppc64le, s390x, x86_64
- Description:
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201801-0826",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5287u"
},
{
"model": "xeon e5 2470 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2687w_v2"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3450"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5540"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2655le"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8880l_v3"
},
{
"model": "xeon e3 1270 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4669_v4"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4350u"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e6510"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2435m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "875k"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5503"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6148"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4980hq"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4360"
},
{
"model": "xeon e5 1660 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3850"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5687"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2617m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3770"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "ec5509"
},
{
"model": "xeon e3 1260l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2695_v3"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "670"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4422e"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2718"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1585l_v5"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3230m"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5518"
},
{
"model": "celeron j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j4005"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3317u"
},
{
"model": "xeon e3 1226 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1241 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4870"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2699_v4"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1535m_v5"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4900mq"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3612qm"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3380m"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2690_v4"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4330m"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8867l"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2687w_v3"
},
{
"model": "xeon e-1105c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4012y"
},
{
"model": "xeon e5 1650",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4670r"
},
{
"model": "xeon phi",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7250"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4722hq"
},
{
"model": "xeon e3 1501m v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core m3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6y30"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4790t"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4809_v4"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8880_v4"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6154"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3220"
},
{
"model": "xeon e5 2448l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8160t"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2312m"
},
{
"model": "xeon e3 1285l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4655_v4"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8180"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6300t"
},
{
"model": "atom x3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3405"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3350"
},
{
"model": "xeon e3 1230 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8891_v3"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5638"
},
{
"model": "celeron j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j1750"
},
{
"model": "xeon e5 2403",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6350hq"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8860"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6146"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4570r"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5550"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6140"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3350p"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5630"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6136"
},
{
"model": "vm virtualbox",
"scope": "lt",
"trust": 1.0,
"vendor": "oracle",
"version": "5.2.6"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "980"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4120u"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4670"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "w5580"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "820qm"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2640m"
},
{
"model": "xeon e3 1280 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "w3680"
},
{
"model": "core m3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7y30"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2850"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2338"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5122"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4809_v3"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4160"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4657l_v2"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4158u"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6400t"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4610m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4960hq"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5750hq"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "640um"
},
{
"model": "xeon e3 1230 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4360u"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4830_v3"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4627_v4"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l7555"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6142m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3667u"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4300y"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3160"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2367m"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3740"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4130"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6102e"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "560um"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4460s"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3687u"
},
{
"model": "xeon e3 1225 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6100u"
},
{
"model": "core m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5y10"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5618"
},
{
"model": "xeon e5 2418l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2648l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e3827"
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4114t"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4610"
},
{
"model": "xeon e5 2618l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n2806"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2350m"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3340s"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6200u"
},
{
"model": "xeon e5 2440",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "14.04"
},
{
"model": "xeon e5 2603 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon phi",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7210"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2890_v2"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x6550"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8250u"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2348m"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4690t"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4771"
},
{
"model": "xeon e3 1285 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "17.04"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6130f"
},
{
"model": "xeon e5 2618l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2640 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2618l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j1850"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6134"
},
{
"model": "xeon e3 1276 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3460"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1575m_v5"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2690"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4627_v3"
},
{
"model": "xeon e3 1240 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2620 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4702mq"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4627_v2"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2820qm"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4807"
},
{
"model": "xeon e5 2407 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4712mq"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2380p"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2115c"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2520m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "680um"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "640m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2715qe"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3227u"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2820"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "430um"
},
{
"model": "xeon e5 2430l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4860_v2"
},
{
"model": "xeon e5 1620 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n2910"
},
{
"model": "pentium j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j2900"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1585_v5"
},
{
"model": "xeon e3 1105c v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1265l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8550u"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "530"
},
{
"model": "xeon e5 2428l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4809_v2"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4160t"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "8.0"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2308"
},
{
"model": "celeron j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j3060"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6157u"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2430m"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8160"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8890_v3"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2500"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "330m"
},
{
"model": "xeon e3 12201 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x3470"
},
{
"model": "xeon e3 1230",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2680"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6138t"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5118"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "540um"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "930"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4550u"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8350k"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2850_v2"
},
{
"model": "atom x3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3235rk"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2390t"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8170"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "350m"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2538"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5520"
},
{
"model": "xeon e5 2418l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8176f"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7700t"
},
{
"model": "solidfire",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "390m"
},
{
"model": "xeon e3 1290 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "330um"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n2940"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2649m"
},
{
"model": "pentium n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n4200"
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4110"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2697_v2"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5504"
},
{
"model": "xeon e3 1245 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5508"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8870_v2"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3820qm"
},
{
"model": "xeon e3 1280 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1281 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2100"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z2560"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8156"
},
{
"model": "xeon e3 1268l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j3455"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2960xm"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4850_v4"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4020y"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7820eq"
},
{
"model": "core m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5y51"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5520"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5300u"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2687w"
},
{
"model": "xeon e5 1660",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 1680 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5506"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5649"
},
{
"model": "xeon e3 1275 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4150t"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6130"
},
{
"model": "xeon e5 2420",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4820_v2"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4790"
},
{
"model": "xeon e3 1230 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "660"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6402p"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4860"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4603_v2"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8830"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3330"
},
{
"model": "xeon e5 1428l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3470s"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2720qm"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "ec5539"
},
{
"model": "xeon e5 1660 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4800mq"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3540m"
},
{
"model": "xeon e3 1505m v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j1800"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4603"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5675r"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4650"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2350"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2758"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3338"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3225"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2860"
},
{
"model": "communications diameter signaling router",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "8.3"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4860hq"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5775c"
},
{
"model": "pentium j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j3710"
},
{
"model": "pentium n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3520"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3439y"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3570k"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7y75"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4278u"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n2820"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3537u"
},
{
"model": "core m5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6y57"
},
{
"model": "xeon e3 1271 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1286 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4820_v4"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8700"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4648_v3"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5675c"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "480m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "740qm"
},
{
"model": "core m3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7y32"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4950hq"
},
{
"model": "xeon e3 1286l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2657m"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8400"
},
{
"model": "xeon phi",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7290"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3530"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "610e"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5700eq"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2620m"
},
{
"model": "xeon bronze 3104",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1230 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1280 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5119t"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6148f"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3150"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3110m"
},
{
"model": "xeon e3 1270 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "620le"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "950"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2658a_v3"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2328m"
},
{
"model": "xeon e5 2630",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1225 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4620_v4"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "560"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "661"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "380um"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "650"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5120"
},
{
"model": "xeon e3 1240l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4130t"
},
{
"model": "xeon e5 2630 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3120m"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3000"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3520m"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5675"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4640_v3"
},
{
"model": "xeon e5 1428l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2608l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "cortex-a",
"scope": "eq",
"trust": 1.0,
"vendor": "arm",
"version": "15"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5775r"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4640"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3308"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2697_v3"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5640"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4150"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7820hk"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1565l_v5"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8857_v2"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6440hq"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2670_v2"
},
{
"model": "xeon e5 2620 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2400"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l3426"
},
{
"model": "xeon e3 12201",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4308u"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8168"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3758"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4330"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "760"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2650l_v4"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4830_v2"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4578u"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8870_v4"
},
{
"model": "xeon e3 1505l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "965"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "940"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4100e"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2540m"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4210u"
},
{
"model": "xeon e5 2418l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5120t"
},
{
"model": "cortex-a",
"scope": "eq",
"trust": 1.0,
"vendor": "arm",
"version": "73"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4870_v2"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4702ec"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n2807"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2730"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3630qm"
},
{
"model": "xeon e5 2640 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4770t"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3958"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "9.0"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4765t"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3508"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8890_v2"
},
{
"model": "xeon e5 2608l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "550"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3220t"
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4109t"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3010"
},
{
"model": "xeon e3 1285l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4820_v3"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4690k"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2105"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4510u"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2660_v4"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4770k"
},
{
"model": "xeon e3 1268l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n2815"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n2808"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3217ue"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3250t"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8100"
},
{
"model": "xeon e5 1650 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e3845"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4660_v4"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6167u"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2515e"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5157u"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6138"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4610y"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "7.0"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3337u"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "580m"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "750"
},
{
"model": "xeon e5 1428l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3240t"
},
{
"model": "xeon e5 2650l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4910mq"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3740qm"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4870hq"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3785"
},
{
"model": "xeon e5 2630 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4025u"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4430s"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2635qm"
},
{
"model": "xeon e3 1285 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2630l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3229y"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4102e"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5667"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2690_v3"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4820"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3770t"
},
{
"model": "xeon e5 2628l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8867_v4"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4850"
},
{
"model": "xeon e3 1258l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4302y"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "330e"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3339y"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4710hq"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8700k"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5645"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8650u"
},
{
"model": "xeon e3 1220 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4116t"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3240"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2557m"
},
{
"model": "core m7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6y75"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "380m"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2450m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "620lm"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5506"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8867_v3"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6267u"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e7540"
},
{
"model": "xeon e3 1260l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3840qm"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5250u"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2695_v2"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "12.04"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2357m"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4670k"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z2760"
},
{
"model": "xeon e3 1225 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n2930"
},
{
"model": "atom e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e3825"
},
{
"model": "xeon e3 1245 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2609 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2643",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2695_v4"
},
{
"model": "xeon e5 2448l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e3805"
},
{
"model": "xeon e5 2609 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3580"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6287u"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8860_v3"
},
{
"model": "xeon e5 1660 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e6540"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1535m_v6"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5020u"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3955"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "870"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "970"
},
{
"model": "xeon e5 2403 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2643 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4330te"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6500te"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4110e"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2667_v2"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5647"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "920xm"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3120me"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5015u"
},
{
"model": "xeon e5 2407",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6500"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8160m"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2537m"
},
{
"model": "xeon e3 1501l v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8893_v3"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4220y"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4650l"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x7560"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6100te"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "ec5549"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4650u"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7700hq"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4300m"
},
{
"model": "atom e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e3826"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6100e"
},
{
"model": "xeon e5 2470",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4700ec"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n2810"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5850eq"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5850hq"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3770"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3735g"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "540m"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4690"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3770k"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6500t"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2320"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2530"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3470"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6400"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2600s"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3480"
},
{
"model": "xeon e5 2650 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5y71"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3245"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3570"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4410e"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6685r"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8880l_v2"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4170"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5560"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5650"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "520e"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4667_v3"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3450"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5575r"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2550k"
},
{
"model": "xeon e5 2430",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3736g"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2803"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4600m"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4607_v2"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2100t"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3795"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4700mq"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4202y"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7660u"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5005u"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2660_v2"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8880_v2"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3612qe"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5672"
},
{
"model": "xeon e5 2430 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4250u"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7920hq"
},
{
"model": "xeon e3 1245",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3437u"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2658_v4"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4720hq"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2658_v2"
},
{
"model": "xeon e5 2650l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2310m"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2518"
},
{
"model": "celeron j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j1900"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2310"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2699a_v4"
},
{
"model": "xeon e5 2603 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2628l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1278l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8160f"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4702hq"
},
{
"model": "xeon e5 2620",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6144"
},
{
"model": "atom x3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3200rk"
},
{
"model": "xeon e3 1240 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core m5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6y54"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3210"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4350t"
},
{
"model": "xeon phi",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7210f"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3130m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3615qm"
},
{
"model": "core m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5y10a"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5570"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "870s"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2405s"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3550s"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5660"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4640_v4"
},
{
"model": "xeon e5 2643 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4010y"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8153"
},
{
"model": "atom x3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3130"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4830_v4"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3689y"
},
{
"model": "xeon e3 1270",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2680_v3"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3708"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "840qm"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4610_v4"
},
{
"model": "xeon e3 1245 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2408l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2358"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2710qe"
},
{
"model": "pentium n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3540"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8891_v4"
},
{
"model": "cortex-a",
"scope": "eq",
"trust": 1.0,
"vendor": "arm",
"version": "57"
},
{
"model": "xeon e5 2428l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2650l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6100t"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "560m"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2375m"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4200h"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x7542"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4620"
},
{
"model": "xeon e5 2640",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4810mq"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n2920"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4830"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4210h"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4360t"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4340"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "370m"
},
{
"model": "xeon e5 1680 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4112e"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3060"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2697a_v4"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6152"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "680"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5350h"
},
{
"model": "xeon e3 1220l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4607"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3745"
},
{
"model": "xeon e5 2428l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5640"
},
{
"model": "xeon e5 2637 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2677m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5500u"
},
{
"model": "xeon e3 1240 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4617"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4667_v4"
},
{
"model": "xeon e3 1275 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1225",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6600k"
},
{
"model": "xeon e3 1275l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "975"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4000m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "920"
},
{
"model": "xeon e5 2637 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8893_v2"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x3450"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3610qm"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2680_v2"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4402e"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6600"
},
{
"model": "xeon e5 2650 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8164"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5530"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2697_v4"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3808"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8158"
},
{
"model": "atom x7-e3950",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4460t"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4260u"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4650_v2"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6360u"
},
{
"model": "xeon e3 1220 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2683_v3"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3538"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2760qm"
},
{
"model": "pentium n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3710"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2300"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3775"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2508"
},
{
"model": "atom x3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3445"
},
{
"model": "xeon phi",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7235"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "w3670"
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4114"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4690s"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4710mq"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3735e"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8170m"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5680"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z2460"
},
{
"model": "xeon e5 2620 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8860_v4"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3610me"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6130t"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3475s"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8600k"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3775d"
},
{
"model": "xeon e3 1125c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4005u"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2610ue"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7820hq"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3517ue"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2870_v2"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4330t"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4210y"
},
{
"model": "xeon e5 2648l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1275",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2700k"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4600u"
},
{
"model": "xeon e5 1650 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2450 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4310u"
},
{
"model": "cortex-a",
"scope": "eq",
"trust": 1.0,
"vendor": "arm",
"version": "75"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6138f"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "860s"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3115c"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "660lm"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4785t"
},
{
"model": "xeon e3 1230l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8870"
},
{
"model": "xeon e3 1270 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4288u"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2637m"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3570"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2316"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2125"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3330s"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4590t"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6600t"
},
{
"model": "core m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5y70"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5609"
},
{
"model": "xeon e5 2609",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2630 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2630l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1558l_v5"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2629m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5600u"
},
{
"model": "xeon bronze 3106",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "980x"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4760hq"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3770d"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "460m"
},
{
"model": "celeron j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j3355"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6126t"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3590"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4350"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5700hq"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2600k"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2516"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4210m"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5677"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4110m"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8890_v4"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5502"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5620"
},
{
"model": "xeon e5 2440 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6128"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3210m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4770r"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8176"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3858"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4650_v4"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n4100"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6300hq"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5606"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z2580"
},
{
"model": "xeon e5 2623 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4500u"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4770te"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3615qe"
},
{
"model": "xeon e3 1290",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5y31"
},
{
"model": "cortex-a",
"scope": "eq",
"trust": 1.0,
"vendor": "arm",
"version": "9"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7560u"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5950hq"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2698_v3"
},
{
"model": "pentium j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j4205"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "640lm"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2880_v2"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2667_v4"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4200u"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "w5590"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4170t"
},
{
"model": "xeon e5 2450l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3360m"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4310m"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3558"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "450m"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6300"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4700hq"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4628l_v4"
},
{
"model": "xeon e5 1620 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2870"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8894_v4"
},
{
"model": "vm virtualbox",
"scope": "lt",
"trust": 1.0,
"vendor": "oracle",
"version": "5.1.32"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2130"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1545m_v5"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4610_v2"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6140m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2630qm"
},
{
"model": "xeon e3 1240 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom x5-e3930",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2637 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2102"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2750"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4590s"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2510e"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6320"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2860qm"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4660_v3"
},
{
"model": "atom x3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3205rk"
},
{
"model": "simatic winac rtx \\",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": "2010"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7700k"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e7520"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n4000"
},
{
"model": "core m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5y10c"
},
{
"model": "pentium n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3530"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4430"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "960"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4030y"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2675qm"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7700"
},
{
"model": "xeon e3 1285 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2600"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2660_v3"
},
{
"model": "xeon e5 2630l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8850"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4890_v2"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5115"
},
{
"model": "xeon e3 1231 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3450s"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2467m"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6100"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2450p"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5630"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3570s"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3736f"
},
{
"model": "xeon e5 2603",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7600u"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "lc5518"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3470t"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3517u"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8870_v3"
},
{
"model": "communications diameter signaling router",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "8.1"
},
{
"model": "xeon phi",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7290f"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6006u"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5350u"
},
{
"model": "xeon e5 2650",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2670"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4370"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2120t"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2683_v4"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4850_v2"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4712hq"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5650u"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5257u"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6142"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4100u"
},
{
"model": "xeon phi",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7230"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2670_v3"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n2830"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4790k"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3250"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "660ue"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6585r"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "620um"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "18.04"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8350u"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "990x"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4770s"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2665"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "750s"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8176m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5550u"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6132"
},
{
"model": "xeon e3 1280",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2450l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4340te"
},
{
"model": "celeron j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j4105"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4590"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3555le"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2667_v3"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x3440"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n2840"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6126"
},
{
"model": "xeon e3 1125c v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1225 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1275 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "communications diameter signaling router",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "8.0.0"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2330e"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4669_v3"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l3406"
},
{
"model": "xeon e3 1505l v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3950"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "430m"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z2520"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x3430"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1578l_v5"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4200m"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4570s"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2699r_v4"
},
{
"model": "xeon e5 2628l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5603"
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4108"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "540"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4670s"
},
{
"model": "xeon e5 1630 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4116"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3750"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2500k"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5530"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3635qm"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2658"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4670t"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3560"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3050"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "720qm"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3340"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3340m"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6100h"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2738"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6442eq"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4790s"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2377m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "880"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7500u"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "860"
},
{
"model": "pentium n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3510"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2310e"
},
{
"model": "atom e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e3815"
},
{
"model": "xeon e5 2648l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z2420"
},
{
"model": "atom x3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3295rk"
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n2805"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "470um"
},
{
"model": "xeon e5 1620",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2640 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2410m"
},
{
"model": "cortex-a",
"scope": "eq",
"trust": 1.0,
"vendor": "arm",
"version": "17"
},
{
"model": "xeon e3 1235l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "520um"
},
{
"model": "xeon e5 2643 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "17.10"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5670"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8891_v2"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4440"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3720qm"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e7530"
},
{
"model": "xeon e3 1240",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1220 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2120"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4400e"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3770s"
},
{
"model": "atom x5-e3940",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4030u"
},
{
"model": "xeon e5 2648l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4340m"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2687w_v4"
},
{
"model": "xeon e5 1650 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1235",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2430l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2400s"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4880_v2"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6300u"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5200u"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8837"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5557u"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4750hq"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6098p"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2690_v2"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4624l_v2"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "520m"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3320m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4558u"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3427u"
},
{
"model": "pentium j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j2850"
},
{
"model": "xeon e3 1270 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j3160"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6260u"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2660"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5690"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2698_v4"
},
{
"model": "xeon e5 2450",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2438l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4258u"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2330m"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4010u"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4570t"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8850_v2"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4850_v3"
},
{
"model": "xeon phi",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7230f"
},
{
"model": "xeon e5 2630l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4460"
},
{
"model": "xeon e3 1265l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon phi",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7295"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x3460"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7567u"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4640_v2"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "16.04"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x3480"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "w3690"
},
{
"model": "atom x3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3265rk"
},
{
"model": "xeon e3 1280 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5607"
},
{
"model": "xeon e5 2623 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2680_v4"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "940xm"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4650_v3"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2340ue"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6134m"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5010u"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4620_v2"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4300u"
},
{
"model": "xeon e3 1220",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4100m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4770"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6126f"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3550"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3610qe"
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4112"
},
{
"model": "xeon e3 1265l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z2480"
},
{
"model": "communications diameter signaling router",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "8.2"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3735f"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2500s"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2667"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3570t"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2670qm"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2699_v3"
},
{
"model": "hci compute node",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "xeon e3 1240l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2550"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5507"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3740d"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4620_v3"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "660um"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4850hq"
},
{
"model": "xeon e5 2603 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2920xm"
},
{
"model": "xeon e5 2609 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1245 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3830"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3735d"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3632qm"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2658_v3"
},
{
"model": "xeon phi",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7285"
},
{
"model": "hci management node",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "xeon e5 2420 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4570te"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6440eq"
},
{
"model": "xeon e5 1630 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8880_v3"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2500t"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1515m_v5"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6150"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "lc5528"
},
{
"model": "xeon e3 1220 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2650 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 1620 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "655k"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4370t"
},
{
"model": "vm virtualbox",
"scope": "gte",
"trust": 1.0,
"vendor": "oracle",
"version": "5.2.0"
},
{
"model": "atom x3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3230rk"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4200y"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l7545"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4440s"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4570"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8893_v4"
},
{
"model": "cortex-a",
"scope": "eq",
"trust": 1.0,
"vendor": "arm",
"version": "72"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4700eq"
},
{
"model": "xeon",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x7550"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2558"
},
{
"model": "xeon e3 1275 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2637",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon phi",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7250f"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2830"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1505m_v6"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4610_v3"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3217u"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2365m"
},
{
"model": "pentium n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3700"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "620m"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4770hq"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2370m"
},
{
"model": "xeon e3 1246 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4402ec"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "6142f"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4655_v3"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3745d"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "620ue"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "amd",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "arm",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "apple",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "dell",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "dell emc",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "fortinet",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "hp",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "microsoft",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "qualcomm incorporated",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "suse linux",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "synology",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "ubuntu",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "vmware",
"version": null
},
{
"model": "windows sp1",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "7"
},
{
"model": "internet explorer",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "11"
},
{
"model": "windows",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "8.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.6,
"vendor": "google",
"version": "v8"
},
{
"model": "windows",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "10"
},
{
"model": "edge",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "0"
},
{
"model": "xeon cpu e5-1650",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "v3"
},
{
"model": "cortex a57",
"scope": null,
"trust": 0.6,
"vendor": "arm",
"version": null
},
{
"model": "pro a8-9600 r7",
"scope": null,
"trust": 0.6,
"vendor": "amd",
"version": null
},
{
"model": "compute cores 4c+6g",
"scope": "eq",
"trust": 0.6,
"vendor": "amd",
"version": "10"
},
{
"model": "fx -8320 eight-core processor",
"scope": null,
"trust": 0.6,
"vendor": "amd",
"version": null
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#180049"
},
{
"db": "CNVD",
"id": "CNVD-2018-00302"
},
{
"db": "NVD",
"id": "CVE-2017-5715"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_firmware:2010:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_firmware:2010:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_firmware:2010:sp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_winac_rtx_\\(f\\)_2010:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.1.32",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.2.6",
"versionStartIncluding": "5.2.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-5715"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Red Hat",
"sources": [
{
"db": "PACKETSTORM",
"id": "145665"
},
{
"db": "PACKETSTORM",
"id": "145717"
},
{
"db": "PACKETSTORM",
"id": "145650"
},
{
"db": "PACKETSTORM",
"id": "145653"
},
{
"db": "PACKETSTORM",
"id": "146002"
},
{
"db": "PACKETSTORM",
"id": "145708"
},
{
"db": "PACKETSTORM",
"id": "145671"
}
],
"trust": 0.7
},
"cve": "CVE-2017-5715",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.4,
"id": "CNVD-2018-00302",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.4,
"id": "VHN-113918",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:M/AU:N/C:C/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.1,
"impactScore": 4.0,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-5715",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2018-00302",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-113918",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-00302"
},
{
"db": "VULHUB",
"id": "VHN-113918"
},
{
"db": "NVD",
"id": "CVE-2017-5715"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. CPU hardware utilizing speculative execution may be vulnerable to cache timing side-channel analysis. Two vulnerabilities are identified, known as \"Variant 3a\" and \"Variant 4\". CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Meltdown vulnerability exists in the CPU processor core, which \\\"melts\\\" the security boundary implemented by hardware, allowing low-privileged user-level applications to \\\"cross-border\\\" access to system-level memory, causing data leakage. The following products and versions are affected: ARM Cortex-R7; Cortex-R8; Cortex-A8; Cortex-A9; Cortex-A12; Intel Xeon CPU E5-1650 v3, v2, v4 versions; Xeon E3-1265l v2, v3, v4 Version; Xeon E3-1245 v2, v3, v5, v6 versions; Xeon X7542, etc. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4188-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nMay 01, 2018 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : linux\nCVE ID : CVE-2017-5715 CVE-2017-5753 CVE-2017-17975 CVE-2017-18193\n CVE-2017-18216 CVE-2017-18218 CVE-2017-18222 CVE-2017-18224\n CVE-2017-18241 CVE-2017-18257 CVE-2018-1065 CVE-2018-1066\n CVE-2018-1068 CVE-2018-1092 CVE-2018-1093 CVE-2018-1108\n CVE-2018-5803 CVE-2018-7480 CVE-2018-7566 CVE-2018-7740\n CVE-2018-7757 CVE-2018-7995 CVE-2018-8087 CVE-2018-8781\n CVE-2018-8822 CVE-2018-10323 CVE-2018-1000199\n\nSeveral vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks. \n\nCVE-2017-5715\n\n Multiple researchers have discovered a vulnerability in various\n processors supporting speculative execution, enabling an attacker\n controlling an unprivileged process to read memory from arbitrary\n addresses, including from the kernel and all other processes\n running on the system. \n\n This specific attack has been named Spectre variant 2 (branch\n target injection) and is mitigated for the x86 architecture (amd64\n and i386) by using the \"retpoline\" compiler feature which allows\n indirect branches to be isolated from speculative execution. \n\nCVE-2017-5753\n\n Multiple researchers have discovered a vulnerability in various\n processors supporting speculative execution, enabling an attacker\n controlling an unprivileged process to read memory from arbitrary\n addresses, including from the kernel and all other processes\n running on the system. \n\n This specific attack has been named Spectre variant 1\n (bounds-check bypass) and is mitigated by identifying vulnerable\n code sections (array bounds checking followed by array access) and\n replacing the array access with the speculation-safe\n array_index_nospec() function. \n\n More use sites will be added over time. \n\nCVE-2017-17975\n\n Tuba Yavuz reported a use-after-free flaw in the USBTV007\n audio-video grabber driver. A local user could use this for denial\n of service by triggering failure of audio registration. \n\nCVE-2017-18193\n\n Yunlei He reported that the f2fs implementation does not properly\n handle extent trees, allowing a local user to cause a denial of\n service via an application with multiple threads. \n\nCVE-2017-18216\n\n Alex Chen reported that the OCFS2 filesystem failed to hold a\n necessary lock during nodemanager sysfs file operations,\n potentially leading to a null pointer dereference. A local user\n could use this for denial of service. \n\nCVE-2017-18218\n\n Jun He reported a user-after-free flaw in the Hisilicon HNS ethernet\n driver. A local user could use this for denial of service. \n\nCVE-2017-18222\n\n It was reported that the Hisilicon Network Subsystem (HNS) driver\n implementation does not properly handle ethtool private flags. A\n local user could use this for denial of service or possibly have\n other impact. \n\nCVE-2017-18224\n\n Alex Chen reported that the OCFS2 filesystem omits the use of a\n semaphore and consequently has a race condition for access to the\n extent tree during read operations in DIRECT mode. A local user\n could use this for denial of service. \n\nCVE-2017-18241\n\n Yunlei He reported that the f2fs implementation does not properly\n initialise its state if the \"noflush_merge\" mount option is used. \n A local user with access to a filesystem mounted with this option\n could use this to cause a denial of service. \n\nCVE-2017-18257\n\n It was reported that the f2fs implementation is prone to an infinite\n loop caused by an integer overflow in the __get_data_block()\n function. A local user can use this for denial of service via\n crafted use of the open and fallocate system calls with an\n FS_IOC_FIEMAP ioctl. \n\nCVE-2018-1065\n\n The syzkaller tool found a NULL pointer dereference flaw in the\n netfilter subsystem when handling certain malformed iptables\n rulesets. A local user with the CAP_NET_RAW or CAP_NET_ADMIN\n capability (in any user namespace) could use this to cause a denial\n of service. Debian disables unprivileged user namespaces by default. \n\nCVE-2018-1066\n\n Dan Aloni reported to Red Hat that the CIFS client implementation\n would dereference a null pointer if the server sent an invalid\n response during NTLMSSP setup negotiation. This could be used\n by a malicious server for denial of service. \n\nCVE-2018-1068\n\n The syzkaller tool found that the 32-bit compatibility layer of\n ebtables did not sufficiently validate offset values. On a 64-bit\n kernel, a local user with the CAP_NET_ADMIN capability (in any user\n namespace) could use this to overwrite kernel memory, possibly\n leading to privilege escalation. Debian disables unprivileged user\n namespaces by default. \n\nCVE-2018-1092\n\n Wen Xu reported that a crafted ext4 filesystem image would\n trigger a null dereference when mounted. A local user able\n to mount arbitrary filesystems could use this for denial of\n service. \n\nCVE-2018-1093\n\n Wen Xu reported that a crafted ext4 filesystem image could trigger\n an out-of-bounds read in the ext4_valid_block_bitmap() function. A\n local user able to mount arbitrary filesystems could use this for\n denial of service. \n\nCVE-2018-1108\n\n Jann Horn reported that crng_ready() does not properly handle the\n crng_init variable states and the RNG could be treated as\n cryptographically safe too early after system boot. \n\nCVE-2018-5803\n\n Alexey Kodanev reported that the SCTP protocol did not range-check\n the length of chunks to be created. A local or remote user could\n use this to cause a denial of service. \n\nCVE-2018-7480\n\n Hou Tao discovered a double-free flaw in the blkcg_init_queue()\n function in block/blk-cgroup.c. A local user could use this to cause\n a denial of service or have other impact. \n\nCVE-2018-7566\n\n Fan LongFei reported a race condition in the ALSA (sound)\n sequencer core, between write and ioctl operations. This could\n lead to an out-of-bounds access or use-after-free. A local user\n with access to a sequencer device could use this for denial of\n service or possibly for privilege escalation. \n\nCVE-2018-7740\n\n Nic Losby reported that the hugetlbfs filesystem\u0027s mmap operation\n did not properly range-check the file offset. A local user with\n access to files on a hugetlbfs filesystem could use this to cause\n a denial of service. \n\nCVE-2018-7757\n\n Jason Yan reported a memory leak in the SAS (Serial-Attached\n SCSI) subsystem. A local user on a system with SAS devices\n could use this to cause a denial of service. \n\nCVE-2018-7995\n\n Seunghun Han reported a race condition in the x86 MCE\n (Machine Check Exception) driver. This is unlikely to have\n any security impact. \n\nCVE-2018-8087\n\n A memory leak flaw was found in the hwsim_new_radio_nl() function in\n the simulated radio testing tool driver for mac80211, allowing a\n local user to cause a denial of service. \n\nCVE-2018-8781\n\n Eyal Itkin reported that the udl (DisplayLink) driver\u0027s mmap\n operation did not properly range-check the file offset. A local\n user with access to a udl framebuffer device could exploit this to\n overwrite kernel memory, leading to privilege escalation. \n\nCVE-2018-8822\n\n Dr Silvio Cesare of InfoSect reported that the ncpfs client\n implementation did not validate reply lengths from the server. An\n ncpfs server could use this to cause a denial of service or\n remote code execution in the client. \n\nCVE-2018-10323\n\n Wen Xu reported a NULL pointer dereference flaw in the\n xfs_bmapi_write() function triggered when mounting and operating a\n crafted xfs filesystem image. A local user able to mount arbitrary\n filesystems could use this for denial of service. \n\nCVE-2018-1000199\n\n Andy Lutomirski discovered that the ptrace subsystem did not\n sufficiently validate hardware breakpoint settings. Local users\n can use this to cause a denial of service, or possibly for\n privilege escalation, on x86 (amd64 and i386) and possibly other\n architectures. \n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 4.9.88-1. \n\nWe recommend that you upgrade your linux packages. \n\nFor the detailed security status of linux please refer to its security\ntracker page at:\nhttps://security-tracker.debian.org/tracker/linux\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n\niQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlron7dfFIAAAAAALgAo\naXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2\nNDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND\nz0Se0xAAmR31jrqeEkJhgh7qvKplrko9N27l7FCCrrqsR0cBjKtIpwBkIdm6UxP2\n8HBxqK5oy3sUP/ViHBtTUqFlRbLq4fC2DsuJGGqtBk46yML4QOEV2CXA1gyhfSzG\nux5Z5nNkLDbzD7jPazbTwMusbQrDItojj6K5aoDVoRjjOpRHRViHv81kRU3KJytX\n62f/vnEjxX0xkSOqLKXcUNDczLjcP2VxuKFb3si6w7YyCXq6XYhvoDch92QLJZfD\nqtDUCKs1sEgWLzhktcYyhck3NGujSfLZuSLGnZowqGqaAvx/lq0sTOliKuPpnG+I\nHztPR0iYQCuzsDgHbLlwGyuUnf446VRG+u/AP69qk0HqyWwCXqsTJ0rwMX04fXtR\n7dR8Y1jbbXaH0+ai9V6c3zdz4UKH5rZOkpIIYSjCxVHUpE2cU4lFXYiWL/qJRBGV\n150TtSgyAPBBBJa6cWgApXrHgriGEkZNscH2nmJfg2OBnDwnLJ4CvwNfij7daR8n\nRlGOlvgKYCI1Ob54kKqvvxQhDrhTiBhti8T64wd2MzsrKLIRdlyTpSrsqK8VIJyg\nux1Y01sgA3JqS2XKL52ZTgCJhGkoX68+/se73P+jeRBP/tbNcXB2t2cE6gxIkiTX\neZEUmnS5IeoEcr7cYKm3M9GZvBBrVeTaFra3vSgeGDUr0XL2Yu4=\n=uZGQ\n-----END PGP SIGNATURE-----\n. 7) - noarch\n\n3. Description:\n\nThe linux-firmware packages contain all of the firmware files that are\nrequired by various devices to operate. (CVE-2017-5715)\n\nNote: This is the microcode counterpart of the CVE-2017-5715 kernel\nmitigation. Summary:\n\nAn update for rhev-hypervisor7 is now available for RHEV 3.X Hypervisor and\nAgents for Red Hat Enterprise Linux 6 and RHEV 3.X Hypervisor and Agents\nfor Red Hat Enterprise Linux 7 ELS. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRHEL 7-based RHEV-H ELS - noarch\nRHEV Hypervisor for RHEL-6 ELS - noarch\n\n3. Description:\n\nThe rhev-hypervisor7 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: A subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent. \n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a commonly\nused performance optimization). There are three primary variants of the\nissue which differ in the way the speculative execution can be exploited. \n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software mitigation\nfor this hardware issue at a cost of potential performance penalty. Please\nrefer to References section for further information about this issue and\nthe performance impact. \n\nVariant CVE-2017-5753 triggers the speculative execution by performing a\nbounds-check bypass. It relies on the presence of a precisely-defined\ninstruction sequence in the privileged code as well as the fact that memory\naccesses may cause allocation into the microprocessor\u0027s data cache even for\nspeculatively executed instructions that never actually commit (retire). As\na result, an unprivileged attacker could use this flaw to cross the syscall\nboundary and read privileged memory by conducting targeted cache\nside-channel attacks. It relies on the presence of a precisely-defined\ninstruction sequence in the privileged code as well as the fact that memory\naccesses may cause allocation into the microprocessor\u0027s data cache even for\nspeculatively executed instructions that never actually commit (retire). As\na result, an unprivileged attacker could use this flaw to cross the syscall\nand guest/host boundaries and read privileged memory by conducting targeted\ncache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors,\nduring speculative execution of instruction permission faults, exception\ngeneration triggered by a faulting access is suppressed until the\nretirement of the whole instruction block. In a combination with the fact\nthat memory accesses may populate the cache even when the block is being\ndropped and never committed (executed), an unprivileged local attacker\ncould use this flaw to read privileged (kernel space) memory by conducting\ntargeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64\nmicroprocessors are not affected by this issue. \n\nRed Hat would like to thank Google Project Zero for reporting these issues. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1519778 - CVE-2017-5753 hw: cpu: speculative execution bounds-check bypass\n1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection\n1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling\n\n6. Package List:\n\nRHEV Hypervisor for RHEL-6 ELS:\n\nSource:\nrhev-hypervisor7-7.3-20180102.1.el6ev.src.rpm\n\nnoarch:\nrhev-hypervisor7-7.3-20180102.1.el6ev.noarch.rpm\n\nRHEL 7-based RHEV-H ELS:\n\nSource:\nrhev-hypervisor7-7.3-20180102.1.el7ev.src.rpm\n\nnoarch:\nrhev-hypervisor7-7.3-20180102.1.el7ev.noarch.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/speculativeexecution\nhttps://access.redhat.com/solutions/3307851\nhttps://access.redhat.com/security/cve/CVE-2017-5753\nhttps://access.redhat.com/security/cve/CVE-2017-5715\nhttps://access.redhat.com/security/cve/CVE-2017-5754\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFaT54tXlSAg2UNWIIRAtmzAKCwalCzxETPR1hjx8qr6otIzzp23ACgnSyn\nfaS+MjiDEGEcbe5k+tWw9I8=\n=V9iL\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. By now, we\u0027re sure most everyone have heard of the Meltdown and Spectre\nattacks. If not, head over to https://meltdownattack.com/ and get an\noverview. \nhttps://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html\n\nThe FreeBSD Security Team was notified of the issue in late December\nand received a briefing under NDA with the original embargo date of\nJanuary 9th. Since we received relatively late notice of the issue, our\nability to provide fixes is delayed. \n\nMeltdown (CVE-2017-5754)\n~~~~~~~~~~~~~~~~~~~~~~~~\nIn terms of priority, the first step is to mitigate against the Meltdown\nattack (CVE-2017-5754, cited as variant 3 by Project Zero). Work for\nthis is ongoing, but due to the relatively large changes needed, this is\ngoing to take a little while. We are currently targeting patches for\namd64 being dev complete this week with testing probably running into\nnext week. From there, we hope to give it a short bake time before\npushing it into the 11.1-RELEASE branch. Additional work will be\nrequired to bring the mitigation to 10.3-RELEASE and 10.4-RELEASE. \n\nThe code will be selectable via a tunable which will automatically turn\non for modern Intel processors and off for AMD processors (since they\nare reportedly not vulnerable). Since the fix for Meltdown does incur a\nperformance hit for any transition between user space and kernel space,\nthis could be rather impactful depending on the workload. As such, the\ntunable can also be overridden by the end-user if they are willing to\naccept the risk. \n\nInitial work can be tracked at https://reviews.freebsd.org/D13797. \nPlease note this is a work in progress and some stuff is likely to be\nbroken. \n\nSpectre (CVE-2017-5753 and CVE-2017-5715)\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\nWhen it comes to the Spectre vulnerabilities, it is much harder to sort\nthese out. Variant 1 (CVE-2017-5753) is going to require some static\nanalysis to determine vulnerable use cases that will require barriers to\nstop speculation from disclosing information it shouldn\u0027t. While we\nhaven\u0027t done the analysis to determine where we are vulnerable, the\nnumber of cases here are supposed to be pretty small. Apparently there\nhave been some Coverity rules developed to help look for these, but we\nare still evaluating what can be done here. \n\nThe other half of Spectre, variant 2 (CVE-2017-5715) is a bit trickier\nas it affects both normal processes and bhyve. There is a proposed patch\nfor LLVM (https://reviews.llvm.org/D41723) that introduces a concept\ncalled \u0027retpoline\u0027 which mitigates this issue. We are likely to pull\nthis into HEAD and 11-STABLE once it hits the LLVM tree. Unfortunately,\nthe currently supported FreeBSD releases are using older versions of\nLLVM for which we are not sure the LLVM project will produce patches. We\nwill be looking at the feasibility to backport these patches to these\nearlier versions. \n\nBest regards,\nGordon Tetlow\nwith security-officer hat on\n. \n==========================================================================\nUbuntu Security Notice USN-3540-2\nJanuary 23, 2018\n\nlinux-lts-xenial, linux-aws vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n\nSummary:\n\nSeveral security issues were addressed in the Linux kernel. \n\nSoftware Description:\n- linux-aws: Linux kernel for Amazon Web Services (AWS) systems\n- linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty\n\nDetails:\n\nUSN-3540-1 addressed vulnerabilities in the Linux kernel for Ubuntu\n16.04 LTS. This update provides the corresponding updates for the\nLinux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for\nUbuntu 14.04 LTS. This update provides mitigations for the\ni386 (CVE-2017-5753 only), amd64, ppc64el, and s390x architectures. \n(CVE-2017-5715, CVE-2017-5753)\n\nUSN-3522-2 mitigated CVE-2017-5754 (Meltdown) for the amd64\narchitecture in the Linux Hardware Enablement (HWE) kernel from Ubuntu\n16.04 LTS for Ubuntu 14.04 LTS. This update provides the corresponding\nmitigations for the ppc64el architecture. This flaw is known as Meltdown. (CVE-2017-5754)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n linux-image-4.4.0-1011-aws 4.4.0-1011.11\n linux-image-4.4.0-111-generic 4.4.0-111.134~14.04.1\n linux-image-4.4.0-111-lowlatency 4.4.0-111.134~14.04.1\n linux-image-4.4.0-111-powerpc-e500mc 4.4.0-111.134~14.04.1\n linux-image-4.4.0-111-powerpc-smp 4.4.0-111.134~14.04.1\n linux-image-4.4.0-111-powerpc64-emb 4.4.0-111.134~14.04.1\n linux-image-4.4.0-111-powerpc64-smp 4.4.0-111.134~14.04.1\n linux-image-aws 4.4.0.1011.11\n linux-image-generic-lts-xenial 4.4.0.111.95\n linux-image-lowlatency-lts-xenial 4.4.0.111.95\n linux-image-powerpc-e500mc-lts-xenial 4.4.0.111.95\n linux-image-powerpc-smp-lts-xenial 4.4.0.111.95\n linux-image-powerpc64-emb-lts-xenial 4.4.0.111.95\n linux-image-powerpc64-smp-lts-xenial 4.4.0.111.95\n\nPlease note that fully mitigating CVE-2017-5715 (Spectre Variant 2)\nrequires corresponding processor microcode/firmware updates or,\nin virtual environments, hypervisor updates. On i386 and amd64\narchitectures, the IBRS and IBPB features are required to enable the\nkernel mitigations. Ubuntu users with a processor from a different vendor should\ncontact the vendor to identify necessary firmware updates. Ubuntu\nwill provide corresponding QEMU updates in the future for users of\nself-hosted virtual environments in coordination with upstream QEMU. \nUbuntu users in cloud environments should contact the cloud provider\nto confirm that the hypervisor has been updated to expose the new\nCPU features to virtual machines. 7) - x86_64\n\n3. The qemu-kvm package provides the\nuser-space component for running virtual machines that use KVM. Once\nall virtual machines have shut down, start them again for this update to\ntake effect. \n\nBug Fix(es):\n\n* Hot-unplugging Virtual Function I/O (VFIO) devices previously failed when\nperformed after hot-unplugging a vhost network device. This update fixes\nthe underlying code, and the VFIO device is unplugged correctly in the\ndescribed circumstances. (BZ#1498146)\n\n4. \n\n This specific attack has been named Meltdown and is addressed in the\n Linux kernel on the powerpc/ppc64el architectures by flushing the L1\n data cache on exit from kernel mode to user mode (or from hypervisor to\n kernel). \n \n This works on Power7, Power8 and Power9 processors. Memory protections ensuring user-provided buffers always\n point to userland memory were disabled, allowing . \n\nCVE-2018-5750\n\n An information leak has been found in the Linux kernel. The\n acpi_smbus_hc_add() prints a kernel address in the kernel log at every\n boot, which could be used by an attacker on the system to defeat kernel\n ASLR. \n\nAdditionnaly to those vulnerability, some mitigations for CVE-2017-5753 are\nincluded in this release. \n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2018-01-23\nLast Updated: 2018-01-22\n\nPotential Security Impact: Local: Disclosure of Information, Elevation of\nPrivilege\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nOn January 3 2018, side-channel security vulnerabilities involving\nspeculative execution were publicly disclosed. These vulnerabilities may\nimpact the listed HPE products, potentially leading to information disclosure\nand elevation of privilege. Mitigation and resolution of these\nvulnerabilities may call for both an operating system update, provided by the\nOS vendor, and a system ROM update from HPE. \n\n\n**Note:**\n\n * This issue takes advantage of techniques commonly used in many modern\nprocessor architectures. \n * For further information, microprocessor vendors have provided security\nadvisories:\n \n - Intel:\n\u003chttps://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088\u0026langu\ngeid=en-fr\u003e\n - AMD: \u003chttp://www.amd.com/en/corporate/speculative-execution\u003e\n - ARM: \u003chttps://developer.arm.com/support/security-update\u003e\n\nReferences:\n\n - CVE-2017-5715 - aka Spectre, branch target injection\n - CVE-2017-5753 - aka Spectre, bounds check bypass\n - CVE-2017-5754 - aka Meltdown, rogue data cache load, memory access\npermission check performed after kernel memory read\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\n - HPE ProLiant DL380 Gen10 Server - To be delivered\n - HPE ProLiant DL180 Gen10 Server - To be delivered\n - HPE ProLiant DL160 Gen10 Server - To be delivered\n - HPE ProLiant DL360 Gen10 Server - To be delivered\n - HPE ProLiant ML110 Gen10 Server - To be delivered\n - HPE ProLiant DL580 Gen10 Server - To be delivered\n - HPE ProLiant DL560 Gen10 Server - To be delivered\n - HPE ProLiant DL120 Gen10 Server - To be delivered\n - HPE ProLiant ML350 Gen10 Server - To be delivered\n - HPE ProLiant XL450 Gen10 Server - To be delivered\n - HPE Synergy 660 Gen10 Compute Module - To be delivered\n - HPE ProLiant DL385 Gen10 Server - prior to v1.04 \n - HPE ProLiant XL170r Gen10 Server - To be delivered\n - HPE ProLiant BL460c Gen10 Server Blade - To be delivered\n - HPE ProLiant XL190r Gen10 Server - To be delivered\n - HPE ProLiant XL230k Gen10 Server - To be delivered\n - HPE Synergy 480 Gen10 Compute Module - To be delivered\n - HPE ProLiant XL730f Gen9 Server - To be delivered\n - HPE ProLiant XL230a Gen9 Server - To be delivered\n - HPE ProLiant XL740f Gen9 Server - To be delivered\n - HPE ProLiant XL750f Gen9 Server - To be delivered\n - HPE ProLiant XL170r Gen9 Server - To be delivered\n - HP ProLiant DL60 Gen9 Server - To be delivered\n - HP ProLiant DL160 Gen9 Server - To be delivered\n - HPE ProLiant DL360 Gen9 Server - To be delivered\n - HP ProLiant DL380 Gen9 Server - To be delivered\n - HPE ProLiant XL450 Gen9 Server - To be delivered\n - HPE Apollo 4200 Gen9 Server - To be delivered\n - HP ProLiant BL460c Gen9 Server Blade - To be delivered\n - HP ProLiant ML110 Gen9 Server - To be delivered\n - HP ProLiant ML150 Gen9 Server - To be delivered\n - HPE ProLiant ML350 Gen9 Server - To be delivered\n - HP ProLiant DL120 Gen9 Server - To be delivered\n - HPE ProLiant DL560 Gen9 Server - To be delivered\n - HP ProLiant BL660c Gen9 Server - To be delivered\n - HPE ProLiant ML30 Gen9 Server - To be delivered\n - HPE ProLiant XL170r Gen10 Server - To be delivered\n - HPE ProLiant DL20 Gen9 Server - To be delivered\n - HPE Synergy 660 Gen9 Compute Module - To be delivered\n - HPE Synergy 480 Gen9 Compute Module - To be delivered\n - HPE ProLiant XL250a Gen9 Server - To be delivered\n - HPE ProLiant XL190r Gen9 Server - To be delivered\n - HP ProLiant DL80 Gen9 Server - To be delivered\n - HPE ProLiant DL180 Gen9 Server - To be delivered\n - HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure-to-order Server -\nTo be delivered\n - HPE ProLiant WS460c Gen9 Workstation - To be delivered\n - HPE ProLiant XL260a Gen9 Server - To be delivered\n - HPE Synergy 620 Gen9 Compute Module - To be delivered\n - HPE ProLiant DL580 Gen9 Server - To be delivered\n - HP ProLiant XL220a Gen8 v2 Server - To be delivered\n - HPE Synergy 680 Gen9 Compute Module - To be delivered\n - HPE ProLiant m510 Server Cartridge - To be delivered\n - HPE ProLiant m710p Server Cartridge - To be delivered\n - HPE ProLiant m710x Server Cartridge - To be delivered\n - HP ProLiant m710 Server Cartridge - To be delivered\n - HP ProLiant DL980 G7 Server - To be delivered\n - HPE Synergy Composer - To be delivered\n - HPE ProLiant Thin Micro TM200 Server - To be delivered\n - HPE ProLiant ML10 v2 Server - To be delivered\n - HPE ProLiant m350 Server Cartridge - To be delivered\n - HPE ProLiant m300 Server Cartridge - To be delivered\n - HPE ProLiant MicroServer Gen8 - To be delivered\n - HPE ProLiant ML310e Gen8 v2 Server - To be delivered\n - HPE Superdome Flex Server - To be delivered\n - HP 3PAR StoreServ File Controller - To be delivered - v3 impacted\n - HPE StoreVirtual 3000 File Controller - To be delivered\n - HPE StoreEasy 1450 Storage - To be delivered\n - HPE StoreEasy 1550 Storage - To be delivered\n - HPE StoreEasy 1650 Storage - To be delivered\n - HPE StoreEasy 3850 Gateway Storage - To be delivered\n - HPE StoreEasy 1850 Storage - To be delivered\n - HP ConvergedSystem 700 - To be delivered\n - HPE Converged Architecture 700 - To be delivered\n - HP ProLiant DL580 Gen8 Server - To be delivered\n - HPE Cloudline CL2100 Gen10 Server - To be delivered\n - HPE Cloudline CL2200 Gen10 Server - To be delivered\n - HPE Cloudline CL3150 G4 Server - To be delivered\n - HPE Cloudline CL5200 G3 Server - To be delivered\n - HPE Cloudline CL3100 G3 Server - To be delivered\n - HPE Cloudline CL2100 G3 807S 8 SFF Configure-to-order Server - To be\ndelivered\n - HPE Cloudline CL2100 G3 407S 4 LFF Configure-to-order Server - To be\ndelivered\n - HPE Cloudline CL2100 G3 806R 8SFF Configure-to-order Server - To be\ndelivered\n - HPE Cloudline CL2200 G3 1211R 12 LFF Configure-to-order Server - To be\ndelivered\n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n CVE-2017-5715\n 8.2 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N\n 6.8 (AV:A/AC:L/Au:N/C:C/I:P/A:N)\n\n CVE-2017-5753\n 5.0 CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L\n 5.4 (AV:A/AC:M/Au:N/C:P/I:P/A:P)\n\n CVE-2017-5754\n 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n 7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)\n\n Information on CVSS is documented in\n HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nOn January 11, Intel announced issues with an increased frequency of reboots\nwhen using the microcodes they released to address Variant 2 of the Spectre\nVulnerability for numerous processors including Broadwell, Haswell, Skylake,\nKaby Lake, Ivybridge, and Sandybridge processors. Intel has now identified\nthe root cause of these issues and determined that these microcodes may\nintroduce reboots and other unpredictable system behavior. Due to the\nseverity of the potential issues that may occur when using these microcodes,\nIntel is now recommending that customers discontinue their use. Additional\ninformation is available from Intels Security Exploit Newsroom here:\n\u003chttps://newsroom.intel.com/press-kits/security-exploits-intel-products/\u003e . \nHPE is in alignment with Intel in our recommendation that customers\ndiscontinue use of System ROMs including impacted microcodes and revert to\nearlier System ROM versions. \n\nAll System ROMs including impacted microcodes have been removed from the HPE\nSupport Site. This impacts HPE ProLiant and Synergy Gen10, Gen9, and Gen8 v2\nservers as well as HPE Superdome servers for which updated System ROMs had\npreviously been made available. Intel is working on updated microcodes to\naddress these issues, and HPE will validate updated System ROMs including\nthese microcodes and make them available to our customers in the coming\nweeks. \n\nMitigations for Variant 1 (Spectre) and Variant 3 (Meltdown) vulnerabilities\nrequire only OS updates and are not impacted. \n\n * HPE has provided a customer bulletin\n\u003chttps://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00039267en_us\u003e\nwith specific instructions to obtain the udpated sytem ROM\n \n - Note:\n \n + CVE-2017-5715 (Variant 2) requires that the System ROM be updated and a\nvendor supplied operating system update be applied as well. \n + For CVE-2017-5753, CVE-2017-5754 (Variants 1 and 3) require only\nupdates of a vendor supplied operating system. \n + HPE will continue to add additional products to the list. \n\nHISTORY\n\nVersion:1 (rev.1) - 4 January 2018 Initial release\n\nVersion:2 (rev.2) - 5 January 2018 Added additional impacted products\n\nVersion:3 (rev.3) - 10 January 2018 Added more impacted products\n\nVersion:4 (rev.4) - 9 January 2018 Fixed product ID\n\nVersion:5 (rev.5) - 18 January 2018 Added additional impacted products\n\nVersion:6 (rev.6) - 19 January 2018 updated impacted product list\n\nVersion:7 (rev.7) - 23 January 2018 Marked impacted products with TBD for\nSystem ROM updates per Intel\u0027s guidance on microcode issues\n\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer\u0027s patch management\npolicy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HPE Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hpe.com. \n\nReport: To report a potential security vulnerability for any HPE supported\nproduct:\n Web form: https://www.hpe.com/info/report-security-vulnerability\n Email: security-alert@hpe.com\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin\nalerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial\nerrors or omissions contained herein. The information provided is provided\n\"as is\" without warranty of any kind. To the extent permitted by law, neither\nHP or its affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. Hewlett\nPackard Enterprise and the names of Hewlett Packard Enterprise products\nreferenced herein are trademarks of Hewlett Packard Enterprise in the United\nStates and other countries. Other product and company names mentioned herein\nmay be trademarks of their respective owners. Summary\n\n VMware vSphere, Workstation and Fusion updates add Hypervisor-\n Assisted Guest remediation for speculative execution issue. \n\n Notes:\n\n Hypervisor remediation can be classified into the two following\n categories:\n - Hypervisor-Specific Remediation (documented in VMSA-2018-0002)\n - Hypervisor-Assisted Guest Remediation (documented in this advisory)\n\n The ESXi patches and new versions of Workstation and Fusion of this\n advisory include the Hypervisor-Specific Remediation documented in\n VMware Security Advisory VMSA-2018-0002. \n\n More information on the types of Hypervisor remediation may be found\n in VMware Knowledge Base article 52245. Relevant Products\n\n VMware vCenter Server (VC)\n VMware ESXi (ESXi)\n VMware Workstation Pro / Player (Workstation)\n VMware Fusion Pro / Fusion (Fusion)\n\n3. Problem Description\n\n New speculative-execution control mechanism for Virtual Machines\n\n Updates of vCenter Server, ESXi, Workstation and Fusion virtualize\n the new speculative-execution control mechanism for Virtual Machines\n (VMs). As a result, a patched Guest Operating System (Guest OS) can\n remediate the Branch Target Injection issue (CVE-2017-5715). This\n issue may allow for information disclosure between processes within\n the VM. \n\n To remediate CVE-2017-5715 in the Guest OS the following VMware and\n third party requirements must be met:\n\n VMware Requirements\n -------------------\n\n - Deploy the updated version of vCenter Server listed in the table\n (if vCenter Server is used). \n\n - Deploy the ESXi patches and/or the new versions for Workstation or\n Fusion listed in the table. \n\n - Ensure that your VMs are using Hardware Version 9 or higher. For\n best performance, Hardware Version 11 or higher is recommended. \n VMware Knowledge Base article 1010675 discusses Hardware Versions. \n\n Third party Requirements\n ------------------------\n\n - Deploy the Guest OS patches for CVE-2017-5715. These patches are\n to be obtained from your OS vendor. \n\n - Update the CPU microcode. Additional microcode is needed for your\n CPU to be able to expose the new MSRs that are used by the patched\n Guest OS. This microcode should be available from your hardware\n platform vendor. \n VMware is providing several versions of the required microcode from\n INTEL and AMD through ESXi patches listed in the table. See VMware\n Knowledge Base 52085 for more details. \n\n\n Column 5 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/ Mitigation\n Product Version on Severity Apply patch Workaround\n =========== ======= ======= ======== ============= ==========\n\n VC 6.5 Any Important 6.5 U1e * None\n VC 6.0 Any Important 6.0 U3d * None\n VC 5.5 Any Important 5.5 U3g * None\n\n ESXi 6.5 Any Important ESXi650-201801401-BG None\n ESXi650-201801402-BG **\n ESXi 6.0 Any Important ESXi600-201801401-BG None\n ESXi600-201801402-BG **\n ESXi 5.5 Any Important ESXi550-201801401-BG ** None\n\n Workstation 14.x Any Important 14.1.1 None\n Workstation 12.x Any Important patch planned None\n\n Fusion 10.x OS X Important 10.1.1 None\n Fusion 8.x OS X Important 8.5.10 None\n\n * The new versions of vCenter Server set restrictions on ESXi hosts\n joining an Enhanced vMotion Cluster, see VMware Knowledge Base\n article 52085 for details. \n\n ** These ESXi patches install the microcodes if present for your CPU,\n see VMware Knowledge Base article 52085. Solution\n\n Please review the patch/release notes for your product and\n version and verify the checksum of your downloaded file. \n\n vCenter Server 6.5 U1e\n Downloads and Documentation:\n\nhttps://my.vmware.com/web/vmware/details?productId=614\u0026rPId=20950\u0026downloadG\nroup=VC65U1E\n\n vCenter Server 6.0 U3d\n Downloads and Documentation:\n\nhttps://my.vmware.com/web/vmware/details?downloadGroup=VC60U3D\u0026productId=49\n1\u0026rPId=20946\n\n vCenter Server 5.5 U3g\n Downloads and Documentation:\n\nhttps://my.vmware.com/web/vmware/details?downloadGroup=VC55U3G\u0026productId=35\n3\u0026rPId=20876\n\n VMware ESXi 6.5\n Downloads:\n https://my.vmware.com/group/vmware/patch\n Documentation:\n http://kb.vmware.com/kb/52198\n http://kb.vmware.com/kb/52199\n\n VMware ESXi 6.0\n Downloads:\n https://my.vmware.com/group/vmware/patch\n Documentation:\n http://kb.vmware.com/kb/52205\n http://kb.vmware.com/kb/52206\n\n VMware ESXi 5.5\n Downloads:\n https://my.vmware.com/group/vmware/patch\n Documentation:\n http://kb.vmware.com/kb/52127\n\n VMware Workstation Pro, Player 14.1.1\n Downloads and Documentation:\n https://www.vmware.com/go/downloadworkstation\n https://www.vmware.com/go/downloadplayer\n https://www.vmware.com/support/pubs/ws_pubs.html\n\n VMware Fusion Pro / Fusion 8.5.10, 10.1.1\n Downloads and Documentation:\n https://www.vmware.com/go/downloadfusion\n https://www.vmware.com/support/pubs/fusion_pubs.html\n\n\n5. References\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715\n\n VMware Knowledge Base Article 52085\n https://kb.vmware.com/s/article/52085\n\n VMware Knowledge Base Article 1010675\n https://kb.vmware.com/s/article/1010675\n\n VMware Knowledge Base article 52245\n https://kb.vmware.com/s/article/52245\n\n\n- ------------------------------------------------------------------------\n6. Change log\n\n 2018-01-09 VMSA-2018-0004\n Initial security advisory in conjunction with the release of VMware\n vCenter Server 5.5 U3g, 6.0 U3d and 6.5 U1e, ESXi 5.5, 6.0, and 6.5\n patches, Workstation 14.1.1, and Fusion 10.1.1 and\n 8.5.10 on 2018-01-09. Contact\n\n E-mail list for product security notifications and announcements:\n http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n This Security Advisory is posted to the following lists:\n\n security-announce@lists.vmware.com\n bugtraq@securityfocus.com\n fulldisclosure@seclists.org\n\n E-mail: security@vmware.com\n PGP key at: https://kb.vmware.com/kb/1055\n\n VMware Security Advisories\n http://www.vmware.com/security/advisories\n\n VMware Security Response Policy\n https://www.vmware.com/support/policies/security_response.html\n\n VMware Lifecycle Support Phases\n https://www.vmware.com/support/policies/lifecycle.html\n\n VMware Security \u0026 Compliance Blog\n https://blogs.vmware.com/security\n\n Twitter\n https://twitter.com/VMwareSRC\n\n Copyright 2018 VMware Inc. All rights reserved. 7.3) - ppc64, ppc64le, s390x, x86_64\n\n3. Description:\n\nThe libvirt library contains a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-5715"
},
{
"db": "CERT/CC",
"id": "VU#180049"
},
{
"db": "CNVD",
"id": "CNVD-2018-00302"
},
{
"db": "VULHUB",
"id": "VHN-113918"
},
{
"db": "PACKETSTORM",
"id": "147454"
},
{
"db": "PACKETSTORM",
"id": "145665"
},
{
"db": "PACKETSTORM",
"id": "145717"
},
{
"db": "PACKETSTORM",
"id": "145769"
},
{
"db": "PACKETSTORM",
"id": "146017"
},
{
"db": "PACKETSTORM",
"id": "145653"
},
{
"db": "PACKETSTORM",
"id": "146002"
},
{
"db": "PACKETSTORM",
"id": "145708"
},
{
"db": "PACKETSTORM",
"id": "146530"
},
{
"db": "PACKETSTORM",
"id": "146026"
},
{
"db": "PACKETSTORM",
"id": "145800"
},
{
"db": "PACKETSTORM",
"id": "145671"
},
{
"db": "PACKETSTORM",
"id": "145650"
}
],
"trust": 3.42
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-113918",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-113918"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-5715",
"trust": 3.0
},
{
"db": "CERT/CC",
"id": "VU#584653",
"trust": 1.9
},
{
"db": "CERT/CC",
"id": "VU#180049",
"trust": 1.9
},
{
"db": "BID",
"id": "102376",
"trust": 1.7
},
{
"db": "PACKETSTORM",
"id": "155281",
"trust": 1.1
},
{
"db": "PACKETSTORM",
"id": "145645",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1040071",
"trust": 1.1
},
{
"db": "LENOVO",
"id": "LEN-18282",
"trust": 1.1
},
{
"db": "EXPLOIT-DB",
"id": "43427",
"trust": 1.1
},
{
"db": "CERT@VDE",
"id": "VDE-2018-003",
"trust": 1.1
},
{
"db": "CERT@VDE",
"id": "VDE-2018-002",
"trust": 1.1
},
{
"db": "SIEMENS",
"id": "SSA-608355",
"trust": 1.1
},
{
"db": "USCERT",
"id": "TA18-141A",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2018-00302",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "146026",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "145769",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "145800",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "146017",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "146019",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145844",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146014",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146298",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145767",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146301",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146018",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "149917",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146009",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146556",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148260",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146016",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "150083",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145852",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145801",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146315",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148446",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146771",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146167",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146762",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147179",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147582",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146308",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145768",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145964",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146283",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146772",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146957",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145853",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146015",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145762",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146714",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145809",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146501",
"trust": 0.1
},
{
"db": "CNNVD",
"id": "CNNVD-201801-152",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-113918",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147454",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145665",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145717",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145650",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145653",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146002",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145708",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "146530",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "145671",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#180049"
},
{
"db": "CNVD",
"id": "CNVD-2018-00302"
},
{
"db": "VULHUB",
"id": "VHN-113918"
},
{
"db": "PACKETSTORM",
"id": "147454"
},
{
"db": "PACKETSTORM",
"id": "145665"
},
{
"db": "PACKETSTORM",
"id": "145717"
},
{
"db": "PACKETSTORM",
"id": "145769"
},
{
"db": "PACKETSTORM",
"id": "146017"
},
{
"db": "PACKETSTORM",
"id": "145650"
},
{
"db": "PACKETSTORM",
"id": "145653"
},
{
"db": "PACKETSTORM",
"id": "146002"
},
{
"db": "PACKETSTORM",
"id": "145708"
},
{
"db": "PACKETSTORM",
"id": "146530"
},
{
"db": "PACKETSTORM",
"id": "146026"
},
{
"db": "PACKETSTORM",
"id": "145800"
},
{
"db": "PACKETSTORM",
"id": "145671"
},
{
"db": "NVD",
"id": "CVE-2017-5715"
}
]
},
"id": "VAR-201801-0826",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-00302"
},
{
"db": "VULHUB",
"id": "VHN-113918"
}
],
"trust": 1.3670634874999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-00302"
}
]
},
"last_update_date": "2024-07-23T19:20:13.225000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-203",
"trust": 1.0
},
{
"problemtype": "CWE-200",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-113918"
},
{
"db": "NVD",
"id": "CVE-2017-5715"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"trust": 1.9,
"url": "http://www.kb.cert.org/vuls/id/584653"
},
{
"trust": 1.8,
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/102376"
},
{
"trust": 1.6,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
},
{
"trust": 1.6,
"url": "https://support.apple.com//ht208394"
},
{
"trust": 1.6,
"url": "http://www.dell.com/support/speculative-store-bypass"
},
{
"trust": 1.2,
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"trust": 1.1,
"url": "https://seclists.org/bugtraq/2019/jun/36"
},
{
"trust": 1.1,
"url": "https://seclists.org/bugtraq/2019/nov/16"
},
{
"trust": 1.1,
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"trust": 1.1,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180104-cpusidechannel"
},
{
"trust": 1.1,
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
},
{
"trust": 1.1,
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
},
{
"trust": 1.1,
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
},
{
"trust": 1.1,
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
},
{
"trust": 1.1,
"url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2018-001.txt"
},
{
"trust": 1.1,
"url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2019-003.txt"
},
{
"trust": 1.1,
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"trust": 1.1,
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"trust": 1.1,
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"trust": 1.1,
"url": "http://xenbits.xen.org/xsa/advisory-254.html"
},
{
"trust": 1.1,
"url": "https://aws.amazon.com/de/security/security-bulletins/aws-2018-013/"
},
{
"trust": 1.1,
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
},
{
"trust": 1.1,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"trust": 1.1,
"url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
},
{
"trust": 1.1,
"url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
},
{
"trust": 1.1,
"url": "https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes"
},
{
"trust": 1.1,
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180002"
},
{
"trust": 1.1,
"url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
},
{
"trust": 1.1,
"url": "https://security.paloaltonetworks.com/cve-2017-5715"
},
{
"trust": 1.1,
"url": "https://support.citrix.com/article/ctx231399"
},
{
"trust": 1.1,
"url": "https://support.f5.com/csp/article/k91229003"
},
{
"trust": 1.1,
"url": "https://support.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03805en_us"
},
{
"trust": 1.1,
"url": "https://support.lenovo.com/us/en/solutions/len-18282"
},
{
"trust": 1.1,
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
},
{
"trust": 1.1,
"url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
},
{
"trust": 1.1,
"url": "https://www.synology.com/support/security/synology_sa_18_01"
},
{
"trust": 1.1,
"url": "https://www.vmware.com/security/advisories/vmsa-2018-0007.html"
},
{
"trust": 1.1,
"url": "https://www.vmware.com/us/security/advisories/vmsa-2018-0002.html"
},
{
"trust": 1.1,
"url": "https://www.vmware.com/us/security/advisories/vmsa-2018-0004.html"
},
{
"trust": 1.1,
"url": "https://www.debian.org/security/2018/dsa-4120"
},
{
"trust": 1.1,
"url": "https://www.debian.org/security/2018/dsa-4187"
},
{
"trust": 1.1,
"url": "https://www.debian.org/security/2018/dsa-4188"
},
{
"trust": 1.1,
"url": "https://www.debian.org/security/2018/dsa-4213"
},
{
"trust": 1.1,
"url": "https://www.exploit-db.com/exploits/43427/"
},
{
"trust": 1.1,
"url": "https://security.freebsd.org/advisories/freebsd-sa-18:03.speculative_execution.asc"
},
{
"trust": 1.1,
"url": "https://security.freebsd.org/advisories/freebsd-sa-19:26.mcu.asc"
},
{
"trust": 1.1,
"url": "https://security.gentoo.org/glsa/201810-06"
},
{
"trust": 1.1,
"url": "http://packetstormsecurity.com/files/145645/spectre-information-disclosure-proof-of-concept.html"
},
{
"trust": 1.1,
"url": "http://packetstormsecurity.com/files/155281/freebsd-security-advisory-freebsd-sa-19-26.mcu.html"
},
{
"trust": 1.1,
"url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
},
{
"trust": 1.1,
"url": "https://spectreattack.com/"
},
{
"trust": 1.1,
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"trust": 1.1,
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
},
{
"trust": 1.1,
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"trust": 1.1,
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"trust": 1.1,
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{
"trust": 1.1,
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"trust": 1.1,
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"
},
{
"trust": 1.1,
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:0292"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1040071"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/usn/usn-3516-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3531-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3531-3/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3540-2/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3541-2/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3542-2/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3549-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3560-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3561-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3580-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3581-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3581-2/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3582-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3582-2/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3594-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3597-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3597-2/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3620-2/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3690-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"trust": 1.0,
"url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088\u0026languageid=en-fr"
},
{
"trust": 1.0,
"url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03871en_us"
},
{
"trust": 0.8,
"url": "https://vuls.cert.org/confluence/display/wiki/vulnerabilities+associated+with+cpu+speculative+execution"
},
{
"trust": 0.8,
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"trust": 0.8,
"url": "https://developer.amd.com/wp-content/resources/124441_amd64_speculativestorebypassdisable_whitepaper_final.pdf"
},
{
"trust": 0.8,
"url": "https://www.us-cert.gov/ncas/alerts/ta18-141a"
},
{
"trust": 0.8,
"url": "http://cwe.mitre.org/data/definitions/208.html"
},
{
"trust": 0.8,
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-speculative-execution-side-channel-mitigations.pdf"
},
{
"trust": 0.8,
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-intel-analysis-of-speculative-execution-side-channels-white-paper.pdf"
},
{
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180521-cpusidechannel"
},
{
"trust": 0.8,
"url": "https://fortiguard.com/psirt/fg-ir-18-002"
},
{
"trust": 0.8,
"url": "https://support.hp.com/us-en/document/c06001626"
},
{
"trust": 0.8,
"url": "http://www.hitachi.com/hirt/publications/hirt-pub18001/"
},
{
"trust": 0.8,
"url": "https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/"
},
{
"trust": 0.8,
"url": "https://docs.microsoft.com/en-us/cpp/security/developer-guidance-speculative-execution"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"trust": 0.8,
"url": "https://www.suse.com/support/kb/doc/?id=7022937"
},
{
"trust": 0.8,
"url": "https://www.synology.com/en-global/support/security/synology_sa_18_23"
},
{
"trust": 0.8,
"url": "https://wiki.ubuntu.com/securityteam/knowledgebase/variant4"
},
{
"trust": 0.8,
"url": "https://kb.vmware.com/s/article/54951"
},
{
"trust": 0.8,
"url": "https://aws.amazon.com/security/security-bulletins/aws-2018-015/"
},
{
"trust": 0.7,
"url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.7,
"url": "https://bugzilla.redhat.com/):"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/team/key/"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2017-5715"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"trust": 0.6,
"url": "https://www.bleepingcomputer.com/news/security/list-of-meltdown-and-spectre-vulnerability-advisories-patches-and-updates"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-5715"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-5753"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-5754"
},
{
"trust": 0.2,
"url": "https://security-tracker.debian.org/tracker/linux"
},
{
"trust": 0.2,
"url": "https://www.debian.org/security/faq"
},
{
"trust": 0.2,
"url": "https://www.debian.org/security/"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/solutions/3307851"
},
{
"trust": 0.1,
"url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088\u0026amp;languageid=en-fr"
},
{
"trust": 0.1,
"url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03871en_us"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-10323"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7757"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-5803"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-18241"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-1066"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-1093"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-1068"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7566"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-18224"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7740"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-18218"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000199"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-8087"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-18193"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-17975"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-8822"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-1092"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-18216"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-1108"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-1065"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-8781"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7480"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-18222"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7995"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-18257"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2018:0014"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2017-5753"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2018:0046"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2017-5754"
},
{
"trust": 0.1,
"url": "https://meltdownattack.com/"
},
{
"trust": 0.1,
"url": "https://reviews.llvm.org/d41723)"
},
{
"trust": 0.1,
"url": "https://reviews.freebsd.org/d13797."
},
{
"trust": 0.1,
"url": "https://wiki.ubuntu.com/securityteam/knowledgebase/spectreandmeltdown"
},
{
"trust": 0.1,
"url": "https://www.ubuntu.com/usn/usn-3540-2"
},
{
"trust": 0.1,
"url": "https://www.ubuntu.com/usn/usn-3540-1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1011.11"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-111.134~14.04.1"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2018:0013"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2018:0012"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2018:0103"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2018:0054"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-5750"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-13166"
},
{
"trust": 0.1,
"url": "https://support.hpe.com/hpsc/doc/public/display?docid=emr_na-a00039267en_us\u003e"
},
{
"trust": 0.1,
"url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088\u0026langu"
},
{
"trust": 0.1,
"url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03805en_us"
},
{
"trust": 0.1,
"url": "http://www.hpe.com/support/security_bulletin_archive"
},
{
"trust": 0.1,
"url": "https://www.hpe.com/info/report-security-vulnerability"
},
{
"trust": 0.1,
"url": "http://www.hpe.com/support/subscriber_choice"
},
{
"trust": 0.1,
"url": "https://developer.arm.com/support/security-update\u003e"
},
{
"trust": 0.1,
"url": "http://www.amd.com/en/corporate/speculative-execution\u003e"
},
{
"trust": 0.1,
"url": "https://newsroom.intel.com/press-kits/security-exploits-intel-products/\u003e"
},
{
"trust": 0.1,
"url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499"
},
{
"trust": 0.1,
"url": "https://kb.vmware.com/s/article/52085"
},
{
"trust": 0.1,
"url": "https://www.vmware.com/go/downloadfusion"
},
{
"trust": 0.1,
"url": "https://www.vmware.com/support/pubs/fusion_pubs.html"
},
{
"trust": 0.1,
"url": "https://twitter.com/vmwaresrc"
},
{
"trust": 0.1,
"url": "https://kb.vmware.com/s/article/1010675"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/52205"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/52198"
},
{
"trust": 0.1,
"url": "https://my.vmware.com/web/vmware/details?downloadgroup=vc55u3g\u0026productid=35"
},
{
"trust": 0.1,
"url": "https://blogs.vmware.com/security"
},
{
"trust": 0.1,
"url": "https://kb.vmware.com/kb/1055"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/security/advisories"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5715"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/52127"
},
{
"trust": 0.1,
"url": "https://my.vmware.com/web/vmware/details?downloadgroup=vc60u3d\u0026productid=49"
},
{
"trust": 0.1,
"url": "https://my.vmware.com/web/vmware/details?productid=614\u0026rpid=20950\u0026downloadg"
},
{
"trust": 0.1,
"url": "https://www.vmware.com/support/pubs/ws_pubs.html"
},
{
"trust": 0.1,
"url": "https://www.vmware.com/go/downloadplayer"
},
{
"trust": 0.1,
"url": "https://kb.vmware.com/s/article/52245"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/52206"
},
{
"trust": 0.1,
"url": "https://my.vmware.com/group/vmware/patch"
},
{
"trust": 0.1,
"url": "https://www.vmware.com/support/policies/lifecycle.html"
},
{
"trust": 0.1,
"url": "https://www.vmware.com/go/downloadworkstation"
},
{
"trust": 0.1,
"url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce"
},
{
"trust": 0.1,
"url": "https://www.vmware.com/support/policies/security_response.html"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/52199"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2018:0031"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#180049"
},
{
"db": "CNVD",
"id": "CNVD-2018-00302"
},
{
"db": "VULHUB",
"id": "VHN-113918"
},
{
"db": "PACKETSTORM",
"id": "147454"
},
{
"db": "PACKETSTORM",
"id": "145665"
},
{
"db": "PACKETSTORM",
"id": "145717"
},
{
"db": "PACKETSTORM",
"id": "145769"
},
{
"db": "PACKETSTORM",
"id": "146017"
},
{
"db": "PACKETSTORM",
"id": "145650"
},
{
"db": "PACKETSTORM",
"id": "145653"
},
{
"db": "PACKETSTORM",
"id": "146002"
},
{
"db": "PACKETSTORM",
"id": "145708"
},
{
"db": "PACKETSTORM",
"id": "146530"
},
{
"db": "PACKETSTORM",
"id": "146026"
},
{
"db": "PACKETSTORM",
"id": "145800"
},
{
"db": "PACKETSTORM",
"id": "145671"
},
{
"db": "NVD",
"id": "CVE-2017-5715"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#180049"
},
{
"db": "CNVD",
"id": "CNVD-2018-00302"
},
{
"db": "VULHUB",
"id": "VHN-113918"
},
{
"db": "PACKETSTORM",
"id": "147454"
},
{
"db": "PACKETSTORM",
"id": "145665"
},
{
"db": "PACKETSTORM",
"id": "145717"
},
{
"db": "PACKETSTORM",
"id": "145769"
},
{
"db": "PACKETSTORM",
"id": "146017"
},
{
"db": "PACKETSTORM",
"id": "145650"
},
{
"db": "PACKETSTORM",
"id": "145653"
},
{
"db": "PACKETSTORM",
"id": "146002"
},
{
"db": "PACKETSTORM",
"id": "145708"
},
{
"db": "PACKETSTORM",
"id": "146530"
},
{
"db": "PACKETSTORM",
"id": "146026"
},
{
"db": "PACKETSTORM",
"id": "145800"
},
{
"db": "PACKETSTORM",
"id": "145671"
},
{
"db": "NVD",
"id": "CVE-2017-5715"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-05-21T00:00:00",
"db": "CERT/CC",
"id": "VU#180049"
},
{
"date": "2018-01-04T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-00302"
},
{
"date": "2018-01-04T00:00:00",
"db": "VULHUB",
"id": "VHN-113918"
},
{
"date": "2018-05-03T01:35:46",
"db": "PACKETSTORM",
"id": "147454"
},
{
"date": "2018-01-04T17:53:01",
"db": "PACKETSTORM",
"id": "145665"
},
{
"date": "2018-01-06T18:01:01",
"db": "PACKETSTORM",
"id": "145717"
},
{
"date": "2018-01-09T15:55:55",
"db": "PACKETSTORM",
"id": "145769"
},
{
"date": "2018-01-23T04:32:09",
"db": "PACKETSTORM",
"id": "146017"
},
{
"date": "2018-01-04T17:50:30",
"db": "PACKETSTORM",
"id": "145650"
},
{
"date": "2018-01-04T17:50:56",
"db": "PACKETSTORM",
"id": "145653"
},
{
"date": "2018-01-22T03:09:00",
"db": "PACKETSTORM",
"id": "146002"
},
{
"date": "2018-01-06T17:59:41",
"db": "PACKETSTORM",
"id": "145708"
},
{
"date": "2018-02-22T12:22:00",
"db": "PACKETSTORM",
"id": "146530"
},
{
"date": "2018-01-24T00:28:48",
"db": "PACKETSTORM",
"id": "146026"
},
{
"date": "2018-01-10T00:59:14",
"db": "PACKETSTORM",
"id": "145800"
},
{
"date": "2018-01-05T00:37:02",
"db": "PACKETSTORM",
"id": "145671"
},
{
"date": "2018-01-04T13:29:00.227000",
"db": "NVD",
"id": "CVE-2017-5715"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-06-19T00:00:00",
"db": "CERT/CC",
"id": "VU#180049"
},
{
"date": "2018-01-11T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-00302"
},
{
"date": "2020-05-05T00:00:00",
"db": "VULHUB",
"id": "VHN-113918"
},
{
"date": "2021-08-16T09:15:06.987000",
"db": "NVD",
"id": "CVE-2017-5715"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "PACKETSTORM",
"id": "146017"
}
],
"trust": 0.1
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks",
"sources": [
{
"db": "CERT/CC",
"id": "VU#180049"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "info disclosure",
"sources": [
{
"db": "PACKETSTORM",
"id": "146026"
}
],
"trust": 0.1
}
}
SSA-957369
Vulnerability from csaf_siemens - Published: 2023-09-12 00:00 - Updated: 2023-09-12 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Insyde has published information on vulnerabilities in Insyde BIOS up to \nAugust 2023. These vulnerabilities also affect the RUGGEDCOM APE1808 product family.\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-957369: Insyde BIOS Vulnerabilities in RUGGEDCOM APE1808 Product Family - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-957369.html"
},
{
"category": "self",
"summary": "SSA-957369: Insyde BIOS Vulnerabilities in RUGGEDCOM APE1808 Product Family - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-957369.json"
},
{
"category": "self",
"summary": "SSA-957369: Insyde BIOS Vulnerabilities in RUGGEDCOM APE1808 Product Family - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-957369.pdf"
},
{
"category": "self",
"summary": "SSA-957369: Insyde BIOS Vulnerabilities in RUGGEDCOM APE1808 Product Family - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-957369.txt"
}
],
"title": "SSA-957369: Insyde BIOS Vulnerabilities in RUGGEDCOM APE1808 Product Family",
"tracking": {
"current_release_date": "2023-09-12T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-957369",
"initial_release_date": "2023-09-12T00:00:00Z",
"revision_history": [
{
"date": "2023-09-12T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 ADM (6GK6015-0AL20-0GL0)",
"product_id": "1",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GL0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 ADM (6GK6015-0AL20-0GL0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 ADM CC (6GK6015-0AL20-0GL1)",
"product_id": "2",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GL1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 ADM CC (6GK6015-0AL20-0GL1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 CKP (6GK6015-0AL20-0GK0)",
"product_id": "3",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GK0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 CKP (6GK6015-0AL20-0GK0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 CKP CC (6GK6015-0AL20-0GK1)",
"product_id": "4",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GK1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 CKP CC (6GK6015-0AL20-0GK1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 CLOUDCONNECT (6GK6015-0AL20-0GM0)",
"product_id": "5",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GM0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 CLOUDCONNECT (6GK6015-0AL20-0GM0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 CLOUDCONNECT CC (6GK6015-0AL20-0GM1)",
"product_id": "6",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GM1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 CLOUDCONNECT CC (6GK6015-0AL20-0GM1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 ELAN (6GK6015-0AL20-0GP0)",
"product_id": "7",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GP0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 ELAN (6GK6015-0AL20-0GP0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 ELAN CC (6GK6015-0AL20-0GP1)",
"product_id": "8",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GP1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 ELAN CC (6GK6015-0AL20-0GP1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 SAM-L (6GK6015-0AL20-0GN0)",
"product_id": "9",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GN0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 SAM-L (6GK6015-0AL20-0GN0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808 SAM-L CC (6GK6015-0AL20-0GN1)",
"product_id": "10",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GN1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 SAM-L CC (6GK6015-0AL20-0GN1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-P (6GK6015-0AL20-1AA0)",
"product_id": "11",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AA0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-P (6GK6015-0AL20-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-P CC (6GK6015-0AL20-1AA1)",
"product_id": "12",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AA1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-P CC (6GK6015-0AL20-1AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-S1 (6GK6015-0AL20-1AB0)",
"product_id": "13",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AB0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-S1 (6GK6015-0AL20-1AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-S1 CC (6GK6015-0AL20-1AB1)",
"product_id": "14",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AB1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-S1 CC (6GK6015-0AL20-1AB1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-S3 (6GK6015-0AL20-1AD0)",
"product_id": "15",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AD0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-S3 (6GK6015-0AL20-1AD0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-S3 CC (6GK6015-0AL20-1AD1)",
"product_id": "16",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AD1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-S3 CC (6GK6015-0AL20-1AD1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-S5 (6GK6015-0AL20-1AF0)",
"product_id": "17",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AF0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-S5 (6GK6015-0AL20-1AF0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808CLA-S5 CC (6GK6015-0AL20-1AF1)",
"product_id": "18",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-1AF1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808CLA-S5 CC (6GK6015-0AL20-1AF1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808LNX (6GK6015-0AL20-0GH0)",
"product_id": "19",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GH0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808LNX (6GK6015-0AL20-0GH0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808LNX CC (6GK6015-0AL20-0GH1)",
"product_id": "20",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GH1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808LNX CC (6GK6015-0AL20-0GH1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808W10 (6GK6015-0AL20-0GJ0)",
"product_id": "21",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GJ0"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808W10 (6GK6015-0AL20-0GJ0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.0.212N",
"product": {
"name": "RUGGEDCOM APE1808W10 CC (6GK6015-0AL20-0GJ1)",
"product_id": "22",
"product_identification_helper": {
"model_numbers": [
"6GK6015-0AL20-0GJ1"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808W10 CC (6GK6015-0AL20-0GJ1)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "An attacker with local access to the system could potentially disclose information\r\nfrom protected memory areas via a side-channel attack on the processor cache.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2021-38578",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2021-38578"
},
{
"cve": "CVE-2022-24350",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in IhisiSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. IHISI function 0x17 verifies that the output buffer lies within the command buffer but does not verify that output data does not go beyond the end of the command buffer. In particular, the GetFlashTable function is called directly on the Command Buffer before the DataSize is check, leading to possible circumstances where the data immediately following the command buffer could be destroyed before returning a buffer size error.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-24350"
},
{
"cve": "CVE-2022-24351",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "Using SPI injection, it is possible to modify the FDM contents after it has been measured. This TOCTOU attack could be used to alter data and code used by the remainder of the boot process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-24351"
},
{
"cve": "CVE-2022-27405",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Some versions of InsydeH2O use the FreeType tools to embed fonts into the BIOS. InsydeH2O does not use the FreeType API at runtime and usage during build time does not produce a vulnerability in the BIOS. The CVSS reflects this limited usage.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-27405"
},
{
"cve": "CVE-2022-29275",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In UsbCoreDxe, untrusted input may allow SMRAM or OS memory tampering Use of untrusted pointers could allow OS or SMRAM memory tampering leading to escalation of privileges. This issue was discovered by Insyde during security review. https://www.insyde.com/security-pledge/SA-2022058",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-29275"
},
{
"cve": "CVE-2022-30283",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "In UsbCoreDxe, tampering with the contents of the USB working buffer using DMA while certain USB transactions are in process leads to a TOCTOU problem that could be used by an attacker to cause SMRAM corruption and escalation of privileges The UsbCoreDxe module creates a working buffer for USB transactions outside of SMRAM. The code which uses can be inside of SMM, making the working buffer untrusted input. The buffer can be corrupted by DMA transfers. The SMM code code attempts to sanitize pointers to ensure all pointers refer to the working buffer, but when a pointer is not found in the list of pointers to sanitize, the current action is not aborted, leading to undefined behavior. This issue was discovered by Insyde engineering based on the general description provided by Intel\u0027s iSTARE group. Fixed in: Kernel 5.0: Version 05.09. 21 Kernel 5.1: Version 05.17.21 Kernel 5.2: Version 05.27.21 Kernel 5.3: Version 05.36.21 Kernel 5.4: Version 05.44.21 Kernel 5.5: Version 05.52.21 https://www.insyde.com/security-pledge/SA-2022063",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-30283"
},
{
"cve": "CVE-2022-30772",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Manipulation of the input address in PnpSmm function 0x52 could be used by malware to overwrite SMRAM or OS kernel memory. Function 0x52 of the PnpSmm driver is passed the address and size of data to write into the SMBIOS table, but manipulation of the address could be used by malware to overwrite SMRAM or OS kernel memory. This issue was discovered by Insyde engineering during a security review. This issue is fixed in: Kernel 5.0: 05.09.41 Kernel 5.1: 05.17.43 Kernel 5.2: 05.27.30 Kernel 5.3: 05.36.30 Kernel 5.4: 05.44.30 Kernel 5.5: 05.52.30 https://www.insyde.com/security-pledge/SA-2022065",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-30772"
},
{
"cve": "CVE-2022-32469",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "DMA attacks on the PnpSmm shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-32469"
},
{
"cve": "CVE-2022-32470",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "DMA attacks on the FwBlockServiceSmm shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-32470"
},
{
"cve": "CVE-2022-32471",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "DMA attacks on the IHISI command buffer could cause TOCTOU issues which could lead to corruption of SMRAM and escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-32471"
},
{
"cve": "CVE-2022-32475",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "DMA attacks on the VariableRuntimeDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-32475"
},
{
"cve": "CVE-2022-32477",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "DMA attacks on the FvbServicesRuntimeDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-32477"
},
{
"cve": "CVE-2022-32953",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "DMA attacks on the SdHostDriver buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-32953"
},
{
"cve": "CVE-2022-32954",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "DMA attacks on the SdMmcDevice buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-32954"
},
{
"cve": "CVE-2022-35893",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM memory corruption vulnerability in the FvbServicesRuntimeDxe driver allows an attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-35893"
},
{
"cve": "CVE-2022-35894",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. The SMI handler for the FwBlockServiceSmm driver uses an untrusted pointer as the location to copy data to an attacker-specified buffer, leading to information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-35894"
},
{
"cve": "CVE-2022-35895",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. The FwBlockSericceSmm driver does not properly validate input parameters for a software SMI routine, leading to memory corruption of arbitrary addresses including SMRAM, and possible arbitrary code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-35895"
},
{
"cve": "CVE-2022-35896",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue SMM memory leak vulnerability in SMM driver (SMRAM was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An attacker can dump SMRAM contents via the software SMI provided by the FvbServicesRuntimeDxe driver to read the contents of SMRAM, leading to information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-35896"
},
{
"cve": "CVE-2022-36338",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM callout vulnerability in the SMM driver FwBlockServiceSmm, creating SMM, leads to arbitrary code execution. An attacker can replace the pointer to the UEFI boot service GetVariable with a pointer to malware, and then generate a software SMI.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2022-36338"
},
{
"cve": "CVE-2023-24932",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"notes": [
{
"category": "summary",
"text": "An attacker who has physical access or Administrative rights to a target device could install an affected boot policy which could bypass Security Boot.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2023-24932"
},
{
"cve": "CVE-2023-27373",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. Due to insufficient input validation, an attacker can tamper with a runtime-accessible EFI variable to cause a dynamic BAR setting to overlap SMRAM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2023-27373"
},
{
"cve": "CVE-2023-31041",
"cwe": {
"id": "CWE-256",
"name": "Plaintext Storage of a Password"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in SysPasswordDxe in Insyde InsydeH2O with kernel 5.0 through 5.5. System password information could optionally be stored in cleartext, which might lead to possible information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update BIOS to V1.0.212N or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
],
"url": "https://support.industry.siemens.com/cs/in/en/view/109814796"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22"
]
}
],
"title": "CVE-2023-31041"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.